SlideShare una empresa de Scribd logo
1 de 110
Descargar para leer sin conexión
INFORMATION THEORY AND
CODING
5th SEM E&C
JAYANTHDWIJESH H P M.tech (DECS)
Assistant Professor – Dept of E&C
B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T)
B.G Nagara, Nagamangala Tq, Mandya District- 571448
FORMULAS FOR REFERENCE
MODULE – 2 (source coding)
 Entropy of source or Average information content of the source.
H(S) = 𝑷𝒊 𝐥𝐨𝐠(
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) bits/symbol or H(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟐 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) bits/symbol
 Average length
L = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or L = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 Source or code efficiency
𝜼 𝑺=
𝑯(𝑺)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝑯(𝑺)
𝑳
X 𝟏𝟎𝟎%
 Source or code redundancy
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝑯(𝑺)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝑯(𝑺)
𝑳
) X 𝟏𝟎𝟎%
 Compute the number of stages required for the encoding operation, which is
given by
𝒏 =
𝑵−𝒓
𝒓−𝟏
or  =
𝒒−𝒓
𝒓−𝟏
 The probability of “0”s and “1”s and “2” s in the code are found using the
formulas
P (0) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (0) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
P (1) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (1) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
P (2) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for
𝒒
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or
P (2) =
𝟏
𝑳
[𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for𝑵
𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .
 The variance of the word length is calculated from
Var ( 𝒍𝒊 ) = E [( 𝒍𝒊 − 𝐋 ) 𝟐
= 𝑷𝒊
𝒒
𝒊=𝟏 ( 𝒍𝒊 − 𝐋 ) 𝟐
 The Smallest integer value of 𝒍𝒊 if found using
𝟐 𝒍 𝒊 
𝟏
𝑷𝒊
or 𝒍𝒊  𝒍𝒐𝒈 𝟐
𝟏
𝑷𝒊
 The average length 𝑳 𝟐 of the 2nd
extension is given by
𝑳 𝟐 = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟐 = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 The average length 𝑳 𝟑 of the 3rd
extension is given by
𝑳 𝟑 = 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟑 = 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 bits/symbol
 The entropy of the 2nd extended
source is calculated as
H (𝑺 𝟐
) = 2 H(S)
 The entropy of the 3rd extended
source is calculated as
H (𝑺 𝟑
) = 3H(S)
 Source or code efficiency of the 2nd
extended source is
𝜼(𝟐)
𝑺
=
𝐇 (𝑺 𝟐
)
𝑳 𝟐
X 𝟏𝟎𝟎% or 𝜼(𝟐)
𝑪
=
𝐇 (𝑺 𝟐
)
𝑳 𝟐
X 𝟏𝟎𝟎%
 Source or code redundancy of the 2nd
extended source is
𝑹(𝟐)
𝜼 𝑺
= 1- 𝜼(𝟐)
𝑺
= (1 -
𝐇 (𝑺 𝟐)
𝑳 𝟐
) X 𝟏𝟎𝟎% or 𝑹(𝟐)
𝜼 𝑪
= 𝟏 − 𝜼(𝟐)
𝑪
= (1 -
𝐇 (𝑺 𝟐)
𝑳 𝟐
)
𝐗 𝟏𝟎𝟎%
 Source or code efficiency of the 3rd
extended source is
𝜼(𝟑)
𝑺
=
𝐇 (𝑺 𝟑
)
𝑳 𝟑
X 𝟏𝟎𝟎% or 𝜼(𝟑)
𝑪
=
𝐇 (𝑺 𝟑
)
𝟑
X 𝟏𝟎𝟎%
 Source or code redundancy of the 3rd
extended source is
𝑹(𝟑)
𝜼 𝑺
= 1- 𝜼(𝟑)
𝑺
= (1 -
𝐇 (𝑺 𝟑)
𝑳 𝟐
) X 𝟏𝟎𝟎% or 𝑹(𝟑)
𝜼 𝑪
= 𝟏 − 𝜼(𝟑)
𝑪
= (1 -
𝐇 (𝑺 𝟑)
𝑳 𝟑
)
𝐗 𝟏𝟎𝟎%
 The average length 𝑳 𝟑
of the Huffman ternary code is given by
𝑳(𝟑)
= 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 trinits /Msg- symbol or 𝑳(𝟑)
= 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 trinits / Msg- symbol
 The average length 𝑳 𝟒
of the Huffman quaternary code is given by
𝑳(𝟒)
= 𝑷𝒊
𝒒
𝒊=𝟏 𝒍𝒊 quaternary digits /Msg- symbol or
𝑳(𝟒)
= 𝑷𝒊
𝑵
𝒊=𝟏 𝒍𝒊 quaternary digits / Msg- symbol
 The entropy in ternary units/ message symbol is found by using equation
𝐇 𝟑(S) =
𝐇(𝐒)
𝒍𝒐𝒈 𝟐 𝟑
ternary units/ message symbol or
𝐇 𝟑(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟑 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) ternary units/ message symbol or
𝐇 𝟑(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟑 𝟏 (
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) ternary units/ message symbol
 The entropy in quaternary units/ message symbol is found by using equation
𝐇 𝟒(S) =
𝐇(𝐒)
𝒍𝒐𝒈 𝟐 𝟒
quaternary units/ message symbol or
𝐇 𝟒(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟒 𝟏 (
𝟏
𝑷 𝑲
𝑵
𝑲=𝟏 ) quaternary units/ message symbol or
𝐇 𝟒(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟒 𝟏 (
𝟏
𝑷 𝒊
𝒒
𝒊=𝟏 ) quaternary units/ message symbol
 Source or code efficiency of the ternary is given by
𝜼 𝒔(𝟑)
=
𝐇 𝟑(𝐒)
𝑳(𝟑)
X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟑)
=
𝐇 𝟑(𝐒)
𝑳(𝟑)
X 𝟏𝟎𝟎% or
𝜼 𝑺=
𝐇 𝟑(𝐒)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝐇 𝟑(𝐒)
𝑳
X 𝟏𝟎𝟎%
 Source or code efficiency of the quaternary is given by
𝜼 𝒔(𝟒)
=
𝐇 𝟒(𝐒)
𝑳(𝟒)
X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟒)
=
𝐇 𝟒(𝐒)
𝑳(𝟒)
X 𝟏𝟎𝟎% or
𝜼 𝑺=
𝐇 𝟒(𝐒)
𝑳
X 𝟏𝟎𝟎% or 𝜼 𝑪=
𝐇 𝟒(𝐒)
𝑳
X 𝟏𝟎𝟎%
 Source or code redundancy of the ternary is given by
𝑹 𝜼 𝒔(𝟑)
= 1- 𝜼 𝒔(𝟑)
= (1 -
𝐇 𝟑(𝐒)
𝑳(𝟑) ) X 𝟏𝟎𝟎% or
𝑹 𝜼 𝒄(𝟑)
= 𝟏 − 𝜼 𝒄(𝟑)
= (1 -
𝐇 𝟑(𝐒)
𝑳(𝟑) ) 𝐗 𝟏𝟎𝟎% or
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝐇 𝟑(𝐒)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝐇 𝟑(𝐒)
𝑳
) X 𝟏𝟎𝟎%
 Source or code redundancy of the quaternary is given by
𝑹 𝜼 𝒔(𝟒)
= 1- 𝜼 𝒔(𝟒)
= (1 -
𝐇 𝟒(𝐒)
𝑳(𝟒) ) X 𝟏𝟎𝟎% or
𝑹 𝜼 𝒄(𝟒)
= 𝟏 − 𝜼 𝒄(𝟒)
= (1 -
𝐇 𝟒(𝐒)
𝑳(𝟒) ) 𝐗 𝟏𝟎𝟎% or
𝑹 𝜼 𝑺
= 1- 𝜼 𝑺 = (1 -
𝐇 𝟒(𝐒)
𝑳
) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪
= 1- 𝜼 𝑪 = (1 -
𝐇 𝟒(𝐒)
𝑳
) X 𝟏𝟎𝟎%
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

Más contenido relacionado

La actualidad más candente

Interconnect Architectures
Interconnect ArchitecturesInterconnect Architectures
Interconnect Architectures
moslemah
 

La actualidad más candente (7)

Interconnect Architectures
Interconnect ArchitecturesInterconnect Architectures
Interconnect Architectures
 
Bloom Filters: An Introduction
Bloom Filters: An IntroductionBloom Filters: An Introduction
Bloom Filters: An Introduction
 
Incremental View Maintenance for openCypher Queries
Incremental View Maintenance for openCypher QueriesIncremental View Maintenance for openCypher Queries
Incremental View Maintenance for openCypher Queries
 
Cypher.PL: an executable specification of Cypher semantics
Cypher.PL: an executable specification of Cypher semanticsCypher.PL: an executable specification of Cypher semantics
Cypher.PL: an executable specification of Cypher semantics
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Genetic programming
Genetic programmingGenetic programming
Genetic programming
 
MDH01-CSL03
MDH01-CSL03MDH01-CSL03
MDH01-CSL03
 

Similar a VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Cemal Ardil
 
Design of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analyDesign of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analy
IAEME Publication
 

Similar a VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes (20)

Signals and systems-5
Signals and systems-5Signals and systems-5
Signals and systems-5
 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
 
Numerical differentiation and integration
Numerical differentiation and integrationNumerical differentiation and integration
Numerical differentiation and integration
 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.ppt
 
unit 4.ppt
unit 4.pptunit 4.ppt
unit 4.ppt
 
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
 
6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
 
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
 
Monotone likelihood ratio test
Monotone likelihood ratio testMonotone likelihood ratio test
Monotone likelihood ratio test
 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target Classifier
 
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdfsignals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
 
Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
 
Design of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analyDesign of the most effective method for minimizing the fading and sep analy
Design of the most effective method for minimizing the fading and sep analy
 

Más de Jayanth Dwijesh H P

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
Jayanth Dwijesh H P
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
Jayanth Dwijesh H P
 

Más de Jayanth Dwijesh H P (12)

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
VTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesVTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notes
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-5 notes(15...
 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -5 notes
 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -4 notes
 

Último

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes

  • 1. INFORMATION THEORY AND CODING 5th SEM E&C JAYANTHDWIJESH H P M.tech (DECS) Assistant Professor – Dept of E&C B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T) B.G Nagara, Nagamangala Tq, Mandya District- 571448
  • 2. FORMULAS FOR REFERENCE MODULE – 2 (source coding)  Entropy of source or Average information content of the source. H(S) = 𝑷𝒊 𝐥𝐨𝐠( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) bits/symbol or H(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟐 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) bits/symbol  Average length L = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or L = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol  Source or code efficiency 𝜼 𝑺= 𝑯(𝑺) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝑯(𝑺) 𝑳 X 𝟏𝟎𝟎%  Source or code redundancy 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝑯(𝑺) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝑯(𝑺) 𝑳 ) X 𝟏𝟎𝟎%  Compute the number of stages required for the encoding operation, which is given by 𝒏 = 𝑵−𝒓 𝒓−𝟏 or  = 𝒒−𝒓 𝒓−𝟏  The probability of “0”s and “1”s and “2” s in the code are found using the formulas P (0) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (0) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "0" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] . P (1) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (1) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "1" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] . P (2) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for 𝒒 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] or P (2) = 𝟏 𝑳 [𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 "2" s in the code for𝑵 𝒊=𝟏 𝑿𝒊 ] [𝒑𝒊 ] .  The variance of the word length is calculated from Var ( 𝒍𝒊 ) = E [( 𝒍𝒊 − 𝐋 ) 𝟐 = 𝑷𝒊 𝒒 𝒊=𝟏 ( 𝒍𝒊 − 𝐋 ) 𝟐  The Smallest integer value of 𝒍𝒊 if found using 𝟐 𝒍 𝒊  𝟏 𝑷𝒊 or 𝒍𝒊  𝒍𝒐𝒈 𝟐 𝟏 𝑷𝒊  The average length 𝑳 𝟐 of the 2nd extension is given by 𝑳 𝟐 = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟐 = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol
  • 3.  The average length 𝑳 𝟑 of the 3rd extension is given by 𝑳 𝟑 = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 bits/symbol or 𝑳 𝟑 = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 bits/symbol  The entropy of the 2nd extended source is calculated as H (𝑺 𝟐 ) = 2 H(S)  The entropy of the 3rd extended source is calculated as H (𝑺 𝟑 ) = 3H(S)  Source or code efficiency of the 2nd extended source is 𝜼(𝟐) 𝑺 = 𝐇 (𝑺 𝟐 ) 𝑳 𝟐 X 𝟏𝟎𝟎% or 𝜼(𝟐) 𝑪 = 𝐇 (𝑺 𝟐 ) 𝑳 𝟐 X 𝟏𝟎𝟎%  Source or code redundancy of the 2nd extended source is 𝑹(𝟐) 𝜼 𝑺 = 1- 𝜼(𝟐) 𝑺 = (1 - 𝐇 (𝑺 𝟐) 𝑳 𝟐 ) X 𝟏𝟎𝟎% or 𝑹(𝟐) 𝜼 𝑪 = 𝟏 − 𝜼(𝟐) 𝑪 = (1 - 𝐇 (𝑺 𝟐) 𝑳 𝟐 ) 𝐗 𝟏𝟎𝟎%  Source or code efficiency of the 3rd extended source is 𝜼(𝟑) 𝑺 = 𝐇 (𝑺 𝟑 ) 𝑳 𝟑 X 𝟏𝟎𝟎% or 𝜼(𝟑) 𝑪 = 𝐇 (𝑺 𝟑 ) 𝟑 X 𝟏𝟎𝟎%  Source or code redundancy of the 3rd extended source is 𝑹(𝟑) 𝜼 𝑺 = 1- 𝜼(𝟑) 𝑺 = (1 - 𝐇 (𝑺 𝟑) 𝑳 𝟐 ) X 𝟏𝟎𝟎% or 𝑹(𝟑) 𝜼 𝑪 = 𝟏 − 𝜼(𝟑) 𝑪 = (1 - 𝐇 (𝑺 𝟑) 𝑳 𝟑 ) 𝐗 𝟏𝟎𝟎%  The average length 𝑳 𝟑 of the Huffman ternary code is given by 𝑳(𝟑) = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 trinits /Msg- symbol or 𝑳(𝟑) = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 trinits / Msg- symbol  The average length 𝑳 𝟒 of the Huffman quaternary code is given by 𝑳(𝟒) = 𝑷𝒊 𝒒 𝒊=𝟏 𝒍𝒊 quaternary digits /Msg- symbol or 𝑳(𝟒) = 𝑷𝒊 𝑵 𝒊=𝟏 𝒍𝒊 quaternary digits / Msg- symbol  The entropy in ternary units/ message symbol is found by using equation 𝐇 𝟑(S) = 𝐇(𝐒) 𝒍𝒐𝒈 𝟐 𝟑 ternary units/ message symbol or 𝐇 𝟑(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟑 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) ternary units/ message symbol or 𝐇 𝟑(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟑 𝟏 ( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) ternary units/ message symbol  The entropy in quaternary units/ message symbol is found by using equation 𝐇 𝟒(S) = 𝐇(𝐒) 𝒍𝒐𝒈 𝟐 𝟒 quaternary units/ message symbol or
  • 4. 𝐇 𝟒(S) = 𝑷 𝑲 𝐥𝐨𝐠 𝟒 𝟏 ( 𝟏 𝑷 𝑲 𝑵 𝑲=𝟏 ) quaternary units/ message symbol or 𝐇 𝟒(S) = 𝑷𝒊 𝐥𝐨𝐠 𝟒 𝟏 ( 𝟏 𝑷 𝒊 𝒒 𝒊=𝟏 ) quaternary units/ message symbol  Source or code efficiency of the ternary is given by 𝜼 𝒔(𝟑) = 𝐇 𝟑(𝐒) 𝑳(𝟑) X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟑) = 𝐇 𝟑(𝐒) 𝑳(𝟑) X 𝟏𝟎𝟎% or 𝜼 𝑺= 𝐇 𝟑(𝐒) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝐇 𝟑(𝐒) 𝑳 X 𝟏𝟎𝟎%  Source or code efficiency of the quaternary is given by 𝜼 𝒔(𝟒) = 𝐇 𝟒(𝐒) 𝑳(𝟒) X 𝟏𝟎𝟎% or 𝜼 𝒄(𝟒) = 𝐇 𝟒(𝐒) 𝑳(𝟒) X 𝟏𝟎𝟎% or 𝜼 𝑺= 𝐇 𝟒(𝐒) 𝑳 X 𝟏𝟎𝟎% or 𝜼 𝑪= 𝐇 𝟒(𝐒) 𝑳 X 𝟏𝟎𝟎%  Source or code redundancy of the ternary is given by 𝑹 𝜼 𝒔(𝟑) = 1- 𝜼 𝒔(𝟑) = (1 - 𝐇 𝟑(𝐒) 𝑳(𝟑) ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝒄(𝟑) = 𝟏 − 𝜼 𝒄(𝟑) = (1 - 𝐇 𝟑(𝐒) 𝑳(𝟑) ) 𝐗 𝟏𝟎𝟎% or 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝐇 𝟑(𝐒) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝐇 𝟑(𝐒) 𝑳 ) X 𝟏𝟎𝟎%  Source or code redundancy of the quaternary is given by 𝑹 𝜼 𝒔(𝟒) = 1- 𝜼 𝒔(𝟒) = (1 - 𝐇 𝟒(𝐒) 𝑳(𝟒) ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝒄(𝟒) = 𝟏 − 𝜼 𝒄(𝟒) = (1 - 𝐇 𝟒(𝐒) 𝑳(𝟒) ) 𝐗 𝟏𝟎𝟎% or 𝑹 𝜼 𝑺 = 1- 𝜼 𝑺 = (1 - 𝐇 𝟒(𝐒) 𝑳 ) X 𝟏𝟎𝟎% or 𝑹 𝜼 𝑪 = 1- 𝜼 𝑪 = (1 - 𝐇 𝟒(𝐒) 𝑳 ) X 𝟏𝟎𝟎%