Description | The main purpose of the subject is to present and substantiate the main theories and methods and techniques of information systems. Students will learn about basics of logic, numerical systems, basics systems theory, description of information, coding, encryption and semantics, model modelling and fundamentals of computer aided modelling. |
Semester | Autumn, 2024 |
Neptun code | GEIAK100-B2A |
Instructors | Dr. Károly Nehéz, assoc. prof. Áron Kiss, teaching assist. |
Credit Hours | 2+2 |
Attendance Requirement | Students are required to attend at least 60% of the scheduled classes to be eligible for the course signature. |
Signature | The prerequisite for obtaining the signature is the completion of the two practical assignments at an adequate level and the successful completion of a midterm exam. |
Examination | The examination is written, and students will receive some theoretical questions and practical tasks from the course material. |
1. The three types of sciences: inductive, deductive, and reductive. An overview of the scientific method.
2. The hierarchical levels of information, the concepts of sets and systems, the multi-level model of informational properties, and the concept of a signal and its basic types.
3. The quantitative properties of information, the concept of relative frequency, probabilities in finite event systems, Shannon's information-measuring function, the statistical properties of message sets, and the entropy and redundancy of a message set.
4. The syntactic properties of information. The concept of a code. Properties of different code types. Encoding messages, the Shannon-Fano procedure.
5. The concept of parity bit, Hamming distance, correcting a 1-bit error in 16-bit data.
6. Other error detection and correction methods: the concept of a checksum. Elias block protection.
7. Checksum. The protection algorithm of bank card numbers.
8. Simple compression methods: RLE coding, LZW coding.
9. Character codes: ASCII codes, Unicode, UTF-8 encoding and decoding.
10. Demonstration of Base64 encoding and decoding.
11. Demonstration of JPEG and MPEG compression, including their key properties.
12. The syntax of languages: demonstration of Backus-Naur (BN) form, syntax graphs, JSON schema. The essence of XML and DTD.
13. Implementation of key exchange over an eavesdropped channel.
14. The essence of RSA encryption.
15. Hash codes and their properties, password storage.
16. Digital signatures with and without hash codes.