Information theoryPDF电子书下载
- 电子书积分:11 积分如何计算积分?
- 作 者:coding and cryptography = 信息论、编码与密码学 (英文版)
- 出 版 社:China Machine Press
- 出版年份:2003
- ISBN:7111127706
- 页数:280 页
Part Ⅰ Information Theory and Source Coding 3
1.Source Coding 3
1.1 Introduction to Information Theory 3
1.2 Uncertainty And Information 4
1.3 Average Mutual Information And Entropy 11
1.4 Information Measures For Continuous Random Variables 14
1.5 Source Coding Theorem 15
1.6 Huffman Coding 21
1.7 The Lempel-Ziv Algorithm 28
1.8 Run Length Encoding and the PCX Format 30
1.9 Rate Distortion Function 33
1.10 Optimum Quantizer Design 36
1.11 Introduction to Image Compression 37
1.12 The Jpeg Standard for Lossless Compression 38
1.13 The Jpeg Standard for Lossy Compression 39
1.14 Concluding Remarks 41
Summary 42
Problems 44
Computer Problems 46
2.Channel Capacity and Coding 47
2.1 Introduction 47
2.2 Channel Models 48
2.3 Channel Capacity 50
2.4 Channel Coding 52
2.5 Information Capacity Theorem 56
2.6 The Shannon Limit 59
2.7 Random Selection of Codes 61
2.8 Concluding Remarks 67
Summary 68
Problems 69
Computer Problems 71
Part ⅡError Control Coding(Channel Coding) 75
3.Linear Block Codes for Error Correction 75
3.1 Introduction to Error Correcting Codes 75
3.2 Basic Definitions 77
3.3 Matrix Description of Linear Block Codes 81
3.4 Equivalent Codes 82
3.5 Parity Check Matrix 85
3.6 Decoding of a Linear Block Code 87
3.7 Syndrome Decoding 94
3.8 Error Probability after Coding (Probability of Error Correction) 95
3.9 Perfect Codes 97
3.10 Hamming Codes 100
3.11 Optimal Linear Codes 102
3.12 Maximum Distance Separable (MDS) Codes 102
3.13 Concluding Remarks 102
Summary 103
Problems 105
Computer Problems 106
4.Cyclic Codes 108
4.1 Introduction to Cyclic Codes 108
4.2 Polynomials 109
4.3 The Division Algorithm for Polynomials 110
4.4 A Method for Generating Cyclic Codes 115
4.5 Matrix Description of Cyclic Codes 119
4.6 Burst Error Correction 121
4.7 Fire Codes 123
4.8 Golay Codes 124
4.9 Cyclic Redundancy Check (CRC) Codes 125
4.10 Circuit Implementation of Cyclic Codes 128
4.11 Concluding Remarks 132
Summary 132
Problems 134
Computer Problems 135
5.Bose-Chaudhuri Hocquenghem (BCH) Codes 136
5.1 Introduction to BCH Codes 136
5.2 Primitive Elements 137
5.3 Minimal Polynomials 139
5.4 Generator Polynomials in Terms of Minimal Polynomials 141
5.5 Some Examples of BCH Codes 143
5.6 Decoding of BCH Codes 147
5.7 Reed-Solomon Codes 150
5.8 Implementation of Reed-Solomon Encoders and Decoders 153
5.9 Nested Codes 153
5.10 Concluding Remarks 155
Summary 156
Problems 157
Computer Problems 158
6.Convolutional Codes 159
6.1 Introduction to Convolutional Codes 159
6.2 Tree Codes and Trellis Codes 160
6.3 Polynomial Description of Convolutional Codes(Analytical Representation) 165
6.4 Distance Notions for Convolutional Codes 170
6.5 The Generating Function 173
6.6 Matrix Description of Convolutional Codes 176
6.7 Viterbi Decoding of Convolutional Codes 178
6.8 Distance Bounds for Convolutional Codes 185
6.9 Performance Bounds 187
