Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)

Buy
This book deals with information processing; so it is far from being a book on information theory (which would be built on description and estimation). The reader will be shown the horse, but not the saddle. At any rate, at the very beginning, there was a series of lectures on “Information theory, through the looking-glass of an algebraist”, and, as years went on, a steady process of teaching and learning made the material evolve into the present form. There still remains an algebraic main theme: algorithms intertwining polynomial algebra and matrix algebra, in the shelter of signal theory.

A solid knowledge of elementary arithmetic and Linear Algebra will be the key to a thorough understanding of all the algorithms working in the various bit-stream landscapes we shall encounter. This priority of algebra will be the thesis that we shall defend. More concretely: We shall treat, in five chapters of increasing difficulty, five sensibly different subjects in Discrete Mathematics. The first two chapters on data compaction (lossless data compression) and cryptography are on an undergraduate level – the most difficult mathematical prerequisite will be a sound understanding of quotient rings, especially of finite fields (mostly in characteristic 2). The next two chapters are already on a graduate level; the reader should be slightly acquainted with arguments in signal theory – although Lebesque integration could remain the “grey box” that it usually is. We encounter sampling – an innocent operation of tremendous epistemological impact: the Platonic mathematician leaving his heaven of continuity (rule=truth) for the earth of discreteness (diversity=uncertainty) will be plainly comforted by the great interpolation theorems that lift him back to the heights. The chapter on error control codes which are designed according to signal theoretical ideas, complements – on a purely algebraic level – the invasion of signal theory. The fifth and final chapter is the most important, in length as well as in complexity. It deals with lossy (image) compression, and yields the mathematical background for the understanding of JPEG and JPEG 2000. Now, our Platonic mathematician will be expelled from paradise: The discrete world becomes absolute, and all continuous constructions are plainly auxiliary and relative.
(HTML tags aren't allowed.)

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices
Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices

Explores and analyzes past and current technologies and trends in multimedia communication

Digital natives—those persons born in the digital age—have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out the technologies...

Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...


Asset Protection and Security Management Handbook
Asset Protection and Security Management Handbook
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
Kanzi's Primal Language: The Cultural Initiation of Primates into Language
Kanzi's Primal Language: The Cultural Initiation of Primates into Language
Sue Savage-Rumbaugh's work on the language capabilities of the bonobo Kanzi has intrigued the world because of its far-reaching implications for understanding the evolution of the human language. This book takes the reader behind the scenes of the filmed language tests. It argues that while the tests prove that Kanzi has language, the...
A Hologram for the King
A Hologram for the King


In a rising Saudi Arabian city, far from weary, recession-scarred America, a struggling businessman pursues a last-ditch attempt to stave off foreclosure, pay his daughter’s college tuition, and finally do something great. In A Hologram for the King, Dave Eggers takes us around the world to show how one man fights...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy