Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

1) Describe the importance of entropy H(X/Y) of a communication system where X is a transmitter and Y is a receiver.

2) The vent has six possible outcomes with probabilities 1/2.1/4,1/8,1/16,1/32,1/32. Determine the entropy of the system.

3) describe Source coding theorem in detail, prepare down the advantage and disadvantage of channel coding and describe the data compaction.

4) Describe the properties of entropy and with appropriate ex; describe the entropy of binary memory less source.

5) Five symbols of alphabet of discrete memory less source and their probabilities are given below. S=[S0,S1,S2,S3]; P[S]=[.4,.2,.2,.1,.1].Encode symbols by using Huffman coding.

6) prepare detailed notes on Differential entropy. Deduce the channel capacity theorem and describe the implications of information capacity theorem.

7) What do you understand by binary symmetric channel? Deduce channel capacity formula for symmetric channel.

8) Construct binary optical code for probability symbols given below by using Huffman procedure and compute entropy of source, average code Length, efficiency, redundancy and variance? 0.2, 0.18, 0.12, 0.1, 0.1, 0.08, 0.06, 0.06, 0.06, 0.04.

9) Specify and prove continuous channel capacity theorem.

10) Encode source given below by using Shannon-Fano and Huffman coding procedures. Compare the results.

X         X1   X2     X3    X4      X5

P(X)   0.3   0.1    0.4   0.08   0.12

11)a) Encode source given below byusing Shannon-Fano coding:

X       X1     X2    X3     X4     X5      X6      X7

P(X)  0.4   0.2   0.12  0.08  0.08  0.08   0.04

(b) Describe Huffman coding algorithm with suitable exand compare this with other types of coding in detail.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M911362

Have any Question? 


Related Questions in Electrical & Electronics

1 learning outcomesat the end of this project students will

1. Learning outcomes At the end of this project, students will be able to: 1) Analyze power system faults based on balance and unbalanced faults techniques. (PLO4-CTPS-C4) 2) Express power flow analysis using EMTP softwa ...

Approximate using a number of terms of your choice through

Approximate (using a number of terms of your choice) through the three forms of Fourier series expansion the periodic signal that is depicted in the following figure Each time, a. Plot the approximate signal in time of t ...

If the shock-wave velocity in problem is approximated by

If the shock-wave velocity in Problem is approximated by the speed of sound, determine the pressure change causing a velocity change of 10 fps in (a) air at standard conditions; (b) water. Problem:- The shock wave illust ...

Consider a plane-strain square element with unit depth as

Consider a plane-strain square element with unit depth as shown in the figure. Use the St. Venant-Kirchhoff isotropic material model with two Lame's constants λ and μ. A uniformly distributed force T x  (force per area) ...

1 find the velocity with which the group of two frequencies

1. Find the velocity with which the group of two frequencies 2400 MHz and 2500 MHz travels in a parallel-plate waveguide of dimension a = 2.5 cm and having a perfect dielectric of 2. For a narrow-band amplitude modulated ...

Consider the problem of identifying the nonlinear

Consider the problem of identifying the nonlinear discrete-time system in (9.9.4) using a raised-cosine RBF network. Let the number of past inputs be m = 1 and the number of past outputs be n = 1. Suppose the range of va ...

1 find the minimum value of h for which the gate shown

1. Find the minimum value of h for which the gate shown will rotate counterclockwise if the gate cross section is (a) rectangular, 4 ft × 4 ft; (b) triangular, 4 ft at the base × 4 ft high. Neglect bearing friction. 2. A ...

1 we defined two security services for e-mail pgp and smime

1. We defined two security services for e-mail (PGP and S/MIME). Explain why e-mail applications cannot use the services of SSL/TLS and need to use either PGP or S/MIME. 2. Assume Alice needs to send an e-mail to Bob. Ex ...

1 in multimedia communication assume a sender can encode an

1. In multimedia communication, assume a sender can encode an image using only JPEG encoding, but the potential receiver can only decode an image if it is encoded in GIF. Can these two entities exchange multimedia data? ...

A transmission line of length 2 m having a nonmagnetic

A transmission line of length 2 m having a nonmagnetic perfect dielectric is short-circuited at the far end. A variable-frequency generator is connected at its input and the current drawn is monitored. It is found that t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro