Course: Theory of Information Transmission

« Back
Course title Theory of Information Transmission
Course code AUIUI/AE2TP
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study not specified
Semester Winter and summer
Number of ECTS credits 5
Language of instruction English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Kadavý Tomáš, Ing.
  • Šenkeřík Roman, prof. Ing. Ph.D.
  • Chramcov Bronislav, doc. Ing. Bc. Ph.D.
Course content
- Conception and evolution of the theory of information. - Fundamentals of the theory of probability, Random variable, distribution of the random variable. - Basics of modular arithmetic and operations in digital systems. - Information - basic terms, entropy and its properties. - Sources of information and its properties, sampling and quantizing of the continuous source. - Information Transfer (model of the binary communication channel, properties of communication channels). - Elementary theory of coding. - Uniform and non-uniform codes. - Effective codes (methods of the proposal of effective codes). - Security codes (Self detecting and self-correcting code). - Systematic security codes(parity code, Hamming's codes, nonlinear codes-inverse code). - Cyclic redundancy codes. - Codes of common life, calculation of check digit (barcode, ISBN, ISSN, personal identification number etc.). - Two-dimensional codes (QR code, Matrix code, BeeTag, MSTag).

Learning activities and teaching methods
Monologic (Exposition, lecture, briefing), Exercises on PC
  • Participation in classes - 56 hours per semester
  • Term paper - 10 hours per semester
  • Preparation for examination - 10 hours per semester
prerequisite
Knowledge
Basic knowledge of mathematics and informatics.
Basic knowledge of mathematics and informatics.
learning outcomes
explain the concepts of the quantity of information and entropy
explain the concepts of the quantity of information and entropy
describe and explain the principle of continuous signal discretization
describe and explain the principle of continuous signal discretization
characterize the general communication system and explain the principle of operation of individual elements of this system
characterize the general communication system and explain the principle of operation of individual elements of this system
explain the concepts of coding, code, code word, source and transfer alphabet
explain the concepts of coding, code, code word, source and transfer alphabet
distinguish uniform and non-uniform code
distinguish uniform and non-uniform code
explain methods of designing effective codes
explain methods of designing effective codes
characterize the detection and correction properties of security codes concerning the Hamming distance of the code
characterize the detection and correction properties of security codes concerning the Hamming distance of the code
distinguish between systematic and non-systematic security codes, list their examples
distinguish between systematic and non-systematic security codes, list their examples
describe the principle of calculating the check digit for everyday codes
describe the principle of calculating the check digit for everyday codes
Skills
convert a number from one digital system to another
convert a number from one digital system to another
calculate the quantization error
calculate the quantization error
design a uniform code for a given resource alphabet
design a uniform code for a given resource alphabet
construct a non-uniform efficient code for a given resource alphabet
construct a non-uniform efficient code for a given resource alphabet
calculate efficiency and average code length
calculate efficiency and average code length
determine the correction and detection properties of the code based on the value of the Hamming distance
determine the correction and detection properties of the code based on the value of the Hamming distance
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word
calculate the check digit for standard life codes (ISBN, ISSN, barcode)
calculate the check digit for standard life codes (ISBN, ISSN, barcode)
teaching methods
Knowledge
Monologic (Exposition, lecture, briefing)
Monologic (Exposition, lecture, briefing)
Exercises on PC
Exercises on PC
assessment methods
Analysis of works made by the student (Technical products)
Didactic test
Analysis of works made by the student (Technical products)
Oral examination
Oral examination
Didactic test
Recommended literature
  • Cover, T. M. Elements of information theory. 2nd ed. Hoboken, N.J. : Wiley-Interscience, 2006. ISBN 0-471-24195-4.
  • Farana, R. Kapitoly ze základů informatiky. Ostrava : VŠB-TU, 2003. ISBN 80-248-0265-1.
  • HEBÁK, P., KAHOUNOVÁ, J. Počet pravděpodobnosti v příkladech. Praha, 2005. ISBN 80-7333-040-7.
  • Vlček, Karel. Komprese a kódová zabezpečení v multimediálních komunikacích. 1. vyd. Praha : BEN - technická literatura, 2000. ISBN 8086056686.
  • Zelinka, Ivan. Aplikovaná informatika aneb úvod do fraktální geometrie, buněčných automatů. 1. vyd. Zlín : FT VUT, 1999. ISBN 8021414235.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester