Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

1) Describe the importance of entropy H(X/Y) of a communication system where X is the transmitter and Y is the receiver.

2) An event has six possible outcomes with probabilities 1/2.1/4,1/8,1/16,1/32,1/32. Determine the entropy of the system.

3) describe Source coding theorem, prepare down the advantage and disadvantage of channel coding in detail, and describe the data compaction in detail.

4) Describe the properties of entropy and with appropriate ex; describe the entropy of binary memory less source in detail.

5) Five symbols of alphabet of discrete memory less source and their probabilities are given below. S=[S0,S1,S2,S3]; P[S]=[.4,.2,.2,.1,.1]. Encode symbols by using Huffman coding.

6) prepare brief notes on Differential entropy, derive channel capacity theorem and describe the implications of information capacity theorem.

7) What do you understand by binary symmetric channel? Derive channel capacity formula for symmetric channel.

8) Construct binary optical code for following probability symbols using Huffman procedure and compute entropy of source, average code Length, efficiency, redundancy and variance? 0.2, 0.18, 0.12, 0.1, 0.1, 0.08, 0.06, 0.06, 0.06, 0.04

9) Mention and prove continuous channel capacity theorem.

10) Encode following source by using Shannon-Fano and Huffman coding procedures. Compare the results.

X       X1  X2  X3   X4     X5

P(X)  0.3  0.1 0.4  0.08  0.12

11)a) By using Shannon-Fano coding encode following source:

X      X1   X2  X3      X4     X5    X6    X7

P(X) 0.4  0.2  0.12  0.08  0.08  0.08  0.04

(b) Describe in detail Huffman coding algorithm and compare this with other kinds of coding.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M910991

Have any Question? 


Related Questions in Electrical & Electronics

1 discuss briefly the application of gauss law for the

1. Discuss briefly the application of Gauss' law for the electric field to determine the electric field due to charge distributions. 2. State Gauss' law for the magnetic field. How is it derived from Faraday's law? 3. Wh ...

A hertzian dipole is situated parallel to a corner

A Hertzian dipole is situated parallel to a corner reflector, which is an arrangement of two plane, perfect conductors at right angles to each other, as shown by the crosssectional view in Figure 9.19. (a) Locate the ima ...

1 distinguish between voltage as applied to time-varying

1. Distinguish between voltage, as applied to time-varying fields, and potential difference. 2. What is a conservative field? Give two examples of conservative fields. 3. Describe the equipotential surfaces for a point c ...

Another method used in a ciphertext attack see previous

Another method used in a ciphertext attack (see previous problem) is called the statistical approach, in which the intruder intercepts a long ciphertext and tries to analyze the statistics of the characters in the cipher ...

Does the velocity distribution in example satisfy

Does the velocity distribution in Example satisfy continuity? Example A rotating shaft, as illustrated in Figure, causes the fluid to move in circular streamlines with a velocity that is inversely proportional to the dis ...

Write the expression for the vector distance of a point in

Write the expression for the vector distance of a point in a rectangular room from one corner of the room, choosing the three edges meeting at that point as the coordinate axes. Describe the vector distance field associa ...

In rsa given p 107 q 113 e 13 and d 3653 encrypt the

In RSA, given p = 107, q = 113, e = 13, and d = 3653, encrypt the message "THIS IS TOUGH" using 00 to 26 (A: 00 and space: 26) as the encoding scheme. Decrypt the ciphertext to find the original message.

Using the definition compute the bilateral laplace

Using the definition, compute the bilateral Laplace transform, including the region of convergence (ROC), of the following complexvalued functions:

1 assume alice needs to send an e-mail to bob explain how

1. Assume Alice needs to send an e-mail to Bob. Explain how the confidentiality of the e-mail is achieved using PGP. 2. Assume Alice needs to send an e-mail to Bob. Explain how the integrity of the e-mail is achieved usi ...

1 discuss the duality between the radiation fields of a

1. Discuss the duality between the radiation fields of a small circular loop antenna with those of a Hertzian dipole at the center of the loop and aligned with its axis. 2. Compare the radiation resistance and directivit ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen