BIRLA INSTITUTE OF TECHNOLOGY, RANCHI, INDIA DEPARTMENT OF ELECTRONICS & COMM ENGINEERING

EC 7111 – INFORMATION AND CODING THEORY
Module – 1: The concept of Amount of Information, Average Information, Entropy, Information rate, Shannon’s Theorem, Channel Capacity, Capacity of a Gaussian Channel, Bandwidth – S/N Trade-off. Text Books: 1. “Principles of Communication System”, 2/e, TMH. 2. “Information Theory, Coding & Cryptography”, TMH, by Ranjan Bose, Part I, 2002, New Delhi. Module – 2: Channel Capacity & Coding: Introduction to Channel Capacity & Coding, Channel Models, Channel Capacity Theorem, Shannon Limit. Text Books: 1. “Principles of Communication System”, 2/e, TMH. 2. “Information Theory, Coding & Cryptography”, TMH, by Ranjan Bose, Part I, 2002, New Delhi. Module – 3: Error Control Coding: Introduction, Forward & Backward error Correction, Hamming Weight and Hamming Distance, Linear Block Codes, Encoding and decoding of Linear Block-codes, Parity Check Matrix, Syndrome Decoding, Hamming Codes. Text Book: 1. “Information Theory, Coding & Cryptography”, TMH, by Ranjan Bose, Part I, 2002, New Delhi. Module – 4: Cyclic Codes: Introduction, Method for generating Cyclic Codes, Matrix description of Cyclic codes, Burst error correction, Cyclic redundancy check (CRC) codes, Circuit implementation of cyclic codes. Text Books: 1. “Information Theory, Coding & Cryptography”, TMH, by Ranjan Bose, Part II, 2001, New Delhi. 2. “Communication Systems”, 4/e, by S. Haykin, Chap. 10, 2004. Module – 5: Convolutional Codes: Introduction, Polynomial description of Convolutional Codes, Generating function, Matrix description of Convolutional Codes, Viterbi Decoding of Convolutional codes.

Page 1 of 2

TMH. New Delhi.way Hashing. One. Overview of Encryption Techniques. Secret-Key Cryptography. The JPEG standard for lossless and Lossy Image Compression & Decompression. Haykin. Text Books: 1. 2001. “Communication Systems’s”. Coding & Cryptography”. Text Books: 1. 4/e. RANCHI. Data Encryption. by S. “Communication Systems”. Introduction to Image Compression. Coding & Cryptography”. Page 2 of 2 . 4/e.BIRLA INSTITUTE OF TECHNOLOGY. TMH. New Delhi. by S. 2004. Standard (DES).4. “Information Theory. pp. Articles 9. by Ranjan Bose. by Ranjan Bose. Module – 7: Data Compression Techniques: Lempel-Ziv Algorithm. INDIA DEPARTMENT OF ELECTRONICS & COMM ENGINEERING Text Books: 1. Public-Key Cryptography. 2. 2001. John Wiley & Sons. Part III. “Information Theory. TMH. “Information Theory. Haykin. Chapter 10. Part I. Digital signature. New Delhi. 2004. 2. 4/e. Coding & Cryptography”. RSA algorithm. 9. 9. 2. by Ranjan Bose. by S. Module – 6 Coding for Secure Communications: Introduction to Cryptography. “Communication Systems”. (742-760). Part II. 2001. Haykin.14.15.

Sign up to vote on this title
UsefulNot useful