SlideShare ist ein Scribd-Unternehmen logo
1 von 110
Downloaden Sie, um offline zu lesen
INFORMATION THEORY AND
CODING
5th SEM E&C
JAYANTHDWIJESH H P M.tech (DECS)
Assistant Professor – Dept of E&C
B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T)
B.G Nagara, Nagamangala Tq, Mandya District- 571448
FORMULAS FOR REFERENCE
MODULE – 2 (source coding)
 Entropy of source or Average information content of the source.
H(S) = 𝑷𝒊 𝐥𝐨𝐠(
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) bits/symbol or H(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟐 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) bits/symbol
 Average length
L = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or L = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 Source or code efficiency
𝜼 𝑺=
𝑯(𝑺)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝑯(𝑺)
𝑳
X 𝟏𝟎𝟎%
 Source or code redundancy
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝑯(𝑺)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝑯(𝑺)
𝑳
) X 𝟏𝟎𝟎%
 Compute the number of stages required for the encoding operation, which is
given by
𝒏 =
𝑵−𝒓
𝒓−𝟏
or  =
𝒒−𝒓
𝒓−𝟏
 The probability of “0”s and “1”s and “2” s in the code are found using the
formulas
P (0) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (0) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
P (1) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (1) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
P (2) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (2) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
 The variance of the word length is calculated from
Var ( 𝒍𝒊 ) = E [( 𝒍𝒊 − 𝐋 ) 𝟐
= 𝑷𝒊
𝒒
𝒊=𝟏 ( 𝒍𝒊 − 𝐋 ) 𝟐
 The Smallest integer value of 𝒍𝒊 if found using
𝟐 𝒍 𝒊 
𝟏
𝑷𝒊
or 𝒍𝒊  𝒍𝒐𝒈 𝟐
𝟏
𝑷𝒊
 The average length 𝑳 𝟐 of the 2nd
extension is given by
𝑳 𝟐 = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟐 = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 The average length 𝑳 𝟑 of the 3rd
extension is given by
𝑳 𝟑 = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟑 = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 The entropy of the 2nd extended
source is calculated as
H (𝑺 𝟐
) = 2 H(S)
 The entropy of the 3rd extended
source is calculated as
H (𝑺 𝟑
) = 3H(S)
 Source or code efficiency of the 2nd
extended source is
𝜼(𝟐)
𝑺
=
𝐇 (𝑺 𝟐
)
𝑳 𝟐
X 𝟏𝟎𝟎% or 𝜼(𝟐)
𝑪
=
𝐇 (𝑺 𝟐
)
𝑳 𝟐
X 𝟏𝟎𝟎%
 Source or code redundancy of the 2nd
extended source is
𝑹(𝟐)
𝜼 𝑺
= 1- 𝜼(𝟐)
𝑺
= (1 -
𝐇 (𝑺 𝟐)
𝑳 𝟐
) X 𝟏𝟎𝟎% or 𝑹(𝟐)
𝜼 𝑪
= 𝟏 − 𝜼(𝟐)
𝑪
= (1 -
𝐇 (𝑺 𝟐)
𝑳 𝟐
)
𝐗 𝟏𝟎𝟎%
 Source or code efficiency of the 3rd
extended source is
𝜼(𝟑)
𝑺
=
𝐇 (𝑺 𝟑
)
𝑳 𝟑
X 𝟏𝟎𝟎% or 𝜼(𝟑)
𝑪
=
𝐇 (𝑺 𝟑
)
𝟑
X 𝟏𝟎𝟎%
 Source or code redundancy of the 3rd
extended source is
𝑹(𝟑)
𝜼 𝑺
= 1- 𝜼(𝟑)
𝑺
= (1 -
𝐇 (𝑺 𝟑)
𝑳 𝟐
) X 𝟏𝟎𝟎% or 𝑹(𝟑)
𝜼 𝑪
= 𝟏 − 𝜼(𝟑)
𝑪
= (1 -
𝐇 (𝑺 𝟑)
𝑳 𝟑
)
𝐗 𝟏𝟎𝟎%
 The average length 𝑳 𝟑
of the Huffman ternary code is given by
𝑳(𝟑)
= 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 trinits /Msg- symbol or 𝑳(𝟑)
= 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 trinits / Msg- symbol
 The average length 𝑳 𝟒
of the Huffman quaternary code is given by
𝑳(𝟒)
= 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 quaternary digits /Msg- symbol or
𝑳(𝟒)
= 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 quaternary digits / Msg- symbol
 The entropy in ternary units/ message symbol is found by using equation
𝐇 𝟑(S) =
𝐇(𝐒)
𝒍𝒐𝒈 𝟐 𝟑
ternary units/ message symbol or
𝐇 𝟑(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟑 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) ternary units/ message symbol or
𝐇 𝟑(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟑 𝟏 (
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) ternary units/ message symbol
 The entropy in quaternary units/ message symbol is found by using equation
𝐇 𝟒(S) =
𝐇(𝐒)
𝒍𝒐𝒈 𝟐 𝟒
quaternary units/ message symbol or
𝐇 𝟒(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟒 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) quaternary units/ message symbol or
𝐇 𝟒(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟒 𝟏 (
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) quaternary units/ message symbol
 Source or code efficiency of the ternary is given by
𝜼 𝒔(𝟑)
=
𝐇 𝟑(𝐒)
𝑳(𝟑)
X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟑)
=
𝐇 𝟑(𝐒)
𝑳(𝟑)
X 𝟏𝟎𝟎% or
𝜼 𝑺=
𝐇 𝟑(𝐒)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝐇 𝟑(𝐒)
𝑳
X 𝟏𝟎𝟎%
 Source or code efficiency of the quaternary is given by
𝜼 𝒔(𝟒)
=
𝐇 𝟒(𝐒)
𝑳(𝟒)
X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟒)
=
𝐇 𝟒(𝐒)
𝑳(𝟒)
X 𝟏𝟎𝟎% or
𝜼 𝑺=
𝐇 𝟒(𝐒)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝐇 𝟒(𝐒)
𝑳
X 𝟏𝟎𝟎%
 Source or code redundancy of the ternary is given by
𝑹 𝜼 𝒔(𝟑)
= 1- 𝜼 𝒔(𝟑)
= (1 -
𝐇 𝟑(𝐒)
𝑳(𝟑) ) X 𝟏𝟎𝟎% or
𝑹 𝜼 𝒄(𝟑)
= 𝟏 − 𝜼 𝒄(𝟑)
= (1 -
𝐇 𝟑(𝐒)
𝑳(𝟑) ) 𝐗 𝟏𝟎𝟎% or
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝐇 𝟑(𝐒)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝐇 𝟑(𝐒)
𝑳
) X 𝟏𝟎𝟎%
 Source or code redundancy of the quaternary is given by
𝑹 𝜼 𝒔(𝟒)
= 1- 𝜼 𝒔(𝟒)
= (1 -
𝐇 𝟒(𝐒)
𝑳(𝟒) ) X 𝟏𝟎𝟎% or
𝑹 𝜼 𝒄(𝟒)
= 𝟏 − 𝜼 𝒄(𝟒)
= (1 -
𝐇 𝟒(𝐒)
𝑳(𝟒) ) 𝐗 𝟏𝟎𝟎% or
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝐇 𝟒(𝐒)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝐇 𝟒(𝐒)
𝑳
) X 𝟏𝟎𝟎%
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

