Navigation

19E033TIK - Information Theory and Coding

Course specification
Course title Information Theory and Coding
Acronym 19E033TIK
Study programme Electrical Engineering and Computing
Module
Type of study bachelor academic studies
Lecturer (for classes)
Lecturer/Associate (for practice)
Lecturer/Associate (for OTC)
ESPB 6.0 Status mandatory
Condition no prerequisite
The goal A systematic explanation of the basics of source and channel coding and elements of Information theory based cryptography.
The outcome Provide students with the ability to understand basic principles of information theory and design of advanced error control coding algorithms. In addition, they will be able to understand basic compression and cryptography methods, as well as their applications in telecommunications, artificial intelligence and bioinformatics.
Contents
URL to the subject page http://telit.etf.rs/kurs/teorija-informacija-i-kodovi-u-telekomunikacijama/
URL to lectures https://teams.microsoft.com/l/team/19%3aPkGobfnOxYH5dYE7bTMW_5P6pElXgl7gIaqTlk_KxIY1%40thread.tacv2/conversations?groupId=f6e12099-055e-4229-b64a-7ef2164919b0&tenantId=1774ef2e-9c62-478a-8d3a-fd2a495547ba
Contents of lectures Introduction to information theory. Entropy. Information sources, trellis. Source coding theorem. Lossless data compression. Channel capacity. Information gain and pattern recognition. Channel coding theorem. Linear block codes. Interleaving. Cyclic and convolutional codes. Iterative decoding. Information theory and artificial intelligence. Cryptography, symmetric and asymmetric cryptosystems.
Contents of exercises Exercises and laboratory exercises.
Literature
  1. D. Drajic, P. Ivanis, Introduction in Information Theory and Coding, 4th ed., Academic Mind, Belgrade, 2018.
  2. P. Ivanis, Information Theory and Coding - Solved Problems, Academic Mind, Belgrade, 2013.
  3. T. M. Cover, J.A. Thomas, Elements on Information Theory, John Wiley & Sons, 2nd ed., 2006. (Original title)
  4. S. Lin, D. J. Costello, Error Control Coding, Fundamentals and Applications, 2nd ed., Prentice Hall, New Jersey, 2004. (Original title)
  5. B. Scheiner, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, 2nd ed., 1996 (Original title)
Number of hours per week during the semester/trimester/year
Lectures Exercises OTC Study and Research Other classes
3 1 1
Methods of teaching Lectures, exercises, laboratory exercises
Knowledge score (maximum points 100)
Pre obligations Points Final exam Points
Activites during lectures 0 Test paper 70
Practical lessons 0 Oral examination 0
Projects
Colloquia 30
Seminars 0