A Fibonacci-Polynomial Based Coding Method with Error Detection and Correction

Total Page:16

File Type:pdf, Size:1020Kb

A Fibonacci-Polynomial Based Coding Method with Error Detection and Correction View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Computers and Mathematics with Applications 60 (2010) 2738–2752 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa A Fibonacci-polynomial based coding method with error detection and correction Mostafa Esmaeili a, Morteza Esmaeili b,c,∗ a Department of Electrical and Computer Engineering, Isfahan University of Technology, 84156-83111, Isfahan, Iran b Department of Mathematical Sciences, Isfahan University of Technology, 84156-83111, Isfahan, Iran c Department of Electrical and Computer Engineering, University of Victoria, Victoria, B.C., Canada V8W 3P6 article info a b s t r a c t Article history: A Fibonacci coding method using Fibonacci polynomials is introduced. For integers m ≥ 2, Received 20 January 2010 ≥ ≥ × n x 1 and n 1, an m m matrix Qm.x/, the nth power of Qm.x/, is considered as the Received in revised form 7 August 2010 encoding matrix, where Qm is an m × m matrix whose elements are Fibonacci polynomials. Accepted 30 August 2010 −n The decoding matrix Qm .x/ is also introduced. A simple error-detecting criterion and a simple error-correcting method for this class of codes are given. It is shown that the Keywords: probability of decoding error is almost zero for m large enough. Illustrative examples are Fibonacci polynomial provided. Fibonacci-polynomial matrices Error detecting and error correcting codes ' 2010 Elsevier Ltd. All rights reserved. 1. Introduction The Fibonacci sequence and the golden ratio have appeared in many fields of science including high energy physics, cryptography and coding [1–9]. The Fibonacci sequence is defined by the recurrence relation fn D fn−1 C fn−2; n ≥ 3, with initial values f1 D f2 D 1. This sequence has been extended in many ways. Two such extensions that will be used in this paper are the p-Fibonacci sequences [10] and the Fibonacci polynomials [11]. The p-Fibonacci sequence, Fp.n/ is defined by the following recurrence relation. Fp.n/ D Fp.n − 1/ C Fp.n − p − 1/; n > p C 1; p ≥ 0; Fp.1/ D Fp.2/ D Fp.3/ D···D Fp.p C 1/ D 1: Parts of the p-Fibonacci sequences for p D 1; 2; 3; 4 are listed in the table below. p D 1 1, 1, 2, 3, 5, 8, 11, ::: p D 2 1, 1, 1, 2, 3, 4, 6, 9, ::: p D 3 1, 1, 1, 1, 2, 3, 4, 5, 7, ::: p D 4 1, 1, 1, 1, 1, 2, 3, 4, 5, 6, 8, 11, 15, ::: The p-Fibonacci sequences have been used to construct coding and decoding matrices [12–14]. The Qp matrix of order p C 1 is introduced in [12]. For 0 ≤ p ≤ 3, the matrix Qp is given below. 01 1 0 01 1 1 0! 1 1 0 0 1 0 Q D .0/; Q D ; Q D 0 0 1 ; Q D B C : 0 1 1 0 2 3 @0 0 0 1A 1 0 0 1 0 0 0 ∗ Corresponding author at: Department of Mathematical Sciences, Isfahan University of Technology, 84156-83111, Isfahan, Iran. E-mail address: [email protected] (M. Esmaeili). 0898-1221/$ – see front matter ' 2010 Elsevier Ltd. All rights reserved. doi:10.1016/j.camwa.2010.08.091 M. Esmaeili, M. Esmaeili / Computers and Mathematics with Applications 60 (2010) 2738–2752 2739 ≥ ≥ n It is shown in [12] that for n 1 and p 0, the nth power of Qp, denoted Qp , is 0 Fp.n C 1/ Fp.n/ ··· Fp.n − p C 2/ Fp.n − p C 1/ 1 − C − ··· − C − C BFp.n p 1/ Fp.n p/ Fp.n 2p 2/ Fp.n 2p 1/C n B : : : : C Q D B : : : : C p B : : : : C @ Fp.n − 1/ Fp.n − 2/ ··· Fp.n − p/ Fp.n − p − 1/ A F n F n − 1 ··· F n − p C 1 F n − p p. / p. / p. / p. / .pC1/×.pC1/ wherein Fp.n/ is the nth p-Fibonacci number. These matrices have been used in [12] to give a coding and decoding technique referred to as Fibonacci coding theory. Another extension of the Fibonacci sequence is the Fibonacci polynomial which is defined by the recurrence relation (1; n D 1I Fn.x/ D x; n D 2I (1) xFn−1.x/ C Fn−2.x/; n ≥ 3: A non-recursive expression for Fn.x/, given below, is introduced in [11]. b n c 2 − X n i n−2i FnC1.x/ D x ; n ≥ 0: i iD0 This expression will be used frequently throughout this paper. The first five Fibonacci polynomials are shown below. 