Weitere ähnliche Inhalte

Was ist angesagt?

Interconnect Architectures
Interconnect ArchitecturesInterconnect Architectures
Interconnect Architectures
moslemah
 

Was ist angesagt? (7)

Interconnect Architectures
Interconnect ArchitecturesInterconnect Architectures
Interconnect Architectures
 
Bloom Filters: An Introduction
Bloom Filters: An IntroductionBloom Filters: An Introduction
Bloom Filters: An Introduction
 
Incremental View Maintenance for openCypher Queries
Incremental View Maintenance for openCypher QueriesIncremental View Maintenance for openCypher Queries
Incremental View Maintenance for openCypher Queries
 
Cypher.PL: an executable specification of Cypher semantics
Cypher.PL: an executable specification of Cypher semanticsCypher.PL: an executable specification of Cypher semantics
Cypher.PL: an executable specification of Cypher semantics
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Genetic programming
Genetic programmingGenetic programming
Genetic programming
 
MDH01-CSL03
MDH01-CSL03MDH01-CSL03
MDH01-CSL03
 

Ähnlich wie VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Cemal Ardil
 
Design of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analyDesign of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analy
IAEME Publication
 

Ähnlich wie VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes (20)

Signals and systems-5
Signals and systems-5Signals and systems-5
Signals and systems-5
 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
 
Numerical differentiation and integration
Numerical differentiation and integrationNumerical differentiation and integration
Numerical differentiation and integration
 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.ppt
 
unit 4.ppt
unit 4.pptunit 4.ppt
unit 4.ppt
 
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
 
6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
 
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
 
Monotone likelihood ratio test
Monotone likelihood ratio testMonotone likelihood ratio test
Monotone likelihood ratio test
 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target Classifier
 
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdfsignals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
 
Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
 
Design of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analyDesign of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analy
 

Mehr von Jayanth Dwijesh H P

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
Jayanth Dwijesh H P
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
Jayanth Dwijesh H P
 

Mehr von Jayanth Dwijesh H P (12)

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
VTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesVTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notes
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

