0% found this document useful (0 votes)
411 views

ECE - F344 Information Theory and Coding

This document provides information about the course ECE F344 - Information Theory and Coding taught in the second semester of 2019-2020 at BITS Pilani KK Birla Goa Campus. The course aims to teach concepts of random processes, probability theory, and security measures in communication systems. It will cover topics such as information sources, source coding, channel capacity, error control coding, and cryptography. Students will be evaluated through quizzes, assignments, a midterm exam, surprise tests, and a comprehensive final exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
411 views

ECE - F344 Information Theory and Coding

This document provides information about the course ECE F344 - Information Theory and Coding taught in the second semester of 2019-2020 at BITS Pilani KK Birla Goa Campus. The course aims to teach concepts of random processes, probability theory, and security measures in communication systems. It will cover topics such as information sources, source coding, channel capacity, error control coding, and cryptography. Students will be evaluated through quizzes, assignments, a midterm exam, surprise tests, and a comprehensive final exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI

KK Birla Goa Campus

INSTRUCTION DIVISION
SECOND SEMESTER 2019-2020
Course Handout
Date: 08-1-2020

Course No. : ECE F344


Course Title : Information Theory and Coding
Instructor-in-charge : Naveen Gupta

1. Course description: 3 0 3
Random variables and random processes; Information sources and source coding theorem, Kraft
inequality, Shannon-Fano codes, Huffman codes, Arithmetic Codes, Lempel-Ziv-Welch algorithm, universal
source codes; channel capacity: channel capacity; noisy channel coding theorem for discrete memoryless
channels; error control coding: linear block codes and their properties, low density-parity-check codes, BCH
codes, Reed-Solomon codes, cryptography: basic concepts on cryptography and crypto analysis, security
issues; private-key encryption algorithms- stream ciphers, block ciphers, introduction to number theory -
modular arithmetic, public-key encryption algorithms- Diffie-Hellman public-key distribution scheme, RSA
public-key cryptosystem; Message authentication, digital signatures.

2. Scope & Objective:


1. To apply the concepts of random processes and probability theory to communication subsystems
2. To implement security measures in communication systems using cryptographic principles

3. Text Books

nd
1. Information Theory, Coding and Cryptography, 2 Ed., Dr. Ranjan Bose, Tata McGrawHill, 2008

4. Reference Books
1. Elements of information theory, Thomas M.Cover and Joy A.Thomas, Wiley-India
2. Error Correction Coding, Todd K. Moon, Wiley, 2006
3. The Mathematics of Coding Theory, Paul Garrett, Pearson Education, 2005
4. Information Theory, Inference and Learning Algorithms, David Mackay, Cambridge University Press, 2003
5. Coding Theory – A First course, Ling and Xing, Cambridge University press, 2004

5. Course Plan

Lect. Topics to be covered Learning Objectives Ref. to


No.
Text Book (Sec nos)

1-2 Introduction to Information Measure of Information 1.1 to 1.2


Theory

3-4 Average Mutual Information Concept of Binary Symmetric channel, 1.3


and Entropy conditional entropy

5-6 Jenson inequality Jensen’s Inequality and its consequences, R1, Class notes
Importance in entropy

7-8 Source coding theorem Fundamentals of source coding 1.5

1
9-10 Huffman Coding, Shannon- Huffman Coding, Shannon-Fano-Elias 1.6,1.7
Fano-Elias Coding Coding

11-12 Arithmetic Coding,The Arithmetic Coding,The Lempel-Ziv 1.8-1.10


Lempel-Ziv algorithm, run algorithm, run length encoding
length encoding
13-15 Channel Capacity and To understand Channel capacity & noisy 2.1 to 2.9
Models coding theorem
16-17 Block codes for error Introduction to error correcting codes 3.1 to 3.2
correction
18-19 Linear block codes Parity check matrix, decoding of a linear code 3.3 to 3.6

20-21 Syndrome decoding Decoding by standard array 3.7 to 3.9

22-23 Hamming codes Hamming and other standards linear codes 3.10 to 3.16

24-25 Cyclic codes Division algorithm for cyclic codes 4.1 to 4.3

26-29 Matrix description of cyclic Coding and Decoding 4.4 to 4.12


codes
30-33 LDPC Codes, RS code Coding and decoding Class notes

34-37 BCH codes Generator polynomials, Minimal polynomials 5.1 to 5.10

38-40 Cryptography Overview of encryption techniques, 8.1 to 8.4


symmetric key cryptography,

41-42 Asymmetric key The RSA algorithm 8.8 to 8.9


cryptography

6. Evaluation Scheme

7. Durati
Component Weightage Date & Time Venue Remarks
on
Quiz 1 40 min 5% 31/1 (5 to 5.50 PM) DLT5 Open Book
Quiz 2 40 min. 5% 9/4 DLT5 Open Book
Assignment/
15% Open Book
Project
04/03, 4.00-5.30
Midsem 1.5 hrs 30% TBA
PM
Surprise
40 min. 5% DLT5 Open book
Tests*
Compre 3 hrs 40% 09/05 AN TBA Closed Book
Chamber Consultation Hour: Will be announced in the class.
 The best of 3 out of 4 (2 Quizzes + 2 surprise test) will be considered for final evaluation.

8. Notices: Notices concerning this course will be displayed on the Moodle

Instructor-in-Charge
ECE F344

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy