User Tools

Site Tools


tanszek:oktatas:techcomm:encoding_techniques

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tanszek:oktatas:techcomm:encoding_techniques [2024/09/09 14:32] – [BCD] kissatanszek:oktatas:techcomm:encoding_techniques [2024/11/24 18:07] (current) kissa
Line 1: Line 1:
-===== Encoding Techniques =====+====== Encoding Techniques ======
  
 **Encoding techniques** are methods used to convert data into a specific format for efficient storage, transmission, or processing. These techniques are widely applied in fields such as telecommunications, data storage, and information security to optimize performance and ensure data integrity. \\ **Encoding techniques** are methods used to convert data into a specific format for efficient storage, transmission, or processing. These techniques are widely applied in fields such as telecommunications, data storage, and information security to optimize performance and ensure data integrity. \\
 In addition to encoding, **encryption** is a crucial technique used to secure data by converting it into a coded format that is only decipherable with the appropriate key, ensuring privacy and protection against unauthorized access. In addition to encoding, **encryption** is a crucial technique used to secure data by converting it into a coded format that is only decipherable with the appropriate key, ensuring privacy and protection against unauthorized access.
-==== BCD ====+ 
 +===== BCD =====
  
 **BCD** (//**Binary-Coded Decimal**//) is a method of encoding decimal numbers where each digit is represented by its own binary sequence, typically using 4 bits. This coding simplifies the conversion between binary and decimal systems, making it useful in applications like digital clocks, calculators, and financial systems, where precise decimal representation is important. BCD is particularly favored in hardware-level computations for improved accuracy in handling decimal data. **BCD** (//**Binary-Coded Decimal**//) is a method of encoding decimal numbers where each digit is represented by its own binary sequence, typically using 4 bits. This coding simplifies the conversion between binary and decimal systems, making it useful in applications like digital clocks, calculators, and financial systems, where precise decimal representation is important. BCD is particularly favored in hardware-level computations for improved accuracy in handling decimal data.
  
-=== Exercise ===+==== Lecture Notes ====
  
-//In a communication system, we want to transmit numbers from 40 to 119 using a fixed-length BCD code with parity checking.+  * [[tanszek:oktatas:techcomm:bcd_encoding|BCD Coding]] 
 +  * [[tanszek:oktatas:techcomm:parity_check|Parity Checking]]
  
-a) What will be the length of the encoded messages if each decimal digit is encoded with 4 bits in BCD encoding?//+==== Exercises ====
  
-<fc #ff0000>W.I.P.</fc>+In a communication system, we want to transmit numbers from 40 to 119 using a fixed-length BCD code with parity checking.
  
-//bCreate a possible structure of the code table that assigns the binary representation of digits to the numbers, supplemented with a parity bit. What will be the code for the numbers 42, 87, 100, and 111 in the system?//+a) What will be the length of the encoded messages if each decimal digit is encoded with 4 bits in BCD encoding?
  
-<fc #ff0000>W.I.P.</fc>+b) Create a possible structure of the code table that assigns the binary representation of digits to the numbersWhat will be the code for the numbers 42, 87, 100, and 111 in the system?
  
-//c) What will be the entropy and redundancy of this code if the occurrence of numbers in the range 40 $\leq$ n $\leq$ 69 is four times more frequent than the occurrence of numbers in the range $\leq$ ≤ ≤ $\leq$?//+c) What will be the entropy and redundancy of this code if the occurrence of numbers in the range 40 $\leq$ n $\leq$ 69 is four times more frequent than the occurrence of numbers in the range 70 $\leq$ n $\leq$ 119?
  
-<fc #ff0000>W.I.P.</fc>+d) How many bits would the messages be if we used pure binary coding with parity checking?
  
