tanszek:oktatas:techcomm:encoding_techniques
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tanszek:oktatas:techcomm:encoding_techniques [2024/11/24 13:24] – [BCD] kissa | tanszek:oktatas:techcomm:encoding_techniques [2025/11/23 18:43] (current) – [Exercises] kissa | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== Encoding Techniques ===== | + | ====== Encoding Techniques |
| **Encoding techniques** are methods used to convert data into a specific format for efficient storage, transmission, | **Encoding techniques** are methods used to convert data into a specific format for efficient storage, transmission, | ||
| - | In addition to encoding, **encryption** is a crucial technique used to secure data by converting it into a coded format that is only decipherable with the appropriate key, ensuring privacy and protection against unauthorized access. | + | |
| - | ==== BCD ==== | + | /*In addition to encoding, **encryption** is a crucial technique used to secure data by converting it into a coded format that is only decipherable with the appropriate key, ensuring privacy and protection against unauthorized access.*/ |
| + | |||
| + | ===== BCD ===== | ||
| **BCD** (// | **BCD** (// | ||
| - | === Exercise | + | ==== Lecture Notes ==== |
| - | In a communication system, we want to transmit numbers from 40 to 119 using a fixed-length BCD code with parity checking. | + | * [[tanszek: |
| + | * [[tanszek: | ||
| + | |||
| + | ==== Exercises ==== | ||
| + | |||
| + | In a communication system, we want to transmit numbers from 40 to 119 using a fixed-length BCD code with parity checking | ||
| a) What will be the length of the encoded messages if each decimal digit is encoded with 4 bits in BCD encoding? | a) What will be the length of the encoded messages if each decimal digit is encoded with 4 bits in BCD encoding? | ||
| Line 17: | Line 24: | ||
| c) What will be the entropy and redundancy of this code if the occurrence of numbers in the range 40 $\leq$ n $\leq$ 69 is four times more frequent than the occurrence of numbers in the range 70 $\leq$ n $\leq$ 119? | c) What will be the entropy and redundancy of this code if the occurrence of numbers in the range 40 $\leq$ n $\leq$ 69 is four times more frequent than the occurrence of numbers in the range 70 $\leq$ n $\leq$ 119? | ||
| - | d) How many bits would the messages be if we used pure binary coding with parity checking? | + | d) How many bits would the messages be if we used pure fixed-length |
| - | ==== Huffman ==== | + | ===== Huffman |
| **Huffman** coding is a lossless data compression algorithm that assigns variable-length codes to input characters based on their frequencies: | **Huffman** coding is a lossless data compression algorithm that assigns variable-length codes to input characters based on their frequencies: | ||
| - | === Exercise | + | ==== Lecture Notes ==== |
| - | Explain | + | * [[tanszek: |
| - | Explain Huffman encoding by encoding the message **HELLO_WORLD_HELLO_EVERYONE**! | + | ==== Exercises ==== |
| - | ==== LZW ==== | + | a) Explain Huffman encoding by encoding the message **COMPRESSION_IS_COOL**! |
| + | |||
| + | b) Explain Huffman encoding by encoding the message **HELLO_WORLD_HELLO_EVERYONE**! | ||
| + | |||
| + | ===== LZW ===== | ||
| **LZW** (// | **LZW** (// | ||
| - | === Exercise === | ||
| - | 1.1. Explain LZW encoding by encoding the message **ABABABAB**! | + | ==== Lecture Notes and Videos ==== |
| + | |||
| + | * [[tanszek: | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | |||
| + | ==== Exercises ==== | ||
| + | |||
| + | a) Explain LZW encoding by encoding the message **ABABABAB**! | ||
| + | |||
| + | b) Decode the received message using only the initial dictionary! | ||
| + | |||
| + | |||
| + | c) Encode the message **ABRACADABRAABRACADABRA** with LZW coding! | ||
| - | 1.2. Decode the received message using only the initial dictionary! | + | d) Decode the received message using only the initial dictionary! |
| + | /* | ||
| - | 2.1. Encode the message | + | ===== RSA ===== |
| + | **RSA** (Rivest-Shamir-Adleman) is a widely used asymmetric cryptographic algorithm that secures data through a pair of public and private keys, enabling secure encryption and decryption. Its strength lies in the difficulty of factoring large prime numbers, providing robust protection for sensitive information. RSA is commonly applied in secure communication protocols, such as SSL/TLS for internet security, digital signatures, and email encryption. | ||
| - | 2.2. Decode the received message using only the initial dictionary! | + | ==== Lecture Notes ==== |
| - | ==== RSA ==== | + | |
| - | **RSA** (**// | + | |
| - | === Exercise | + | ==== Exercises ==== |
| In an RSA code, **p=11, q=31, e=7, d=103**. Encrypt the message **252** with the private key! | In an RSA code, **p=11, q=31, e=7, d=103**. Encrypt the message **252** with the private key! | ||
| Line 53: | Line 77: | ||
| In an RSA code, **p=11, q=29, e=3, d=187**. After encoding with the public key, we receive the message **81**. What was the original message? | In an RSA code, **p=11, q=29, e=3, d=187**. After encoding with the public key, we receive the message **81**. What was the original message? | ||
| + | */ | ||
tanszek/oktatas/techcomm/encoding_techniques.1732454643.txt.gz · Last modified: 2024/11/24 13:24 by kissa
