Course detail
Information Theory and Encoding
FSI-VTIAcad. year: 2013/2014
The course is aimed to basics in information theory (message, entropy, transfer of information, discrete and continuous channels) and signals (signal processing, modulation). Further the course includes basic overview of coding methods in areas: bar codes, compression codes, error correcting codes and cryptography. At the end of the course the modern trends in coding are presented (quantum error correction, quantum cryptography).
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Basic concepts of the information theory
3. Exercises to basic concepts
4. The discrete memoryless information source
5. Exercises to the discrete memoryless information source
6. The discrete information source with memory
7. The discrete communication channel
8. Network information theory
9. Error-correcting codes
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
SCHNEIER, B. Applied Cryptography, John Wiley & Sons, Inc. 1996. (EN)
Recommended reading
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Basic principle of communication (discrete and continuous channel).
3. Signal processing.
4. Introduction to encoding theory.
5. Bar Code. RFID technology.
6. Data compression I.
7. Data compression II.
8. Error detection and correction I.
9. Error detection and correction II.
10. Cryptogaphy I.
11. Cryptogaphy II.
12. Cryptogaphy III.
13. Advanced in encoding and cryptography theory (quantum cryptography).
Computer-assisted exercise
Teacher / Lecturer
Syllabus
The labs are divided into six parts:
a) Bit rate, channel capacity, information ratio.
b) Signals, modulation methods.
c) Bar code.
d) Data compression.
e) Error detection and correction.
f) Cryptography.