Lecturer(s)
|
-
Navrátil Pavel, Ing. Ph.D.
-
Chramcov Bronislav, doc. Ing. Bc. Ph.D.
|
Course content
|
1. Conception and evolution of the theory of information. 2. Fundamentals of the theory of probability, Random variable, distribution of the random variable. 3. Basics of modular arithmetic and operations in digital systems. 4. Information - basic terms, entropy and its properties. 5. Sources of information and its properties, sampling and quantizing of the continuous source. 6. Information Transfer (model of the binary communication channel) 7. Properties of communication channels 8. Elementary theory of coding. 9. Uniform and non-uniform codes. 10. Effective codes (methods of the proposal of effective codes). 11. Security codes (Self detecting and self-correcting code). 12. Linear security codes (parity code, Hamming's codes). 13. Cyclic redundancy codes. 14. Codes of common life, calculation of check digit (barcode, ISBN, ISSN, personal identification number etc.), two-dimensional codes (QR code, Matrix code, BeeTag, MSTag).
|
Learning activities and teaching methods
|
Monologic (Exposition, lecture, briefing), Exercises on PC, Individual work of students
- Preparation for course credit
- 13 hours per semester
- Participation in classes
- 56 hours per semester
- Term paper
- 80 hours per semester
- Preparation for examination
- 13 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge of mathematics and informatics. |
Basic knowledge of mathematics and informatics. |
learning outcomes |
---|
explain the concepts of the quantity of information and entropy |
explain the concepts of the quantity of information and entropy |
describe and explain the principle of continuous signal discretization |
describe and explain the principle of continuous signal discretization |
characterize the general communication system and explain the principle of operation of individual elements of this system |
characterize the general communication system and explain the principle of operation of individual elements of this system |
explain the concepts of coding, code, code word, source and transfer alphabet |
explain the concepts of coding, code, code word, source and transfer alphabet |
distinguish uniform and non-uniform code |
distinguish uniform and non-uniform code |
explain methods of designing effective codes |
explain methods of designing effective codes |
characterize the detection and correction properties of security codes concerning the Hamming distance of the code |
characterize the detection and correction properties of security codes concerning the Hamming distance of the code |
distinguish between systematic and non-systematic security codes, list their examples |
distinguish between systematic and non-systematic security codes, list their examples |
describe the principle of calculating the check digit for everyday codes |
describe the principle of calculating the check digit for everyday codes |
Skills |
---|
convert a number from one digital system to another |
convert a number from one digital system to another |
calculate the quantization error |
calculate the quantization error |
design a uniform code for a given resource alphabet |
design a uniform code for a given resource alphabet |
construct a non-uniform efficient code for a given resource alphabet |
construct a non-uniform efficient code for a given resource alphabet |
calculate efficiency and average code length |
calculate efficiency and average code length |
determine the correction and detection properties of the code based on the value of the Hamming distance |
determine the correction and detection properties of the code based on the value of the Hamming distance |
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word |
encode (secure) an insecure code word using linear codes (Hamming code), check the received code word |
calculate the check digit for standard life codes (ISBN, ISSN, barcode) |
calculate the check digit for standard life codes (ISBN, ISSN, barcode) |
teaching methods |
---|
Knowledge |
---|
Individual work of students |
Individual work of students |
Monologic (Exposition, lecture, briefing) |
Exercises on PC |
Exercises on PC |
Monologic (Exposition, lecture, briefing) |
assessment methods |
---|
Didactic test |
Analysis of works made by the student (Technical products) |
Analysis of works made by the student (Technical products) |
Didactic test |
Oral examination |
Oral examination |
Recommended literature
|
-
BRILLOUIN, Leon. Science and Information Theory. Massachusetts: Courier Corporation, 2013. ISBN 978-0-486-49755-6.
-
DUTSON, Phil. Creating QR and Tag Codes. London: Pearson Education, 2012. ISBN 978-0-13-311834-6.
-
Farana, R. Kapitoly ze základů informatiky. Ostrava : VŠB-TU, 2003. ISBN 80-248-0265-1.
-
HEBÁK, P., KAHOUNOVÁ, J. Počet pravděpodobnosti v příkladech. Praha, 2005. ISBN 80-7333-040-7.
-
KLOVE, Torleiv. Codes for Error Detection. Singapore: World Scientific, 2007. ISBN 978-981-277-051-6.
-
LINT J. H. Introduction to Coding Theory. Springer-Verlag Berlin Heidelberg, 1999. ISBN 978-3-642-58575.
-
REZA Fazlollah M. An Introduction to Information Theory. Massachusetts: Courier Corporation, 2012. ISBN 978-0-486- 15844.
-
THOMAS, M., COVER, J., THOMAS A. Elements of Information Theory. Wiley-Interscience, 2006. ISBN 0471241954.
-
Vlček, K. Komprese a kódová zabezpečení v digitálních komunikacích. Praha : BEN, 2004. ISBN 80-7300-134-9.
-
Zelinka, I. Základy informatiky. Volume 1. Zlín : UTB, FT, 2005. ISBN 80-214-1423-5.
|