Lecturer(s)
|
-
Kadavý Tomáš, Ing.
-
Šenkeřík Roman, prof. Ing. Ph.D.
-
Chramcov Bronislav, doc. Ing. Bc. Ph.D.
|
Course content
|
- Conception and evolution of the theory of information. - Fundamentals of the theory of probability, Random variable, distribution of the random variable. - Basics of modular arithmetic and operations in digital systems. - Information - basic terms, entropy and its properties. - Sources of information and its properties, sampling and quantizing of the continuous source. - Information Transfer (model of the binary communication channel, properties of communication channels). - Elementary theory of coding. - Uniform and non-uniform codes. - Effective codes (methods of the proposal of effective codes). - Security codes (Self detecting and self-correcting code). - Systematic security codes(parity code, Hamming's codes, nonlinear codes-inverse code). - Cyclic redundancy codes. - Codes of common life, calculation of check digit (barcode, ISBN, ISSN, personal identification number etc.). - Two-dimensional codes (QR code, Matrix code, BeeTag, MSTag).
|
Learning activities and teaching methods
|
Monologic (Exposition, lecture, briefing), Exercises on PC
- Participation in classes
- 56 hours per semester
- Term paper
- 10 hours per semester
- Preparation for examination
- 10 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge of mathematics and informatics. |
Basic knowledge of mathematics and informatics. |
learning outcomes |
---|
explain the concepts of the quantity of information and entropy |
explain the concepts of the quantity of information and entropy |
describe and explain the principle of continuous signal discretization |
describe and explain the principle of continuous signal discretization |
characterize the general communication system and explain the principle of operation of individual elements of this system |
characterize the general communication system and explain the principle of operation of individual elements of this system |
explain the concepts of coding, code, code word, source and transfer alphabet |
explain the concepts of coding, code, code word, source and transfer alphabet |
distinguish uniform and non-uniform code |
distinguish uniform and non-uniform code |
explain methods of designing effective codes |
explain methods of designing effective codes |
characterize the detection and correction properties of security codes concerning the Hamming distance of the code |
characterize the detection and correction properties of security codes concerning the Hamming distance of the code |
distinguish between systematic and non-systematic security codes, list their examples |
distinguish between systematic and non-systematic security codes, list their examples |
describe the principle of calculating the check digit for everyday codes |
describe the principle of calculating the check digit for everyday codes |
Skills |
---|
convert a number from one digital system to another |
convert a number from one digital system to another |
calculate the quantization error |
calculate the quantization error |
design a uniform code for a given resource alphabet |
design a uniform code for a given resource alphabet |
construct a non-uniform efficient code for a given resource alphabet |
construct a non-uniform efficient code for a given resource alphabet |
calculate efficiency and average code length |
calculate efficiency and average code length |
determine the correction and detection properties of the code based on the value of the Hamming distance |
determine the correction and detection properties of the code based on the value of the Hamming distance |
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word |
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word |
calculate the check digit for standard life codes (ISBN, ISSN, barcode) |
calculate the check digit for standard life codes (ISBN, ISSN, barcode) |
teaching methods |
---|
Knowledge |
---|
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Exercises on PC |
Exercises on PC |
assessment methods |
---|
Analysis of works made by the student (Technical products) |
Didactic test |
Analysis of works made by the student (Technical products) |
Oral examination |
Oral examination |
Didactic test |
Recommended literature
|
-
Cover, T. M. Elements of information theory. 2nd ed. Hoboken, N.J. : Wiley-Interscience, 2006. ISBN 0-471-24195-4.
-
Farana, R. Kapitoly ze základů informatiky. Ostrava : VŠB-TU, 2003. ISBN 80-248-0265-1.
-
HEBÁK, P., KAHOUNOVÁ, J. Počet pravděpodobnosti v příkladech. Praha, 2005. ISBN 80-7333-040-7.
-
Vlček, Karel. Komprese a kódová zabezpečení v multimediálních komunikacích. 1. vyd. Praha : BEN - technická literatura, 2000. ISBN 8086056686.
-
Zelinka, Ivan. Aplikovaná informatika aneb úvod do fraktální geometrie, buněčných automatů. 1. vyd. Zlín : FT VUT, 1999. ISBN 8021414235.
|