Module Specification |
The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module. |
Title | Information Theory and Coding | ||
Code | ELEC415 | ||
Coordinator |
Dr X Yi Electrical Engineering and Electronics Xinping.Yi@liverpool.ac.uk |
||
Year | CATS Level | Semester | CATS Value |
Session 2022-23 | Level 7 FHEQ | Second Semester | 7.5 |
Aims |
|
To introduce the techniques used in source coding and error correcting codes, including the use of information as a measure. |
Pre-requisites before taking this module (other modules and/or general educational/academic requirements): |
Co-requisite modules: |
Learning Outcomes |
|
(LO1) After successful completion of the module the student should have: An appreciation of information sources and of the information rates available on real channels. An appreciation of techniques for making the best use of channels for efficient transmission with error protection. |
|
(LO2) After successful completion of the module the student should have: An understanding of the basic methods of source coding and error correcting codes. |
|
(S1) Critical thinking and problem solving - Critical analysis |
|
(S2) Critical thinking and problem solving - Evaluation |
|
(S3) Critical thinking and problem solving - Problem identification |
Syllabus |
|
Introduction Information measurement. Entropies and mutual information. Source coding Entropy of a zero memory source. Variable-length codes, Huffman codes. Channels Binary symmetric channel, equivocation, channel capacity. Shannon-Hartley law. Channel coding Linear block codes, Hamming distance, Hamming bound, generator and parity-check matrices, Hamming codes, cyclic codes, LDPC codes and STBC codes Convolutional codes and Turbo codes. Cryptography tranposition ciphers, substitution ciphers and Vigenère-tableau ciphers; unicity distance; symmetric and asymmetric encryption. |
Teaching and Learning Strategies |
|
Due to Covid-19, one or more of the following delivery methods will be implemented based on the current local conditions and the situation of registered students. Teaching Method 2 - Synchronous face to face tutorials (b) Fully online delivery and assessment Teaching Method 2 - On-line synchronous tutorials (c) Standard on-campus delivery with minimal social distancing Teaching Method 2 - Tutorial |
Teaching Schedule |
Lectures | Seminars | Tutorials | Lab Practicals | Fieldwork Placement | Other | TOTAL | |
Study Hours |
24 |
4 |
28 | ||||
Timetable (if known) | |||||||
Private Study | 47 | ||||||
TOTAL HOURS | 75 |
Assessment |
||||||
EXAM | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
(415) Final Exam Assessment 1 There is a resit opportunity. Standard UoL penalty applies for late submission. Assessment Schedule (When) :Semester 2 Exam period | 0 | 100 | ||||
CONTINUOUS | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
Reading List |
|
Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module. |