图书介绍

Information theory2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

Information theory
  • coding and cryptography = 信息论、编码与密码学 (英文版) 著
  • 出版社: China Machine Press
  • ISBN:7111127706
  • 出版时间:2003
  • 标注页数:280页
  • 文件大小:55MB
  • 文件页数:301页
  • 主题词:信息论-英文;信息-编码-英文;密码-理论-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Information theoryPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part Ⅰ Information Theory and Source Coding3

1.Source Coding3

1.1 Introduction to Information Theory3

1.2 Uncertainty And Information4

1.3 Average Mutual Information And Entropy11

1.4 Information Measures For Continuous Random Variables14

1.5 Source Coding Theorem15

1.6 Huffman Coding21

1.7 The Lempel-Ziv Algorithm28

1.8 Run Length Encoding and the PCX Format30

1.9 Rate Distortion Function33

1.10 Optimum Quantizer Design36

1.11 Introduction to Image Compression37

1.12 The Jpeg Standard for Lossless Compression38

1.13 The Jpeg Standard for Lossy Compression39

1.14 Concluding Remarks41

Summary42

Problems44

Computer Problems46

2.Channel Capacity and Coding47

2.1 Introduction47

2.2 Channel Models48

2.3 Channel Capacity50

2.4 Channel Coding52

2.5 Information Capacity Theorem56

2.6 The Shannon Limit59

2.7 Random Selection of Codes61

2.8 Concluding Remarks67

Summary68

Problems69

Computer Problems71

Part ⅡError Control Coding(Channel Coding)75

3.Linear Block Codes for Error Correction75

3.1 Introduction to Error Correcting Codes75

3.2 Basic Definitions77

3.3 Matrix Description of Linear Block Codes81

3.4 Equivalent Codes82

3.5 Parity Check Matrix85

3.6 Decoding of a Linear Block Code87

3.7 Syndrome Decoding94

3.8 Error Probability after Coding (Probability of Error Correction)95

3.9 Perfect Codes97

3.10 Hamming Codes100

3.11 Optimal Linear Codes102

3.12 Maximum Distance Separable (MDS) Codes102

3.13 Concluding Remarks102

Summary103

Problems105

Computer Problems106

4.Cyclic Codes108

4.1 Introduction to Cyclic Codes108

4.2 Polynomials109

4.3 The Division Algorithm for Polynomials110

4.4 A Method for Generating Cyclic Codes115

4.5 Matrix Description of Cyclic Codes119

4.6 Burst Error Correction121

4.7 Fire Codes123

4.8 Golay Codes124

4.9 Cyclic Redundancy Check (CRC) Codes125

4.10 Circuit Implementation of Cyclic Codes128

4.11 Concluding Remarks132

Summary132

Problems134

Computer Problems135

5.Bose-Chaudhuri Hocquenghem (BCH) Codes136

5.1 Introduction to BCH Codes136

5.2 Primitive Elements137

5.3 Minimal Polynomials139

5.4 Generator Polynomials in Terms of Minimal Polynomials141

5.5 Some Examples of BCH Codes143

5.6 Decoding of BCH Codes147

5.7 Reed-Solomon Codes150

5.8 Implementation of Reed-Solomon Encoders and Decoders153

5.9 Nested Codes153

5.10 Concluding Remarks155

Summary156

Problems157

Computer Problems158

6.Convolutional Codes159

6.1 Introduction to Convolutional Codes159

6.2 Tree Codes and Trellis Codes160

6.3 Polynomial Description of Convolutional Codes(Analytical Representation)165

6.4 Distance Notions for Convolutional Codes170

6.5 The Generating Function173

6.6 Matrix Description of Convolutional Codes176

6.7 Viterbi Decoding of Convolutional Codes178

6.8 Distance Bounds for Convolutional Codes185

6.9 Performance Bounds187

6.10 Known Good Convolutional Codes188

6.11 Turbo Codes190

6.12 Turbo Decoding192

6.13 Concluding Remarks198

Summary199

Problems201

Computer Problems203

7.Trellis Coded Modulation206

7.1 Introduction to TCM206

7.2 The Concept of Coded Modulation207

7.3 Mapping by Set Partitioning212

7.4 Ungerboeck’s TCM Design Rules216

7.5 Tcm Decoder220

7.6 Performance Evaluation for Awgn Channel221

7.7 Computation of d freeee227

7.8 Tcm for Fading Channels228

7.9 Concluding Remarks232

Summary233

Problems234

Computer Problems238

Part Ⅲ Coding for Secure Communications241

8.Cryptography241

8.1 Introduction to Cryptography241

8.2 An Overview of Encryption Techniques242

8.3 Operations Used By Encryption Algorithms245

8.4 Symmetric (Secret Key) Cryptography246

8.5 Data Encryption Standard (DES)248

8.6 International Data Encryption Algorithm (IDEA)252

8.7 RC Ciphers253

8.8 Asymmetric (Public-Key) Algorithms254

8.9 The RSA Algorithm254

8.10 Pretty Good Privacy (PGP)256

8.11 One-Way Hashing259

8.12 Other Techniques260

8.13 Secure Communication Using Chaos Functions261

8.14 Cryptanalysis262

8.15 Politics of Cryptography264

8.16 Concluding Remarks265

Summary268

Problems269

Computer Problems271

Index273

热门推荐