81 n D 1I > >x n D 2I < 2 Fn.x/ D x C 1 n D 3I > 3 C D I >x 2x n 4 :x4 C 3x2 C 1 n D 5: There is no restriction on the Fibonacci polynomials for n ≤ 0. In this paper we set F0.x/ D 0 and Fn.x/ D 1 for n ≤ −1. An important property of Fibonacci polynomials, proved in [11], is p 2 FnC1.x/ x C x C 4 σ VD lim D : !1 n Fn.x/ 2 It is worth noting that by substituting x D 1 in the Fibonacci polynomials and p D 1 in the p-Fibonacci sequence the classical Fibonacci sequence is obtained. In the rest of the paper, for simplicity, we denote Fn.x/ by Fn. n In this paper square matrices Qm.x/ consisting of Fibonacci-polynomial entries are introduced. It is shown that these matrices are practical from the coding theory perspective. The approach presented is considered a Fibonacci-polynomial n based coding method. Obviously, this is an extension of the results in [12] based on the Qp matrices. By substituting a positive integer for x, an infinite number of matrices of order m ≥ 2 are obtained. In Sections 2 and 3 the general properties of the Fibonacci-polynomial matrices and the inverse Fibonacci-polynomial matrices, that is the encoding and decoding matrices, are given. In Section 4 the Fibonacci-polynomial based coding and decoding method is given. An interesting relation among the elements of a code-message matrix is derived in Section 5. The error-detection and error-correction methods are discussed in Section 6. The computational complexity of the decoding process is addressed in Section 7. Some conclusions are given in Section 8. 2. Fibonacci-polynomial matrices of order m Consider the 2 × 2 matrix defined below. x 1 Q .x/ D : 2 1 0 For any x, we have det.Q2.x// D −1. Setting F0 D 0 and applying induction on n ≥ 1, it is easily verified that n D FnC1 Fn Q2 .x/ : Fn Fn−1 n D − n × By using the determinant theorem, we see that det.Q2 .x// . 1/ . The following defines the m m matrix Qm.x/. Thus Qm.x/ has a recursive expression. 0x 1 0 0 ··· 01 ··· B0 x 1 0 0C 0x 1 0 01 B ··· C B0 0 x 1 0C 0 x 1 0 Qm.x/ VD B: : : : : :C Q4.x/ D B C : B: : :: :: :: :C @0 0 x 1A B: : :C @0 0 ··· 0 x 1A 0 0 1 0 0 0 ··· 0 1 0 m×m 2740 M. Esmaeili, M. Esmaeili / Computers and Mathematics with Applications 60 (2010) 2738–2752 m−2 One can easily see that det.Qm.x// D −x . The nth, n ≥ 2, power of Qm.x/ is given by the following theorem. Theorem 1. For n ≥ 2 and m ≥ 2, we have n Qm.x/ j k j k 0 n−mC2 n−mC1 1 2 2 n n − n − C X n − i − C − X n − 1 − i − C − B xn xn 1 ··· xn m 3 xn m 2 2i xn m 1 2i C B 0 1 m − 3 i C m − 2 i C m − 2 C B iD0 iD0 C B j n−mC3 k j n−mC2 k C B 2 2 C B n n n − i n − 1 − i C B n n−mC4 X n−mC3−2i X n−mC2−2i C B 0 x ··· x x x C B 0 m − 4 i C m − 3 i C m − 3 C B iD0 iD0 C B C B : :: :: : : : C B : : : : : : C B C B C D j nC1 k B b n c C : (2) B 2 − 2 − − C B n n X n i nC1−2i X n 1 i n−2i C B 0 0 ··· x x x C B 0 i C 1 i C 1 C B iD0 iD0 C B j − k C B b n c n 1 C 2 2 B X n − i − X n − 1 − i − − C B 0 0 ··· 0 xn 2i xn 1 2i C B i i C B iD0 iD0 C B C B j n−1 k j n−2 k C B 2 2 C @ X n − 1 − i − − X n − 2 − i − − A 0 0 ··· 0 xn 1 2i xn 2 2i i i iD0 iD0 Proof. For simplicity the theorem is proved for m D 4. The same argument applies to the case m 6D 4. The proof is by induction on n. The following equality shows that (2) holds for n D 1. 0 −1 −1 1 1 1 X 1 − i − − X −i − − x x 1 2i x 2 2i 0 1 i C 3 i C 2 B iD0 iD0 C B C 0 1 B 0 − −1 − C x 1 0 0 B 1 X 1 i 2i X i −1−2i C 1 D B 0 x x x C D B0 x 1 0C Q4 .x/ B 0 i C 1 i C 1 C : B iD0 iD0 C @0 0 x 1A B C B C 0 0 1 0 B 0 0 F2.x/ F1.x/ C @ A 0 0 F1.x/ F0.x/ Suppose the statement holds for n D k.
