SlideShare a Scribd company logo
1 of 121
Download to read offline
INFORMATION THEORY AND
CODING
5th SEM E&C
JAYANTHDWIJESH H P M.tech (DECS)
Assistant Professor โ€“ Dept of E&C
B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T)
B.G Nagara, Nagamangala Tq, Mandya District- 571448
FORMULAS FOR REFERENCE
MODULE โ€“ 2 (source coding)
๏ถ Entropy of source or Average information content of the source.
H(S) = ๐‘ท๐’Š ๐ฅ๐จ๐ (
๐Ÿ
๐‘ท ๐’Š
๐’’
๐’Š=๐Ÿ ) bits/symbol or H(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ ๐Ÿ (
๐Ÿ
๐‘ท ๐‘ฒ
๐‘ต
๐‘ฒ=๐Ÿ ) bits/symbol
๏ถ Average length
L = ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ๐’๐’Š bits/symbol or L = ๐‘ท๐’Š
๐‘ต
๐’Š=๐Ÿ ๐’๐’Š bits/symbol
๏ถ Source or code efficiency
๐œผ ๐‘บ=
๐‘ฏ(๐‘บ)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช=
๐‘ฏ(๐‘บ)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code redundancy
๐‘น ๐œผ ๐‘บ
= 1- ๐œผ ๐‘บ = (1 -
๐‘ฏ(๐‘บ)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช
= 1- ๐œผ ๐‘ช = (1 -
๐‘ฏ(๐‘บ)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Compute the number of stages required for the encoding operation, which is
given by
๐’ =
๐‘ตโˆ’๐’“
๐’“โˆ’๐Ÿ
or ๏ก =
๐’’โˆ’๐’“
๐’“โˆ’๐Ÿ
๏ถ The probability of โ€œ0โ€s and โ€œ1โ€s and โ€œ2โ€ s in the code are found using the
formulas
P (0) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "0" s in the code for
๐’’
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or
P (0) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "0" s in the code for๐‘ต
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] .
P (1) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "1" s in the code for
๐’’
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or
P (1) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "1" s in the code for๐‘ต
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] .
P (2) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "2" s in the code for
๐’’
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or
P (2) =
๐Ÿ
๐‘ณ
[๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "2" s in the code for๐‘ต
๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] .
๏ถ The variance of the word length is calculated from
Var ( ๐’๐’Š ) = E [( ๐’๐’Š โˆ’ ๐‹ ) ๐Ÿ
= ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ( ๐’๐’Š โˆ’ ๐‹ ) ๐Ÿ
๏ถ The Smallest integer value of ๐’๐’Š if found using
๐Ÿ ๐’ ๐’Š ๏‚ณ
๐Ÿ
๐‘ท๐’Š
or ๐’๐’Š ๏‚ณ ๐’๐’๐’ˆ ๐Ÿ
๐Ÿ
๐‘ท๐’Š
๏ถ The average length ๐‘ณ ๐Ÿ of the 2nd
extension is given by
๐‘ณ ๐Ÿ = ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ๐’๐’Š bits/symbol or ๐‘ณ ๐Ÿ = ๐‘ท๐’Š
๐‘ต
๐’Š=๐Ÿ ๐’๐’Š bits/symbol
๏ถ The average length ๐‘ณ ๐Ÿ‘ of the 3rd
extension is given by
๐‘ณ ๐Ÿ‘ = ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ๐’๐’Š bits/symbol or ๐‘ณ ๐Ÿ‘ = ๐‘ท๐’Š
๐‘ต
๐’Š=๐Ÿ ๐’๐’Š bits/symbol
๏ถ The entropy of the 2nd extended
source is calculated as
H (๐‘บ ๐Ÿ
) = 2 H(S)
๏ถ The entropy of the 3rd extended
source is calculated as
H (๐‘บ ๐Ÿ‘
) = 3H(S)
๏ถ Source or code efficiency of the 2nd
extended source is
๐œผ(๐Ÿ)
๐‘บ
=
๐‡ (๐‘บ ๐Ÿ
)
๐‘ณ ๐Ÿ
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ(๐Ÿ)
๐‘ช
=
๐‡ (๐‘บ ๐Ÿ
)
๐‘ณ ๐Ÿ
X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code redundancy of the 2nd
extended source is
๐‘น(๐Ÿ)
๐œผ ๐‘บ
= 1- ๐œผ(๐Ÿ)
๐‘บ
= (1 -
๐‡ (๐‘บ ๐Ÿ)
๐‘ณ ๐Ÿ
) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น(๐Ÿ)
๐œผ ๐‘ช
= ๐Ÿ โˆ’ ๐œผ(๐Ÿ)
๐‘ช
= (1 -
๐‡ (๐‘บ ๐Ÿ)
๐‘ณ ๐Ÿ
)
๐— ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code efficiency of the 3rd
extended source is
๐œผ(๐Ÿ‘)
๐‘บ
=
๐‡ (๐‘บ ๐Ÿ‘
)
๐‘ณ ๐Ÿ‘
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ(๐Ÿ‘)
๐‘ช
=
๐‡ (๐‘บ ๐Ÿ‘
)
๐Ÿ‘
X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code redundancy of the 3rd
extended source is
๐‘น(๐Ÿ‘)
๐œผ ๐‘บ
= 1- ๐œผ(๐Ÿ‘)
๐‘บ
= (1 -
๐‡ (๐‘บ ๐Ÿ‘)
๐‘ณ ๐Ÿ
) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น(๐Ÿ‘)
๐œผ ๐‘ช
= ๐Ÿ โˆ’ ๐œผ(๐Ÿ‘)
๐‘ช
= (1 -
๐‡ (๐‘บ ๐Ÿ‘)
๐‘ณ ๐Ÿ‘
)
๐— ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ The average length ๐‘ณ ๐Ÿ‘
of the Huffman ternary code is given by
๐‘ณ(๐Ÿ‘)
= ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ๐’๐’Š trinits /Msg- symbol or ๐‘ณ(๐Ÿ‘)
= ๐‘ท๐’Š
๐‘ต
๐’Š=๐Ÿ ๐’๐’Š trinits / Msg- symbol
๏ถ The average length ๐‘ณ ๐Ÿ’
of the Huffman quaternary code is given by
๐‘ณ(๐Ÿ’)
= ๐‘ท๐’Š
๐’’
๐’Š=๐Ÿ ๐’๐’Š quaternary digits /Msg- symbol or
๐‘ณ(๐Ÿ’)
= ๐‘ท๐’Š
๐‘ต
๐’Š=๐Ÿ ๐’๐’Š quaternary digits / Msg- symbol
๏ถ The entropy in ternary units/ message symbol is found by using equation
๐‡ ๐Ÿ‘(S) =
๐‡(๐’)
๐’๐’๐’ˆ ๐Ÿ ๐Ÿ‘
ternary units/ message symbol or
๐‡ ๐Ÿ‘(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ‘ ๐Ÿ (
๐Ÿ
๐‘ท ๐‘ฒ
๐‘ต
๐‘ฒ=๐Ÿ ) ternary units/ message symbol or
๐‡ ๐Ÿ‘(S) = ๐‘ท๐’Š ๐ฅ๐จ๐  ๐Ÿ‘ ๐Ÿ (
๐Ÿ
๐‘ท ๐’Š
๐’’
๐’Š=๐Ÿ ) ternary units/ message symbol
๏ถ The entropy in quaternary units/ message symbol is found by using equation
๐‡ ๐Ÿ’(S) =
๐‡(๐’)
๐’๐’๐’ˆ ๐Ÿ ๐Ÿ’
quaternary units/ message symbol or
๐‡ ๐Ÿ’(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ’ ๐Ÿ (
๐Ÿ
๐‘ท ๐‘ฒ
๐‘ต
๐‘ฒ=๐Ÿ ) quaternary units/ message symbol or
๐‡ ๐Ÿ’(S) = ๐‘ท๐’Š ๐ฅ๐จ๐  ๐Ÿ’ ๐Ÿ (
๐Ÿ
๐‘ท ๐’Š
๐’’
๐’Š=๐Ÿ ) quaternary units/ message symbol
๏ถ Source or code efficiency of the ternary is given by
๐œผ ๐’”(๐Ÿ‘)
=
๐‡ ๐Ÿ‘(๐’)
๐‘ณ(๐Ÿ‘)
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐’„(๐Ÿ‘)
=
๐‡ ๐Ÿ‘(๐’)
๐‘ณ(๐Ÿ‘)
X ๐Ÿ๐ŸŽ๐ŸŽ% or
๐œผ ๐‘บ=
๐‡ ๐Ÿ‘(๐’)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช=
๐‡ ๐Ÿ‘(๐’)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code efficiency of the quaternary is given by
๐œผ ๐’”(๐Ÿ’)
=
๐‡ ๐Ÿ’(๐’)
๐‘ณ(๐Ÿ’)
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐’„(๐Ÿ’)
=
๐‡ ๐Ÿ’(๐’)
๐‘ณ(๐Ÿ’)
X ๐Ÿ๐ŸŽ๐ŸŽ% or
๐œผ ๐‘บ=
๐‡ ๐Ÿ’(๐’)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช=
๐‡ ๐Ÿ’(๐’)
๐‘ณ
X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code redundancy of the ternary is given by
๐‘น ๐œผ ๐’”(๐Ÿ‘)
= 1- ๐œผ ๐’”(๐Ÿ‘)
= (1 -
๐‡ ๐Ÿ‘(๐’)
๐‘ณ(๐Ÿ‘) ) X ๐Ÿ๐ŸŽ๐ŸŽ% or
๐‘น ๐œผ ๐’„(๐Ÿ‘)
= ๐Ÿ โˆ’ ๐œผ ๐’„(๐Ÿ‘)
= (1 -
๐‡ ๐Ÿ‘(๐’)
๐‘ณ(๐Ÿ‘) ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% or
๐‘น ๐œผ ๐‘บ
= 1- ๐œผ ๐‘บ = (1 -
๐‡ ๐Ÿ‘(๐’)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช
= 1- ๐œผ ๐‘ช = (1 -
๐‡ ๐Ÿ‘(๐’)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ%
๏ถ Source or code redundancy of the quaternary is given by
๐‘น ๐œผ ๐’”(๐Ÿ’)
= 1- ๐œผ ๐’”(๐Ÿ’)
= (1 -
๐‡ ๐Ÿ’(๐’)
๐‘ณ(๐Ÿ’) ) X ๐Ÿ๐ŸŽ๐ŸŽ% or
๐‘น ๐œผ ๐’„(๐Ÿ’)
= ๐Ÿ โˆ’ ๐œผ ๐’„(๐Ÿ’)
= (1 -
๐‡ ๐Ÿ’(๐’)
๐‘ณ(๐Ÿ’) ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% or
๐‘น ๐œผ ๐‘บ
= 1- ๐œผ ๐‘บ = (1 -
๐‡ ๐Ÿ’(๐’)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช
= 1- ๐œผ ๐‘ช = (1 -
๐‡ ๐Ÿ’(๐’)
๐‘ณ
) X ๐Ÿ๐ŸŽ๐ŸŽ%
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas
Information Theory and Coding Formulas

More Related Content

What's hot

Single pass assembler
Single pass assemblerSingle pass assembler
Single pass assemblerBansari Shah
ย 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
ย 
Dcs unit 2
Dcs unit 2Dcs unit 2
Dcs unit 2Anil Nigam
ย 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compressionanithabalaprabhu
ย 
Language processors
Language processorsLanguage processors
Language processorsGanesh Wedpathak
ย 
information theory
information theoryinformation theory
information theoryDr Naim R Kidwai
ย 
Toy compiler
Toy compilerToy compiler
Toy compilerhome
ย 
Fundamentals of Language Processing
Fundamentals of Language ProcessingFundamentals of Language Processing
Fundamentals of Language ProcessingHemant Sharma
ย 
image compression ppt
image compression pptimage compression ppt
image compression pptShivangi Saxena
ย 
Cohen and Sutherland Algorithm for 7-8 marks
Cohen and Sutherland Algorithm for 7-8 marksCohen and Sutherland Algorithm for 7-8 marks
Cohen and Sutherland Algorithm for 7-8 marksRehan Khan
ย 
Point processing
Point processingPoint processing
Point processingpanupriyaa7
ย 
4.intensity transformations
4.intensity transformations4.intensity transformations
4.intensity transformationsYahya Alkhaldi
ย 
Fpga implementation of multilayer feed forward neural network architecture us...
Fpga implementation of multilayer feed forward neural network architecture us...Fpga implementation of multilayer feed forward neural network architecture us...
Fpga implementation of multilayer feed forward neural network architecture us...Ece Rljit
ย 
Galois field
Galois fieldGalois field
Galois fieldNiaj Morshed
ย 

What's hot (20)

Toy complier
Toy complierToy complier
Toy complier
ย 
Pass Structure of Assembler
Pass Structure of AssemblerPass Structure of Assembler
Pass Structure of Assembler
ย 
Single pass assembler
Single pass assemblerSingle pass assembler
Single pass assembler
ย 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
ย 
Information theory
Information theoryInformation theory
Information theory
ย 
Dcs unit 2
Dcs unit 2Dcs unit 2
Dcs unit 2
ย 
Information theory
Information theoryInformation theory
Information theory
ย 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
ย 
Language processors
Language processorsLanguage processors
Language processors
ย 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
ย 
information theory
information theoryinformation theory
information theory
ย 
Toy compiler
Toy compilerToy compiler
Toy compiler
ย 
Fundamentals of Language Processing
Fundamentals of Language ProcessingFundamentals of Language Processing
Fundamentals of Language Processing
ย 
image compression ppt
image compression pptimage compression ppt
image compression ppt
ย 
Cohen and Sutherland Algorithm for 7-8 marks
Cohen and Sutherland Algorithm for 7-8 marksCohen and Sutherland Algorithm for 7-8 marks
Cohen and Sutherland Algorithm for 7-8 marks
ย 
Point processing
Point processingPoint processing
Point processing
ย 
Two pass Assembler
Two pass AssemblerTwo pass Assembler
Two pass Assembler
ย 
4.intensity transformations
4.intensity transformations4.intensity transformations
4.intensity transformations
ย 
Fpga implementation of multilayer feed forward neural network architecture us...
Fpga implementation of multilayer feed forward neural network architecture us...Fpga implementation of multilayer feed forward neural network architecture us...
Fpga implementation of multilayer feed forward neural network architecture us...
ย 
Galois field
Galois fieldGalois field
Galois field
ย 

Similar to Information Theory and Coding Formulas

VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...
VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...
VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...Jayanth Dwijesh H P
ย 
Signals and systems-5
Signals and systems-5Signals and systems-5
Signals and systems-5sarun soman
ย 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmeSAT Journals
ย 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmeSAT Publishing House
ย 
Numerical differentiation and integration
Numerical differentiation and integrationNumerical differentiation and integration
Numerical differentiation and integrationBektu Dida
ย 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.pptMsRAMYACSE
ย 
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...CSCJournals
ย 
6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptxDipakMahurkar1
ย 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Ryutaroh Matsumoto
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMmathsjournal
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMmathsjournal
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMmathsjournal
ย 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Cemal Ardil
ย 
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...IJERA Editor
ย 
Monotone likelihood ratio test
Monotone likelihood ratio testMonotone likelihood ratio test
Monotone likelihood ratio testSohel rana
ย 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierCSCJournals
ย 
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdfsignals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdfislamsharawneh
ย 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
ย 

Similar to Information Theory and Coding Formulas (20)

VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...
VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...
VTU E&C,TCE CBCS[NEW]5th Sem Information Theory and Coding Module-3 notes(15&...
ย 
Signals and systems-5
Signals and systems-5Signals and systems-5
Signals and systems-5
ย 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
ย 
Direction of arrival estimation using music algorithm
Direction of arrival estimation using music algorithmDirection of arrival estimation using music algorithm
Direction of arrival estimation using music algorithm
ย 
Numerical differentiation and integration
Numerical differentiation and integrationNumerical differentiation and integration
Numerical differentiation and integration
ย 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.ppt
ย 
unit 4.ppt
unit 4.pptunit 4.ppt
unit 4.ppt
ย 
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ECG Classification using Dynamic High Pass Filtering and Statistical Framewor...
ย 
6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx6.1-Information Sources and Entropy.pptx
6.1-Information Sources and Entropy.pptx
ย 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
ย 
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORMNEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
NEW METHOD OF SIGNAL DENOISING BY THE PAIRED TRANSFORM
ย 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
ย 
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
Closed-Form Performance Analysis of Dual Polarization Based MIMO System in Sh...
ย 
Monotone likelihood ratio test
Monotone likelihood ratio testMonotone likelihood ratio test
Monotone likelihood ratio test
ย 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target Classifier
ย 
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdfsignals and systems chapter3-part3_signals and systems chapter3-part3.pdf
signals and systems chapter3-part3_signals and systems chapter3-part3.pdf
ย 
Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...
ย 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
ย 

More from Jayanth Dwijesh H P

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
ย 
VTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesVTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesJayanth Dwijesh H P
ย 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
ย 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...Jayanth Dwijesh H P
ย 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
ย 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
ย 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
ย 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
ย 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
ย 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notesJayanth Dwijesh H P
ย 

More from Jayanth Dwijesh H P (10)

Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
ย 
VTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesVTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notes
ย 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
ย 
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-4 notes(15...
ย 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
ย 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
ย 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
ย 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
ย 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
ย 
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notesVTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
VTU CBCS E&C 5th sem Information theory and coding(15EC54) Module -2notes
ย 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
ย 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort servicejennyeacort
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
ย 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
ย 
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)dollysharma2066
ย 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
ย 

Recently uploaded (20)

young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ย 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
ย 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
ย 
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Serviceyoung call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
ย 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
ย 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
ย 
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)
Call Us โ‰ฝ 8377877756 โ‰ผ Call Girls In Shastri Nagar (Delhi)
ย 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
ย 

Information Theory and Coding Formulas

  • 1. INFORMATION THEORY AND CODING 5th SEM E&C JAYANTHDWIJESH H P M.tech (DECS) Assistant Professor โ€“ Dept of E&C B.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T) B.G Nagara, Nagamangala Tq, Mandya District- 571448
  • 2. FORMULAS FOR REFERENCE MODULE โ€“ 2 (source coding) ๏ถ Entropy of source or Average information content of the source. H(S) = ๐‘ท๐’Š ๐ฅ๐จ๐ ( ๐Ÿ ๐‘ท ๐’Š ๐’’ ๐’Š=๐Ÿ ) bits/symbol or H(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ ๐Ÿ ( ๐Ÿ ๐‘ท ๐‘ฒ ๐‘ต ๐‘ฒ=๐Ÿ ) bits/symbol ๏ถ Average length L = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ๐’๐’Š bits/symbol or L = ๐‘ท๐’Š ๐‘ต ๐’Š=๐Ÿ ๐’๐’Š bits/symbol ๏ถ Source or code efficiency ๐œผ ๐‘บ= ๐‘ฏ(๐‘บ) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช= ๐‘ฏ(๐‘บ) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code redundancy ๐‘น ๐œผ ๐‘บ = 1- ๐œผ ๐‘บ = (1 - ๐‘ฏ(๐‘บ) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช = 1- ๐œผ ๐‘ช = (1 - ๐‘ฏ(๐‘บ) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Compute the number of stages required for the encoding operation, which is given by ๐’ = ๐‘ตโˆ’๐’“ ๐’“โˆ’๐Ÿ or ๏ก = ๐’’โˆ’๐’“ ๐’“โˆ’๐Ÿ ๏ถ The probability of โ€œ0โ€s and โ€œ1โ€s and โ€œ2โ€ s in the code are found using the formulas P (0) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "0" s in the code for ๐’’ ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or P (0) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "0" s in the code for๐‘ต ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] . P (1) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "1" s in the code for ๐’’ ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or P (1) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "1" s in the code for๐‘ต ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] . P (2) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "2" s in the code for ๐’’ ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] or P (2) = ๐Ÿ ๐‘ณ [๐๐ฎ๐ฆ๐›๐ž๐ซ ๐จ๐Ÿ "2" s in the code for๐‘ต ๐’Š=๐Ÿ ๐‘ฟ๐’Š ] [๐’‘๐’Š ] . ๏ถ The variance of the word length is calculated from Var ( ๐’๐’Š ) = E [( ๐’๐’Š โˆ’ ๐‹ ) ๐Ÿ = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ( ๐’๐’Š โˆ’ ๐‹ ) ๐Ÿ ๏ถ The Smallest integer value of ๐’๐’Š if found using ๐Ÿ ๐’ ๐’Š ๏‚ณ ๐Ÿ ๐‘ท๐’Š or ๐’๐’Š ๏‚ณ ๐’๐’๐’ˆ ๐Ÿ ๐Ÿ ๐‘ท๐’Š ๏ถ The average length ๐‘ณ ๐Ÿ of the 2nd extension is given by ๐‘ณ ๐Ÿ = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ๐’๐’Š bits/symbol or ๐‘ณ ๐Ÿ = ๐‘ท๐’Š ๐‘ต ๐’Š=๐Ÿ ๐’๐’Š bits/symbol
  • 3. ๏ถ The average length ๐‘ณ ๐Ÿ‘ of the 3rd extension is given by ๐‘ณ ๐Ÿ‘ = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ๐’๐’Š bits/symbol or ๐‘ณ ๐Ÿ‘ = ๐‘ท๐’Š ๐‘ต ๐’Š=๐Ÿ ๐’๐’Š bits/symbol ๏ถ The entropy of the 2nd extended source is calculated as H (๐‘บ ๐Ÿ ) = 2 H(S) ๏ถ The entropy of the 3rd extended source is calculated as H (๐‘บ ๐Ÿ‘ ) = 3H(S) ๏ถ Source or code efficiency of the 2nd extended source is ๐œผ(๐Ÿ) ๐‘บ = ๐‡ (๐‘บ ๐Ÿ ) ๐‘ณ ๐Ÿ X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ(๐Ÿ) ๐‘ช = ๐‡ (๐‘บ ๐Ÿ ) ๐‘ณ ๐Ÿ X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code redundancy of the 2nd extended source is ๐‘น(๐Ÿ) ๐œผ ๐‘บ = 1- ๐œผ(๐Ÿ) ๐‘บ = (1 - ๐‡ (๐‘บ ๐Ÿ) ๐‘ณ ๐Ÿ ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น(๐Ÿ) ๐œผ ๐‘ช = ๐Ÿ โˆ’ ๐œผ(๐Ÿ) ๐‘ช = (1 - ๐‡ (๐‘บ ๐Ÿ) ๐‘ณ ๐Ÿ ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code efficiency of the 3rd extended source is ๐œผ(๐Ÿ‘) ๐‘บ = ๐‡ (๐‘บ ๐Ÿ‘ ) ๐‘ณ ๐Ÿ‘ X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ(๐Ÿ‘) ๐‘ช = ๐‡ (๐‘บ ๐Ÿ‘ ) ๐Ÿ‘ X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code redundancy of the 3rd extended source is ๐‘น(๐Ÿ‘) ๐œผ ๐‘บ = 1- ๐œผ(๐Ÿ‘) ๐‘บ = (1 - ๐‡ (๐‘บ ๐Ÿ‘) ๐‘ณ ๐Ÿ ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น(๐Ÿ‘) ๐œผ ๐‘ช = ๐Ÿ โˆ’ ๐œผ(๐Ÿ‘) ๐‘ช = (1 - ๐‡ (๐‘บ ๐Ÿ‘) ๐‘ณ ๐Ÿ‘ ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ The average length ๐‘ณ ๐Ÿ‘ of the Huffman ternary code is given by ๐‘ณ(๐Ÿ‘) = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ๐’๐’Š trinits /Msg- symbol or ๐‘ณ(๐Ÿ‘) = ๐‘ท๐’Š ๐‘ต ๐’Š=๐Ÿ ๐’๐’Š trinits / Msg- symbol ๏ถ The average length ๐‘ณ ๐Ÿ’ of the Huffman quaternary code is given by ๐‘ณ(๐Ÿ’) = ๐‘ท๐’Š ๐’’ ๐’Š=๐Ÿ ๐’๐’Š quaternary digits /Msg- symbol or ๐‘ณ(๐Ÿ’) = ๐‘ท๐’Š ๐‘ต ๐’Š=๐Ÿ ๐’๐’Š quaternary digits / Msg- symbol ๏ถ The entropy in ternary units/ message symbol is found by using equation ๐‡ ๐Ÿ‘(S) = ๐‡(๐’) ๐’๐’๐’ˆ ๐Ÿ ๐Ÿ‘ ternary units/ message symbol or ๐‡ ๐Ÿ‘(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ‘ ๐Ÿ ( ๐Ÿ ๐‘ท ๐‘ฒ ๐‘ต ๐‘ฒ=๐Ÿ ) ternary units/ message symbol or ๐‡ ๐Ÿ‘(S) = ๐‘ท๐’Š ๐ฅ๐จ๐  ๐Ÿ‘ ๐Ÿ ( ๐Ÿ ๐‘ท ๐’Š ๐’’ ๐’Š=๐Ÿ ) ternary units/ message symbol ๏ถ The entropy in quaternary units/ message symbol is found by using equation ๐‡ ๐Ÿ’(S) = ๐‡(๐’) ๐’๐’๐’ˆ ๐Ÿ ๐Ÿ’ quaternary units/ message symbol or
  • 4. ๐‡ ๐Ÿ’(S) = ๐‘ท ๐‘ฒ ๐ฅ๐จ๐  ๐Ÿ’ ๐Ÿ ( ๐Ÿ ๐‘ท ๐‘ฒ ๐‘ต ๐‘ฒ=๐Ÿ ) quaternary units/ message symbol or ๐‡ ๐Ÿ’(S) = ๐‘ท๐’Š ๐ฅ๐จ๐  ๐Ÿ’ ๐Ÿ ( ๐Ÿ ๐‘ท ๐’Š ๐’’ ๐’Š=๐Ÿ ) quaternary units/ message symbol ๏ถ Source or code efficiency of the ternary is given by ๐œผ ๐’”(๐Ÿ‘) = ๐‡ ๐Ÿ‘(๐’) ๐‘ณ(๐Ÿ‘) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐’„(๐Ÿ‘) = ๐‡ ๐Ÿ‘(๐’) ๐‘ณ(๐Ÿ‘) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘บ= ๐‡ ๐Ÿ‘(๐’) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช= ๐‡ ๐Ÿ‘(๐’) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code efficiency of the quaternary is given by ๐œผ ๐’”(๐Ÿ’) = ๐‡ ๐Ÿ’(๐’) ๐‘ณ(๐Ÿ’) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐’„(๐Ÿ’) = ๐‡ ๐Ÿ’(๐’) ๐‘ณ(๐Ÿ’) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘บ= ๐‡ ๐Ÿ’(๐’) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐œผ ๐‘ช= ๐‡ ๐Ÿ’(๐’) ๐‘ณ X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code redundancy of the ternary is given by ๐‘น ๐œผ ๐’”(๐Ÿ‘) = 1- ๐œผ ๐’”(๐Ÿ‘) = (1 - ๐‡ ๐Ÿ‘(๐’) ๐‘ณ(๐Ÿ‘) ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐’„(๐Ÿ‘) = ๐Ÿ โˆ’ ๐œผ ๐’„(๐Ÿ‘) = (1 - ๐‡ ๐Ÿ‘(๐’) ๐‘ณ(๐Ÿ‘) ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘บ = 1- ๐œผ ๐‘บ = (1 - ๐‡ ๐Ÿ‘(๐’) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช = 1- ๐œผ ๐‘ช = (1 - ๐‡ ๐Ÿ‘(๐’) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ% ๏ถ Source or code redundancy of the quaternary is given by ๐‘น ๐œผ ๐’”(๐Ÿ’) = 1- ๐œผ ๐’”(๐Ÿ’) = (1 - ๐‡ ๐Ÿ’(๐’) ๐‘ณ(๐Ÿ’) ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐’„(๐Ÿ’) = ๐Ÿ โˆ’ ๐œผ ๐’„(๐Ÿ’) = (1 - ๐‡ ๐Ÿ’(๐’) ๐‘ณ(๐Ÿ’) ) ๐— ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘บ = 1- ๐œผ ๐‘บ = (1 - ๐‡ ๐Ÿ’(๐’) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ% or ๐‘น ๐œผ ๐‘ช = 1- ๐œผ ๐‘ช = (1 - ๐‡ ๐Ÿ’(๐’) ๐‘ณ ) X ๐Ÿ๐ŸŽ๐ŸŽ%