Friday, June 27, 2014

Information Theory and Coding (ITC) Semester 4 (3 Hours) May 2014

Information Theory and Coding

Information Theory and Coding (ITC)
Semester 4
(3 Hours) May 2014

 

NP-19886
[Total Marks : 80]
 

N.B: (1) Question no 1 is compulsory.  
  (2) Solve any three questions out of the remaining questions.  
       
1. (a) Explain the physical significance of Entropy in information theory 02
  (b) What is compression? List different Compression algorithms. 03
  (c) Describe Fermat's Little Theorem. 03
  (d) Find the generator and parity check matrices of a (7, 4) cyclic code with generator polynomial g (X) = 1 + X + X3. 03
  (e) What is Random Number Generation and when it is needed. 03
  (f) What are the security goals? Define Cryptography. 03
  (g) Write about Convolution Codes. 03
       
2. (a) Name the source coding techniques used in the following types of files and classify them ad lossy or lossless.
(i) .zip  (ii) .jpg  (iii) .mpg  (iv) .bmp  (v) .gif
10
  (b) Define generator and parity check matrices of a (7, 4) linear block code. Explain how to generate a linear block code using G-matrix. Explain with example. 10
       
3. (a) Describe about Discrete probability and logarithms. 10
  (b) Given Xi = {X1, X2, X3, X4, X5, X6} with probability as below:
     p(Xi) = {0.3, 0.25, 0.2, 0.12, 0.08, 0.05}.
Make Huffman code. Find efficiency of this code.
10
       
4. (a) What do you mean by Symmetric key cryptography? Explain DES in detail. 10
  (b) A (7, 4) cyclic code has a generator polynomial: g(X) = X3 + X + 1.
     (i) Draw the block diagram of encoder and syndrome calculator.
     (ii) Find generator and parity check matrices in systematic form.
10
     
5. (a) Describe with example Modular Arithmetic, Exponentiation and Congruencies. 10
  (b) Explain Diffie-Hellman Algorithm. Which attack, is it vulnerable to? 10
       
6. Write short notes on :- 20
  (a) Types of Entropy  
  (b) Digital Signature  
  (c) RLF  
  (d) Prime Number Generation  

No comments:

Post a Comment