  • 1. INFORMATION THEORY AND CODING 5th SEM E&C JAYANTHDWIJESH H P M.tech (DECS) Assistant Professor – Dept of E&C B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T) B.G Nagara, Nagamangala Tq, Mandya District- 571448
  • 2. FORMULAS FOR REFERENCE MODULE – 2 (source coding)  Entropy of source or Average information content of the source. H(S) = 𝑷𝒊 𝐥𝐨𝐠( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) bits/symbol or H(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟐 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) bits/symbol  Average length L = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or L = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol  Source or code efficiency 𝜼 𝑺= 𝑯(𝑺) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝑯(𝑺) 𝑳 X 𝟏𝟎𝟎%  Source or code redundancy 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝑯(𝑺) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝑯(𝑺) 𝑳 ) X 𝟏𝟎𝟎%  Compute the number of stages required for the encoding operation, which is given by 𝒏 = 𝑵−𝒓 𝒓−𝟏 or  = 𝒒−𝒓 𝒓−𝟏  The probability of “0”s and “1”s and “2” s in the code are found using the formulas P (0) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (0) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] . P (1) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (1) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] . P (2) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (2) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .  The variance of the word length is calculated from Var ( 𝒍𝒊 ) = E [( 𝒍𝒊 − 𝐋 ) 𝟐 = 𝑷𝒊 𝒒 𝒊=𝟏 ( 𝒍𝒊 − 𝐋 ) 𝟐  The Smallest integer value of 𝒍𝒊 if found using 𝟐 𝒍 𝒊  𝟏 𝑷𝒊 or 𝒍𝒊  𝒍𝒐𝒈 𝟐 𝟏 𝑷𝒊  The average length 𝑳 𝟐 of the 2nd extension is given by 𝑳 𝟐 = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟐 = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol
  • 3.  The average length 𝑳 𝟑 of the 3rd extension is given by 𝑳 𝟑 = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟑 = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol  The entropy of the 2nd extended source is calculated as H (𝑺 𝟐 ) = 2 H(S)  The entropy of the 3rd extended source is calculated as H (𝑺 𝟑 ) = 3H(S)  Source or code efficiency of the 2nd extended source is 𝜼(𝟐) 𝑺 = 𝐇 (𝑺 𝟐 ) 𝑳 𝟐 X 𝟏𝟎𝟎% or 𝜼(𝟐) 𝑪 = 𝐇 (𝑺 𝟐 ) 𝑳 𝟐 X 𝟏𝟎𝟎%  Source or code redundancy of the 2nd extended source is 𝑹(𝟐) 𝜼 𝑺 = 1- 𝜼(𝟐) 𝑺 = (1 - 𝐇 (𝑺 𝟐) 𝑳 𝟐 ) X 𝟏𝟎𝟎% or 𝑹(𝟐) 𝜼 𝑪 = 𝟏 − 𝜼(𝟐) 𝑪 = (1 - 𝐇 (𝑺 𝟐) 𝑳 𝟐 ) 𝐗 𝟏𝟎𝟎%  Source or code efficiency of the 3rd extended source is 𝜼(𝟑) 𝑺 = 𝐇 (𝑺 𝟑 ) 𝑳 𝟑 X 𝟏𝟎𝟎% or 𝜼(𝟑) 𝑪 = 𝐇 (𝑺 𝟑 ) 𝟑 X 𝟏𝟎𝟎%  Source or code redundancy of the 3rd extended source is 𝑹(𝟑) 𝜼 𝑺 = 1- 𝜼(𝟑) 𝑺 = (1 - 𝐇 (𝑺 𝟑) 𝑳 𝟐 ) X 𝟏𝟎𝟎% or 𝑹(𝟑) 𝜼 𝑪 = 𝟏 − 𝜼(𝟑) 𝑪 = (1 - 𝐇 (𝑺 𝟑) 𝑳 𝟑 ) 𝐗 𝟏𝟎𝟎%  The average length 𝑳 𝟑 of the Huffman ternary code is given by 𝑳(𝟑) = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 trinits /Msg- symbol or 𝑳(𝟑) = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 trinits / Msg- symbol  The average length 𝑳 𝟒 of the Huffman quaternary code is given by 𝑳(𝟒) = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 quaternary digits /Msg- symbol or 𝑳(𝟒) = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 quaternary digits / Msg- symbol  The entropy in ternary units/ message symbol is found by using equation 𝐇 𝟑(S) = 𝐇(𝐒) 𝒍𝒐𝒈 𝟐 𝟑 ternary units/ message symbol or 𝐇 𝟑(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟑 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) ternary units/ message symbol or 𝐇 𝟑(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟑 𝟏 ( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) ternary units/ message symbol  The entropy in quaternary units/ message symbol is found by using equation 𝐇 𝟒(S) = 𝐇(𝐒) 𝒍𝒐𝒈 𝟐 𝟒 quaternary units/ message symbol or
  • 4. 𝐇 𝟒(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟒 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) quaternary units/ message symbol or 𝐇 𝟒(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟒 𝟏 ( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) quaternary units/ message symbol  Source or code efficiency of the ternary is given by 𝜼 𝒔(𝟑) = 𝐇 𝟑(𝐒) 𝑳(𝟑) X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟑) = 𝐇 𝟑(𝐒) 𝑳(𝟑) X 𝟏𝟎𝟎% or 𝜼 𝑺= 𝐇 𝟑(𝐒) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝐇 𝟑(𝐒) 𝑳 X 𝟏𝟎𝟎%  Source or code efficiency of the quaternary is given by 𝜼 𝒔(𝟒) = 𝐇 𝟒(𝐒) 𝑳(𝟒) X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟒) = 𝐇 𝟒(𝐒) 𝑳(𝟒) X 𝟏𝟎𝟎% or 𝜼 𝑺= 𝐇 𝟒(𝐒) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝐇 𝟒(𝐒) 𝑳 X 𝟏𝟎𝟎%  Source or code redundancy of the ternary is given by 𝑹 𝜼 𝒔(𝟑) = 1- 𝜼 𝒔(𝟑) = (1 - 𝐇 𝟑(𝐒) 𝑳(𝟑) ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝒄(𝟑) = 𝟏 − 𝜼 𝒄(𝟑) = (1 - 𝐇 𝟑(𝐒) 𝑳(𝟑) ) 𝐗 𝟏𝟎𝟎% or 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝐇 𝟑(𝐒) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝐇 𝟑(𝐒) 𝑳 ) X 𝟏𝟎𝟎%  Source or code redundancy of the quaternary is given by 𝑹 𝜼 𝒔(𝟒) = 1- 𝜼 𝒔(𝟒) = (1 - 𝐇 𝟒(𝐒) 𝑳(𝟒) ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝒄(𝟒) = 𝟏 − 𝜼 𝒄(𝟒) = (1 - 𝐇 𝟒(𝐒) 𝑳(𝟒) ) 𝐗 𝟏𝟎𝟎% or 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝐇 𝟒(𝐒) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝐇 𝟒(𝐒) 𝑳 ) X 𝟏𝟎𝟎%