Recommended publications
  • The Existence of Fibonacci Numbers in the Algorithmic Generator for Combinatoric Pascal Triangle
    British Journal of Science 62 September 2014, Vol. 11 (2) THE EXISTENCE OF FIBONACCI NUMBERS IN THE ALGORITHMIC GENERATOR FOR COMBINATORIC PASCAL TRIANGLE BY Amannah, Constance Izuchukwu [email protected]; +234 8037720614 Department of Computer Science, Faculty of Natural and Applied Sciences, Ignatius Ajuru University of Education, P.M.B. 5047, Port Harcourt, Rivers State, Nigeria. & Nanwin, Nuka Domaka Department of Computer Science, Faculty of Natural and Applied Sciences, Ignatius Ajuru University of Education, P.M.B. 5047, Port Harcourt, Rivers State, Nigeria © 2014 British Journals ISSN 2047-3745 British Journal of Science 63 September 2014, Vol. 11 (2) ABSTRACT The discoveries of Leonard of Pisa, better known as Fibonacci, are revolutionary contributions to the mathematical world. His best-known work is the Fibonacci sequence, in which each new number is the sum of the two numbers preceding it. When various operations and manipulations are performed on the numbers of this sequence, beautiful and incredible patterns begin to emerge. The numbers from this sequence are manifested throughout nature in the forms and designs of many plants and animals and have also been reproduced in various manners in art, architecture, and music. This work simulated the Pascal triangle generator to produce the Fibonacci numbers or sequence. The Fibonacci numbers are generated by simply taken the sums of the "shallow" diagonals (shown in red) of Pascal's triangle. The Fibonacci numbers occur in the sums of "shallow" diagonals in Pascal's triangle. This Pascal triangle generator is a combinatoric algorithm that outlines the steps necessary for generating the elements and their positions in the rows of a Pascal triangle.
    [Show full text]
  • The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on Iot Nodes in Smart Cities
    sensors Article The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities Ammar Nasif *, Zulaiha Ali Othman and Nor Samsiah Sani Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science & Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia; [email protected] (Z.A.O.); [email protected] (N.S.S.) * Correspondence: [email protected] Abstract: Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure for IoT networks. The biggest challenge of IoT networks is that the IoT may have insufficient memory to handle all transaction data within the IoT network. We aim in this paper to propose a potential compression method for reducing IoT network data traffic. Therefore, we investigate various lossless compression algorithms, such as entropy or dictionary-based algorithms, and general compression methods to determine which algorithm or method adheres to the IoT specifications. Furthermore, this study conducts compression experiments using entropy (Huffman, Adaptive Huffman) and Dictionary (LZ77, LZ78) as well as five different types of datasets of the IoT data traffic. Though the above algorithms can alleviate the IoT data traffic, adaptive Huffman gave the best compression algorithm. Therefore, in this paper, Citation: Nasif, A.; Othman, Z.A.; we aim to propose a conceptual compression method for IoT data traffic by improving an adaptive Sani, N.S.
    [Show full text]
  • The Generalized Principle of the Golden Section and Its Applications in Mathematics, Science, and Engineering
    Chaos, Solitons and Fractals 26 (2005) 263–289 www.elsevier.com/locate/chaos The Generalized Principle of the Golden Section and its applications in mathematics, science, and engineering A.P. Stakhov International Club of the Golden Section, 6 McCreary Trail, Bolton, ON, Canada L7E 2C8 Accepted 14 January 2005 Abstract The ‘‘Dichotomy Principle’’ and the classical ‘‘Golden Section Principle’’ are two of the most important principles of Nature, Science and also Art. The Generalized Principle of the Golden Section that follows from studying the diagonal sums of the Pascal triangle is a sweeping generalization of these important principles. This underlies the foundation of ‘‘Harmony Mathematics’’, a new proposed mathematical direction. Harmony Mathematics includes a number of new mathematical theories: an algorithmic measurement theory, a new number theory, a new theory of hyperbolic functions based on Fibonacci and Lucas numbers, and a theory of the Fibonacci and ‘‘Golden’’ matrices. These mathematical theories are the source of many new ideas in mathematics, philosophy, botanic and biology, electrical and computer science and engineering, communication systems, mathematical education as well as theoretical physics and physics of high energy particles. Ó 2005 Elsevier Ltd. All rights reserved. Algebra and Geometry have one and the same fate. The rather slow successes followed after the fast ones at the beginning. They left science at such step where it was still far from perfect. It happened,probably,because Mathematicians paid attention to the higher parts of the Analysis. They neglected the beginnings and did not wish to work on such field,which they finished with one time and left it behind.
    [Show full text]
  • Survey on Inverted Index Compression Over Structured Data
    Volume 6, No. 3, May 2015 (Special Issue) ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Survey on Inverted Index Compression over Structured Data B.Usharani M.TanoojKumar Dept.of Computer Science and Engineering Dept.of ComputerScience and Engineering Andhra Loyola Institute of Engineering and Technology Andhra Loyola Institute of Engineering and Technology India India e-mail:[email protected] e-mail:[email protected] Abstract: A user can retrieve the information by providing a few keywords in the search engine. In the keyword search engines, the query is specified in the textual form. The keyword search allows casual users to access database information. In keyword search, the system has to provide a search over billions of documents stored on millions of computers. The index stores summary of information and guides the user to search for more detailed information. The major concept in the information retrieval(IR) is the inverted index. Inverted index is one of the design factors of the index data structures. Inverted index is used to access the documents according to the keyword search. Inverted index is normally larger in size ,many compression techniques have been proposed to minimize the storage space for inverted index. In this paper we propose the Huffman coding technique to compress the inverted index. Experiments on the performance of inverted index compression using Huffman coding proves that this technique requires minimum storage space as well as increases the key word search performance and reduces the time to evaluate the query.
    [Show full text]
  • Image Compression Using Extended Golomb Code Vector Quantization and Block Truncation Coding
    ISSN(Online): 2319-8753 ISSN (Print): 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology (A High Impact Factor, Monthly, Peer Reviewed Journal) Visit: www.ijirset.com Vol. 8, Issue 11, November 2019 Image Compression Using Extended Golomb Code Vector Quantization And Block Truncation Coding Vinay Kumar1, Prof. Neha Malviya2 M. Tech. Scholar, Department of Electronics and Communication, Swami Vivekanand College of Science & Technology, Bhopal, India1 Assistant Professor, Department of Electronics and Communication, Swami Vivekanand College of Science & Technology, Bhopal, India 2 ABSTRACT: Text and image data are important elements for information processing almost in all the computer applications. Uncompressed image or text data require high transmission bandwidth and significant storage capacity. Designing an efficient compression scheme is more critical with the recent growth of computer applications. Extended Golomb code, for integer representation is proposed and used as a part of Burrows-Wheeler compression algorithm to compress text data. The other four schemes are designed for image compression. Out of four, three schemes are based on Vector Quantization (VQ) method and the fourth scheme is based on Absolute Moment Block Truncation Coding (AMBTC). The proposed scheme is block prediction-residual block coding AMBTC (BP-RBCAMBTC). In this scheme an image is divided into non-overlapping image blocks of small size (4x4 pixels) each. Each image block is encoded using neighboring image blocks which have high correlation among IX them. BP-RBCAMBTC obtains better image quality and low bit rate than the recently proposed method based on BTC. KEYWORDS: Block Truncation Code (BTC), Vector Quantization, Golomb Code Vector I.
    [Show full text]
  • Lelewer and Hirschberg, "Data Compression"
    Data Compression DEBRA A. LELEWER and DANIEL S. HIRSCHBERG Department of Information and Computer Science, University of California, Irvine, California 92717 This paper surveys a variety of data compression methods spanning almost 40 years of research, from the work of Shannon, Fano, and Huffman in the late 1940s to a technique developed in 1986. The aim of data compression is to reduce redundancy in stored or communicated data, thus increasing effective data density. Data compression has important application in the areas of file storage and distributed systems. Concepts from information theory as they relate to the goals and evaluation of data compression methods are discussed briefly. A framework for evaluation and comparison of methods is constructed and applied to the algorithms presented. Comparisons of both theoretical and empirical natures are reported, and possibilities for future research are suggested Categories and Subject Descriptors: E.4 [Data]: Coding and Information Theory-data compaction and compression General Terms: Algorithms, Theory Additional Key Words and Phrases: Adaptive coding, adaptive Huffman codes, coding, coding theory, tile compression, Huffman codes, minimum-redundancy codes, optimal codes, prefix codes, text compression INTRODUCTION mation but whose length is as small as possible. Data compression has important Data compression is often referred to as application in the areas of data transmis- coding, where coding is a general term en- sion and data storage. Many data process- compassing any special representation of ing applications require storage of large data that satisfies a given need. Informa- volumes of data, and the number of such tion theory is defined as the study of applications is constantly increasing as the efficient coding and its consequences in use of computers extends to new disci- the form of speed of transmission and plines.
    [Show full text]
  • ABSTRACT Title of Thesis: a LOGIC SYSTEM for FIBONACCI
    ABSTRACT Title of Thesis: A LOGIC SYSTEM FOR FIBONACCI NUMBERS EQUIVALENT TO 64-BIT BINARY Jiani Shen, Master of Science, 2018 Thesis Directed By: Professor Robert W. Newcomb, Electrical & Computer Engineering Compared to the most commonly used binary computers, the Fibonacci computer has its own research values. Making study of Fibonacci radix system is of considerable importance to the Fibonacci computer. Most materials only explain how to use binary coefficients in Fibonacci base to represent positive integers and introduce a little about basic arithmetic on positive integers using complicated but incomplete methods. However, rarely have materials expanded the arithmetic to negative integers with an easier way. In this thesis, we first transfer the unsigned binary Fibonacci representation with minimal form(UBFR(min)) into the even-subscripted signed ternary Fibonacci representation(STFRe), which includes the negative integers and doubles the range over UBFR(min). Then, we develop some basic operations on both positive and negative integers by applying various properties of the Fibonacci sequence into arithmetic. We can set the arithmetic range equivalent to 64-bit binary as our daily binary computers, or whatever reasonable ranges we want. A LOGIC SYSTEM FOR FIBONACCI NUMBERS EQUIVALENT TO 64-BIT BINARY by Jiani Shen Thesis submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of [Master of Science] [2018] Advisory Committee: Professor [Robert W. Newcomb], Chair Professor A. Yavuz Oruc Professor Gang Qu © Copyright by [Jiani Shen] [2018] Acknowledgements Sincere thanks to dear Professor Robert Newcomb. He guides me to do the thesis and reviews the papers for me diligently.
    [Show full text]
  • Variable-Length Coding: Unary Coding Golomb Coding Elias Gamma and Delta Coding Fibonacci Coding
    www.vsb.cz Analysis and Signal Compression Information and Probability Theory Michal Vašinek VŠB – Technická univerzita Ostrava FEI/EA404 [email protected] 2020, February 12th Content Classes of Codes Variable-length coding: Unary coding Golomb coding Elias Gamma and Delta coding Fibonacci coding Michal Vašinek (VŠB-TUO) Analysis and Signal Compression 1 / 22 Codes Obrázek: Classes of codes, Cover and Thomas, Elements of Information Theory, p. 106. Michal Vašinek (VŠB-TUO) Analysis and Signal Compression 2 / 22 Nonsigular code Let X be a range of random variable X, for instance the alphabet of input data. Let D be d-ary alphabet of output, for instance binary alphabet D = f0; 1g. Nonsingular Code A code is said to be nonsingular if every element of the range of X maps into different string in D∗; that is: x 6= x0 ! C(x) 6= C(x0) Michal Vašinek (VŠB-TUO) Analysis and Signal Compression 3 / 22 Nonsigular code Nonsingular Code A code is said to be nonsingular if every element of the range of X maps into different string in D∗; that is: x 6= x0 ! C(x) 6= C(x0) Let C(’a’) = 0, C(’b’)=00, C(’c’)=01 be codewords of code C. Encode the sequence s = abc, i.e. C(s) = 0 00 01 = 00001. We can decode in many ways: aaac, bac, abc. Can be solved by adding special separating symbol. For instance with code 11. Michal Vašinek (VŠB-TUO) Analysis and Signal Compression 4 / 22 Uniquely Decodable Codes Definition The extension C∗ of a code C is the mapping from finite length strings of X to finite-length strings of D, defined by: C(x1x2; : : : ; xn) = C(x1)C(x2) :::C(xn) For instance, if C(x1) = 00 and C(x2) = 11 then C(x1x2) = 0011.
    [Show full text]
  • New Classes of Random Sequences For
    NEW CLASSES OF RANDOM SEQUENCES FOR CODING AND CRYPTOGRAPHY APPLICATIONS By KIRTHI KRISHNAMURTHY VASUDEVA MURTHY Bachelor of Engineering in Instrumentation Technology Visvesvaraya Technological University Bangalore, Karnataka 2013 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE May, 2016 NEW CLASSES OF RANDOM SEQUENCES FOR CODING AND CRYPTOGRAPHY APPLICATIONS Thesis Approved: Dr. Subhash Kak Thesis Adviser Dr. Keith A Teague Dr. George Scheets ii ACKNOWLEDGEMENTS I would like to express my deep gratitude to my master’s thesis advisor Dr. Subhash Kak. He continually and convincingly conveyed a spirit of adventure and motivation in regard to research with profound patience handling me in all my tough situations. Without his persistent support, this thesis would not have been possible. I render my sincere thanks to my committee members, Dr. Keith Teague and Dr. George Scheets for their support and guidance in final stages of thesis presentation and document review. I thank Oklahoma State University for giving opportunity to utilize and enhance my technical knowledge. Lastly, I would like to thank my parents and friends for constant encouragement emotionally and financially to pursue masters and complete thesis research and document at OSU. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University. Name: KIRTHI KRISHNAMURTHY VASUDEVA MURTHY Date of Degree: MAY, 2016 Title of Study: NEW CLASSES OF RANDOM SEQUENCES FOR CODING AND CRYPTOGRAPHY APPLICATIONS Major Field: ELECTRICAL ENGINEERING Abstract: Cryptography is required for securing data in a digital or analog medium and there exists a variety of protocols to encode the data and decrypt them without third party interference.
    [Show full text]
  • Entropy Coding and Different Coding Techniques
    Journal of Network Communications and Emerging Technologies (JNCET) www.jncet.org Volume 6, Issue 5, May (2016) Entropy Coding and Different Coding Techniques Sandeep Kaur Asst. Prof. in CSE Dept, CGC Landran, Mohali Sukhjeet Singh Asst. Prof. in CS Dept, TSGGSK College, Amritsar. Abstract – In today’s digital world information exchange is been 2. CODING TECHNIQUES held electronically. So there arises a need for secure transmission of the data. Besides security there are several other factors such 1. Huffman Coding- as transfer speed, cost, errors transmission etc. that plays a vital In computer science and information theory, a Huffman code role in the transmission process. The need for an efficient technique for compression of Images ever increasing because the is a particular type of optimal prefix code that is commonly raw images need large amounts of disk space seems to be a big used for lossless data compression. disadvantage during transmission & storage. This paper provide 1.1 Basic principles of Huffman Coding- a basic introduction about entropy encoding and different coding techniques. It also give comparison between various coding Huffman coding is a popular lossless Variable Length Coding techniques. (VLC) scheme, based on the following principles: (a) Shorter Index Terms – Huffman coding, DEFLATE, VLC, UTF-8, code words are assigned to more probable symbols and longer Golomb coding. code words are assigned to less probable symbols. 1. INTRODUCTION (b) No code word of a symbol is a prefix of another code word. This makes Huffman coding uniquely decodable. 1.1 Entropy Encoding (c) Every source symbol must have a unique code word In information theory an entropy encoding is a lossless data assigned to it.
    [Show full text]
  • STUDIES on GOPALA-HEMACHANDRA CODES and THEIR APPLICATIONS. by Logan Childers December, 2020
    STUDIES ON GOPALA-HEMACHANDRA CODES AND THEIR APPLICATIONS. by Logan Childers December, 2020 Director of Thesis: Krishnan Gopalakrishnan, PhD Major Department: Computer Science Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have ap- plications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several results pertaining to these codes. We show that GHa(n) always exists for n ≥ 1 when −2 ≥ a ≥ −4, meaning that these are universal codes. We develop two new algorithms to determine whether a GH code exists for a given a and n, and to construct them if they exist. We also prove that when a = −(4 + k) where k ≥ 1, that there are at most k consecutive integers for which GH codes do not exist. In 2014, Nalli and Ozyilmaz proposed a stream cipher based on GH codes. We show that this cipher is insecure and provide experimental results on the performance of our program that cracks this cipher. STUDIES ON GOPALA-HEMACHANDRA CODES AND THEIR APPLICATIONS. A Thesis Presented to The Faculty of the Department of Computer Science East Carolina University In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Logan Childers December, 2020 Copyright Logan Childers, 2020 STUDIES ON GOPALA-HEMACHANDRA CODES AND THEIR APPLICATIONS. by Logan Childers APPROVED BY: DIRECTOR OF THESIS: Krishnan Gopalakrishnan, PhD COMMITTEE MEMBER: Venkat Gudivada, PhD COMMITTEE MEMBER: Karl Abrahamson, PhD CHAIR OF THE DEPARTMENT OF COMPUTER SCIENCE: Venkat Gudivada, PhD DEAN OF THE GRADUATE SCHOOL: Paul J. Gemperline, PhD Table of Contents LIST OF TABLES ..................................
    [Show full text]
  • Fibonacci Codes for Crosstalk Avoidance
    IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 3 (Nov. - Dec. 2013), PP 09-15 www.iosrjournals.org Fibonacci Codes for Crosstalk Avoidance 1Sireesha Kondapalli, 2Dr. Giri Babu Kande 1PG Student (M.Tech VLSI), Dept. Of ECE, Vasireddy Venkatadri Ins. Tech., Nambur, Guntur, AP, India 2 Professor & Head, Dept. Of ECE, Vasireddy Venkatadri Ins. Tech., Nambur, Guntur, AP, India Abstract: In the deep sub micrometer CMOS process technology, the interconnect resistance, length, and inter- wire capacitance are increasing significantly, which contribute to large on-chip interconnect propagation delay. Data transmitted over interconnect determine the propagation delay and the delay is very significant when adjacent wires are transitioning in opposite directions (i.e., crosstalk transitions) as compared to transitioning in the same direction. Propagation delay across long on-chip buses is significant when adjacent wires are transitioning in opposite direction (i.e., crosstalk transitions) as compared to transitioning in the same direction. By exploiting Fibonacci number system, we propose a family of Fibonacci coding techniques for crosstalk avoidance, relate them to some of the existing crosstalk avoidance techniques, and show how the encoding logic of one technique can be modified to generate code words of the other technique. Keywords: On-chip bus, crosstalk, Fibonacci coding. I. Introduction The advancement of very large scale integration (VLSI) technologies has been following Moore’s law for the past several decades: the number of transistors on an integrated circuit is doubling every two years and the channel length is scaling at the rate of 0.7/3 years.
    [Show full text]