SlideShare a Scribd company logo
1 of 8
APPLICATIONS OF
ENCODER’S,DECODER’S
1.DATA PRIVACY & SECURITY
 Secure layer of communication over the web such
as SSL which is used in secure websites (HTTPS)
you daily browse, VPN services to access office
network securely etc.
 Encrypting files, hard drive and PDF password
encryption are few examples of it.
2. DATA COMMUNICATION
 Converting data into digital bits so that our electrical
and wireless media could represent it via high and
low signals, example : modems used to connect
internet.
 Modulating data with a high carrier frequency to avoid
long distance signal degradation, examples : all
forms of wireless communication like Wi-fi , FM
radio, cellular phone services etc.
3. DATA COMPRESSION
 Music, Video/Photos capturing/recording, playing or
even streaming over the internet would not have
been possible without compressing it into
manageable size. Here we use compression
techniques like mpeg4, mp3, jpeg etc.
 We daily save our hard disk memory space
by RARING and ZIPING our large chunks of data.
4.DATA SCAN
 In some cases we may need to quickly grab the data
from something instead of reading and manually
inserting into the computer, such as in a retails store
at the checkout to generate bill. For obvious reasons
we would want to utilize the computing power of our
smart phones and computers to store and manage
the data. To name a few, we use barcode and QR
codes very frequently nowadays.
5.MAKE DATA HUMAN READABLE
** Humans use different languages to read and write
which requires a lot of character types hence the
need to character encoding standards
like ASCII and UTF, we also see a lot of emojis
nowadays, which are extensions of these encodings.
Applications of Encoders and Decoders .

More Related Content

What's hot

What's hot (20)

Multipliers in VLSI
Multipliers in VLSIMultipliers in VLSI
Multipliers in VLSI
 
K map
K mapK map
K map
 
Digital Communication: Information Theory
Digital Communication: Information TheoryDigital Communication: Information Theory
Digital Communication: Information Theory
 
Step to program in tasm
Step to program in tasmStep to program in tasm
Step to program in tasm
 
Combinational Circuits & Sequential Circuits
Combinational Circuits & Sequential CircuitsCombinational Circuits & Sequential Circuits
Combinational Circuits & Sequential Circuits
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
 
FPGA
FPGAFPGA
FPGA
 
Digital Modulation Techniques ppt
Digital Modulation Techniques pptDigital Modulation Techniques ppt
Digital Modulation Techniques ppt
 
Signal modelling
Signal modellingSignal modelling
Signal modelling
 
decoder and encoder
 decoder and encoder decoder and encoder
decoder and encoder
 
8085 arithmetic instructions
8085 arithmetic instructions8085 arithmetic instructions
8085 arithmetic instructions
 
Latch and flip flop
Latch and flip flopLatch and flip flop
Latch and flip flop
 
Arithmetic circuits
Arithmetic circuitsArithmetic circuits
Arithmetic circuits
 
Design of CMOS operational Amplifiers using CADENCE
Design of CMOS operational Amplifiers using CADENCEDesign of CMOS operational Amplifiers using CADENCE
Design of CMOS operational Amplifiers using CADENCE
 
A report on 2 to 1 mux using tg
A report on 2 to 1 mux using tgA report on 2 to 1 mux using tg
A report on 2 to 1 mux using tg
 
VHDL- gate level modelling
VHDL- gate level modellingVHDL- gate level modelling
VHDL- gate level modelling
 
Periodic vs. aperiodic signal
Periodic vs. aperiodic signalPeriodic vs. aperiodic signal
Periodic vs. aperiodic signal
 
Logic simplification sop and pos forms
Logic simplification sop and pos formsLogic simplification sop and pos forms
Logic simplification sop and pos forms
 
Digital electronics
Digital electronicsDigital electronics
Digital electronics
 
Shifters
ShiftersShifters
Shifters
 

Similar to Applications of Encoders and Decoders .

Networking slides
Networking slidesNetworking slides
Networking slidesiarthur
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slidesiarthur
 
Networking slides
Networking slidesNetworking slides
Networking slidesiarthur
 
Data security and Data Transfer
Data security and Data Transfer Data security and Data Transfer
Data security and Data Transfer Rita Puerta
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
Unit 1-Digital devices.ppt
Unit 1-Digital devices.pptUnit 1-Digital devices.ppt
Unit 1-Digital devices.pptssuser86699a
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...PriyaU5
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
5 g presentation
5 g presentation5 g presentation
5 g presentationRameez Raja
 
5G The Vast Technology
5G The Vast Technology 5G The Vast Technology
5G The Vast Technology Gautam Angrish
 

Similar to Applications of Encoders and Decoders . (20)

Networking slides
Networking slidesNetworking slides
Networking slides
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slides
 
Networking slides
Networking slidesNetworking slides
Networking slides
 
Data security
Data securityData security
Data security
 
Data security and Data Transfer
Data security and Data Transfer Data security and Data Transfer
Data security and Data Transfer
 
5G
5G 5G
5G
 
Raza hassan
Raza hassanRaza hassan
Raza hassan
 
Dart Key ENG
Dart Key ENGDart Key ENG
Dart Key ENG
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Unit 1-Digital devices.ppt
Unit 1-Digital devices.pptUnit 1-Digital devices.ppt
Unit 1-Digital devices.ppt
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
3 g and 4g 3g techologies
3 g and 4g 3g techologies3 g and 4g 3g techologies
3 g and 4g 3g techologies
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
WIRELESS SYSTEMS 4G
WIRELESS SYSTEMS 4GWIRELESS SYSTEMS 4G
WIRELESS SYSTEMS 4G
 
4g technology
4g technology4g technology
4g technology
 
5 g presentation
5 g presentation5 g presentation
5 g presentation
 
5G The Vast Technology
5G The Vast Technology 5G The Vast Technology
5G The Vast Technology
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Applications of Encoders and Decoders .

  • 2. 1.DATA PRIVACY & SECURITY  Secure layer of communication over the web such as SSL which is used in secure websites (HTTPS) you daily browse, VPN services to access office network securely etc.  Encrypting files, hard drive and PDF password encryption are few examples of it.
  • 3. 2. DATA COMMUNICATION  Converting data into digital bits so that our electrical and wireless media could represent it via high and low signals, example : modems used to connect internet.  Modulating data with a high carrier frequency to avoid long distance signal degradation, examples : all forms of wireless communication like Wi-fi , FM radio, cellular phone services etc.
  • 4. 3. DATA COMPRESSION  Music, Video/Photos capturing/recording, playing or even streaming over the internet would not have been possible without compressing it into manageable size. Here we use compression techniques like mpeg4, mp3, jpeg etc.  We daily save our hard disk memory space by RARING and ZIPING our large chunks of data.
  • 5.
  • 6. 4.DATA SCAN  In some cases we may need to quickly grab the data from something instead of reading and manually inserting into the computer, such as in a retails store at the checkout to generate bill. For obvious reasons we would want to utilize the computing power of our smart phones and computers to store and manage the data. To name a few, we use barcode and QR codes very frequently nowadays.
  • 7. 5.MAKE DATA HUMAN READABLE ** Humans use different languages to read and write which requires a lot of character types hence the need to character encoding standards like ASCII and UTF, we also see a lot of emojis nowadays, which are extensions of these encodings.