Angewandte Informationstheorie

  • type: Vorlesung (V)
  • chair: Fakultät f. Elektrotechnik und Informati
  • semester: WS 14/15
  • time: Montag, 11:30 - 13:00, wöchentlich
    30.35 HSI (R040)
    Montag, 15:45 - 17:15, 14-täglich
    11.10 EAS Raum 107

    20.10.2014


    20.10.2014
    27.10.2014
    03.11.2014
    10.11.2014
    17.11.2014
    24.11.2014
    01.12.2014
    08.12.2014
    15.12.2014
    22.12.2014
    12.01.2015
    19.01.2015
    26.01.2015
    02.02.2015
    09.02.2015

  • lecturer: Holger Jäkel
  • sws: 3
  • ects: 4,5
  • lv-no.: 23537
  • exam:

    mündlich

  • information:

    Voraussetzungen:
    Wahrscheinlichkeitstheorie, Nachrichtentechnik I

Vortragssprachedeutsch

Applied Information Theory

The methods of information theory defined by C. Shannon are very important for the analysis of source coding techniques. In order to provide a sound basis, the lecture starts with defining the tools of information theory. Based on information theory, both fixed and variable length coding of discrete sources are presented, and their advantages and disadvantages are discussed. Afterwards, practical methods of source coding are introduced and their properties are analyzed. Due to the fact that all methods discussed so far operate for discrete sources, information theory of continuous variables and the relations of continuous signals and their digitized versions is another subject in the lecture. This part of the lecture is complemented by deepened analysis of channel capacity and its generalization in the framework of network information theory.

Regarding the security of transmitted data, cryptography is an important element of today's communication. The algorithms of cryptology are conducted in the transmitter and map data blocks onto data blocks, thus being a coding operation. Therefore, the lecture also covers the principles of cryptology. Based on simple ciphering mechanisms, fundamental principles and problems of cryptology are discussed, and block ciphering and stream ciphering are introduced. Today's e-commerce is based on secure ad-hoc communication which provides security without prior key exchange. Originating from a short survey of mathematical basics, the principles of public-key-cryptography are described.