-//d) How many bits would the messages be if we used pure binary coding with parity checking?//+===== Huffman =====
  
-<fc #ff0000>W.I.P.</fc> +**Huffman** coding is a lossless data compression algorithm that assigns variable-length codes to input characters based on their frequencies: more frequent characters receiving more shorter codesThis technique efficiently reduces the size of data for storage or transmissionIt is widely used in applications such as file compression (e.g., ZIP), multimedia encoding (e.g., JPEG and MP3), and in communication systems where optimizing bandwidth is crucial. 
-==== LZW ==== + 
 +==== Lecture Notes ==== 
 + 
 +  * [[tanszek:oktatas:techcomm:huffman_codes|Huffman Coding]] 
 + 
 +==== Exercises ==== 
 + 
 +Explain Huffman encoding by encoding the message **COMPRESSION_IS_COOL**! 
 + 
 +Explain Huffman encoding by encoding the message **HELLO_WORLD_HELLO_EVERYONE**! 
 + 
 +===== LZW ===== 
  
 **LZW** (//**Lempel-Ziv-Welch**//) coding is a lossless data compression algorithm that replaces repeated sequences of data with shorter codes, thus reducing file size without losing information. It is widely used in applications such as image compression (e.g., GIF), PDF files, and in systems that require efficient storage and transmission, like data archives and network protocols. **LZW** (//**Lempel-Ziv-Welch**//) coding is a lossless data compression algorithm that replaces repeated sequences of data with shorter codes, thus reducing file size without losing information. It is widely used in applications such as image compression (e.g., GIF), PDF files, and in systems that require efficient storage and transmission, like data archives and network protocols.
  
-=== Exercise === 
  
-<fc #ff0000>W.I.P.</fc>+==== Lecture Notes and Videos ====
  
-==== Huffmann ====+  * [[tanszek:oktatas:techcomm:lzw_coding|LZW Coding]] 
 +  * [[https://www.youtube.com/watch?v=7MdGxDoRTiI|LZW Encoding Exercise (video)]] 
 +  * [[https://www.youtube.com/watch?v=N8wfrb42Ixs|LZW Decoding Exercise (video)]]
  
-**Huffman** coding is a lossless data compression algorithm that assigns variable-length codes to input characters based on their frequencies: more frequent characters receiving more shorter codes. This technique efficiently reduces the size of data for storage or transmission. It is widely used in applications such as file compression (e.g., ZIP), multimedia encoding (e.g., JPEG and MP3), and in communication systems where optimizing bandwidth is crucial.+==== Exercises ====
  
-=== Exercise ===+1.1. Explain LZW encoding by encoding the message **ABABABAB**!
  
-<fc #ff0000>W.I.P.</fc>+1.2Decode the received message using only the initial dictionary!
  
-==== RSA ====+ 
 +2.1. Encode the message **ABRACADABRAABRACADABRA** with LZW coding! 
 + 
 +2.2. Decode the received message using only the initial dictionary! 
 + 
 +===== RSA =====
 **RSA** (**//Rivest-Shamir-Adleman//**) is a widely used asymmetric cryptographic algorithm that secures data through a pair of public and private keys, enabling secure encryption and decryption. Its strength lies in the difficulty of factoring large prime numbers, providing robust protection for sensitive information. RSA is commonly applied in secure communication protocols, such as SSL/TLS for internet security, digital signatures, and email encryption. **RSA** (**//Rivest-Shamir-Adleman//**) is a widely used asymmetric cryptographic algorithm that secures data through a pair of public and private keys, enabling secure encryption and decryption. Its strength lies in the difficulty of factoring large prime numbers, providing robust protection for sensitive information. RSA is commonly applied in secure communication protocols, such as SSL/TLS for internet security, digital signatures, and email encryption.
  
-=== Exercise ===+==== Lecture Notes ==== 
 + 
 +  * [[tanszek:oktatas:techcomm:rsa_encryption|RSA Encryption]] 
 + 
 +==== Exercises ==== 
 + 
 +In an RSA code, **p=11, q=31, e=7, d=103**. Encrypt the message **252** with the private key! 
 + 
 +In an RSA code, **p=11, q=29, e=3, d=187**. After encoding with the public key, we receive the message **81**. What was the original message?
  
-<fc #ff0000>W.I.P.</fc> 
tanszek/oktatas/techcomm/encoding_techniques.1725892368.txt.gz · Last modified: 2024/09/09 14:32 by kissa