6.10 Known Good Convolutional Codes 188
6.11 Turbo Codes 190
6.12 Turbo Decoding 192
6.13 Concluding Remarks 198
Summary 199
Problems 201
Computer Problems 203
7.Trellis Coded Modulation 206
7.1 Introduction to TCM 206
7.2 The Concept of Coded Modulation 207
7.3 Mapping by Set Partitioning 212
7.4 Ungerboeck’s TCM Design Rules 216
7.5 Tcm Decoder 220
7.6 Performance Evaluation for Awgn Channel 221
7.7 Computation of d freeee 227
7.8 Tcm for Fading Channels 228
7.9 Concluding Remarks 232
Summary 233
Problems 234
Computer Problems 238
Part Ⅲ Coding for Secure Communications 241
8.Cryptography 241
8.1 Introduction to Cryptography 241
8.2 An Overview of Encryption Techniques 242
8.3 Operations Used By Encryption Algorithms 245
8.4 Symmetric (Secret Key) Cryptography 246
8.5 Data Encryption Standard (DES) 248
8.6 International Data Encryption Algorithm (IDEA) 252
8.7 RC Ciphers 253
8.8 Asymmetric (Public-Key) Algorithms 254
8.9 The RSA Algorithm 254
8.10 Pretty Good Privacy (PGP) 256
8.11 One-Way Hashing 259
8.12 Other Techniques 260
8.13 Secure Communication Using Chaos Functions 261
8.14 Cryptanalysis 262
8.15 Politics of Cryptography 264
8.16 Concluding Remarks 265
Summary 268
Problems 269
Computer Problems 271
Index 273
- 《管理信息系统习题集》郭晓军 2016
- 《终南山密码》巫童著 2019
- 《微表情密码》(波)卡西亚·韦佐夫斯基,(波)帕特里克·韦佐夫斯基著 2019
- 《信息系统安全技术管理策略 信息安全经济学视角》赵柳榕著 2020
- 《卓有成效的管理者 中英文双语版》(美)彼得·德鲁克许是祥译;那国毅审校 2019
- 《ESG指标管理与信息披露指南》管竹笋,林波,代奕波主编 2019
- 《AutoCAD 2018自学视频教程 标准版 中文版》CAD/CAM/CAE技术联盟 2019
- 《跟孩子一起看图学英文》张紫颖著 2019
- 《青春密码》王欣著 2019
- 《大学计算机信息技术教程 2018版》张福炎 2018
- 《治理、政治与国家=GOVERNANCE》POLITICS AND THE STATE
- 《暗黑之门 历任首相主导下的英国情报史话=SPIES》SECRET INTELLIGENCE AND BRITISH PRIME MINISTERS
- 《石像、神庙与失落的文明:改写世界文明史的玛雅发现之旅=THE EXTRAORDINARY JOUMEY OF JOHN L.STEPHENS AND FREDERICK CSTHERW》AND THE DISCOVERY OF THE LOST CIVILIZATION OF THE MAYA
- 《中国影视娱乐合同范本与风险防范=Chinas Film》Television and Entertainment Industry Contract Model and Risk Prevention
- 《政治观念史稿·卷一 希腊化、罗马和早期基督教=HISTORY OF POLITICAL IDEAS(VOLUMR 1) HELLENISM》ROME AND EARLY CHRISTIANITY
- 《PIANO ADVENTURES THE BASIC PIANO METHOD LEVEL 3B LESSON BOOK 2ND EDITION》NANCY AND RANDALL FABER 2015
- 《MOONSHOTS IN EDUCATION LAUNCHING BLENDED LEARNING IN THE COASSROOM》ESTHER WOJCICKI AND LANCE LZUMI 2015
- 《CHINAS NEW URBANIZATION DEVELOPMENTAL PATHS》 BLUEPRINTS AND PATTERNS SCIE
- 《DREAM FOR SOLO PERCUSIONIST (CROTALES》 VIBRAPHONE AND JOHN
- 《美国教育法与判例》秦梦群著=American public school law and court cases 2004
- 《R语言机器学习 原书第2版=MACHINE LEARNING USING R WITH TIME SERIES AND INDUSTRY-BASED USE CASES IN R》SECOND EDITION
- 《机器学习实战 基于SOPHON平台的机器学习理论与实践=MACHINE LEARNING IN ACTION PRINCIPLES AND PRACTICE BASED ON TH》星环科技人工智能平台团队编著 2020
- 《竞争战略 全译珍藏版》(美)迈克尔·波特(Michael E. Porter)著 2012
- 《网络互联技术手册 第2版》(美)(K.唐斯)Kevin Downes等著;包晓露等译 1999
- 《新版交换式以太网和快速型以太网 第2版》(美)(R.布雷耶)Robert Breyer,(美)(S.赖利)Sean Riley著;肖文贵等译 1997
- 《摄影100关键词》(英)克拉克著 2011
- 《数控技术专业英语》高成秀主编 2010
- 《守望百年 中英文对照爱情长诗》蔡丽双著;张智中译 2014
- 《环境政策概要》(英)卡罗琳·斯奈尔(Carolyn Snell)著;宋伟译 2017
- 《驼铃 中-英-波兰文对照诗集》蔡丽双著;张智中,(波兰)博古米娜·雅尼卡译 2015