Angewandte Informationstheorie
- type: Vorlesung (V)
- chair: Fakultät f. Elektrotechnik und Informati
- semester: WS 14/15
-
time:
Montag, 11:30 - 13:00, wöchentlich
30.35 HSI (R040)
Montag, 15:45 - 17:15, 14-täglich
11.10 EAS Raum 107
20.10.2014
weitere...
20.10.2014
27.10.2014
03.11.2014
10.11.2014
17.11.2014
24.11.2014
01.12.2014
08.12.2014
15.12.2014
22.12.2014
12.01.2015
19.01.2015
26.01.2015
02.02.2015
09.02.2015
- lecturer: Holger Jäkel
- sws: 3
- ects: 4,5
- lv-no.: 23537
-
exam:
mündlich
-
information:
Voraussetzungen:
Wahrscheinlichkeitstheorie, Nachrichtentechnik I
Vortragssprache | deutsch |
Applied Information Theory
The methods of information theory defined by C. Shannon are very important for the analysis of source coding techniques. In order to provide a sound basis, the lecture starts with defining the tools of information theory. Based on information theory, both fixed and variable length coding of discrete sources are presented, and their advantages and disadvantages are discussed. Afterwards, practical methods of source coding are introduced and their properties are analyzed. Due to the fact that all methods discussed so far operate for discrete sources, information theory of continuous variables and the relations of continuous signals and their digitized versions is another subject in the lecture. This part of the lecture is complemented by deepened analysis of channel capacity and its generalization in the framework of network information theory.
Regarding the security of transmitted data, cryptography is an important element of today's communication. The algorithms of cryptology are conducted in the transmitter and map data blocks onto data blocks, thus being a coding operation. Therefore, the lecture also covers the principles of cryptology. Based on simple ciphering mechanisms, fundamental principles and problems of cryptology are discussed, and block ciphering and stream ciphering are introduced. Today's e-commerce is based on secure ad-hoc communication which provides security without prior key exchange. Originating from a short survey of mathematical basics, the principles of public-key-cryptography are described.