您好,欢迎光临有路网!
信息论编码与密码学(英文版)
QQ咨询:
有路璐璐:

信息论编码与密码学(英文版)

  • 作者:Ranjan Bose
  • 出版社:机械工业出版社
  • ISBN:9787111127703
  • 出版日期:2003年09月01日
  • 页数:300
  • 定价:¥30.00
  • 分享领佣金
    手机购买
    城市
    店铺名称
    店主联系方式
    店铺售价
    库存
    店铺得分/总交易量
    发布时间
    操作

    新书比价

    网站名称
    书名
    售价
    优惠
    操作

    图书详情

    内容提要
    大多数介绍信息论和编码学的书,不是太过学术化,就是太过简单。本书避免了上述缺点,既考虑到 了数学的严谨性,又充分考虑了易读性。
    本书的主要特点 详细介绍了网格编码调制(TCM).并**介绍了加性高斯白噪声(AWGN)和衰退倍道。 以大量示例仔细描述了信源编码。 深入讨论了TurboCode。 简要介绍了线性代数。 通过精心挑选的115道例题及115道练习题,清晰透彻地讲解了深奥的理论知识和定义。
    通过大量篇幅论述了密码学,包括基本原理。私钥和公钥密码,当今通用的加密标准及*新发展趋势。 “叙述流畅,通过大量示例及**的解说透彻地论述了各个主题。” ——审稿人 作者简介 RanjanBose子宾夕法尼亚大学获得博士学位,现在是德里印度理工大学的副教授,他曾任加州 圣何塞的联合半导体公司的**设计工程师。
    目录
    Preface
    Acknowledgements
    Part I
    Information Theory and Source Coding
    1. Source Coding 3
    1.1 Introduction to Information Theory 3
    1.2 Uncertainty And Information 4
    1.3 Average Mutual Information And Entropy 11
    1.4 Information Measures For Continuous Random Variables 14
    1.5 Source Coding Theorem 15
    1.6 HuffmanCoding 21
    1.7 The Lempel-Ziv Algorithm 28
    1.8 Run Length Encoding and the PCX Format 30
    1.9 Rate Distortion Function 33
    1.10 Optimum Quantizer Design 36
    1.11 Introduction to Image Compression 37
    1.19 TheJpeg Standard for Lossless Compression 38
    1.13 TheJpeg Standard for Lossy Compression 39
    1.14 Concluding Remarks 41
    Summary 42
    Problems 44
    Computer Problems 46
    2. Channel Capacity and Coding 47
    2.1 Introduction 47
    2.2 Channel Models 48
    2.3 Channel Capacity 50
    2.4 Channel Coding 52
    2.5 Information Capacity Theorem 56
    2.6 The Shannon Limit 59
    2.7 Random Selection of Codes 61
    2.8 Concluding Remarks 67
    Summary 68
    Problems 69
    Computer Problems 71
    Part II
    Error Control Coding
    (Channel Coding)
    3. Linear Block Codes for Error Correction 75
    3.1 Introduction to Error Correcting Codes 75
    3.2 Basic Definitions 77
    3.3 Matrix Description of Linear Block Codes 81
    3.4 Equivalent Codes 82
    3.5 Parity Check Matrix 85
    3.6 Decoding of a Linear Block Code 87
    3.7 Syndrome Decoding 94
    3.8 Error Probability after Coding (Probability of Error Correction) 95
    3.9 Perfect Codes 97
    3.10 Hamming Codes 100
    3.11 Optimal Linear Codes 102
    3.12 Maximum Distance Separable (MDS) Codes 102
    3.13 Concluding Remarks 102
    Summary 103
    Problems 105
    Computer Problems 106
    4. Cyclic Codes 108
    4.1 Introduction to Cyclic Codes 108
    4.2 Polynomials 109
    4.3 The Division Algorithm for Polynomials 110
    4.4 A Method for Generating Cyclic Codes 115
    4.5 Matrix Description of Cyclic Codes 119
    4.6 Burst Error Correction 121
    4.7 Fire Codes 123
    4.8 Golay Codes 124
    4.9 Cyclic Redundancy Check (CRC) Codes 125
    4.10 Circuit Implementation of Cyclic Codes 128
    4.11 Concluding Remarks 132
    Summary 132
    Problems 134
    Computer Problems 135
    5. Bose-Chaudhuri Hocquenghem (BCH) Codes
    5.1 Introduction to BCH Codes 136
    5.2 Primitive Elements 137
    5.3 Minimal Polynomials 133
    5.4 Generator Polynomials in Terms of Minimal Polynomials 141
    5.5 Some Examples of BCH Codes 143
    5.6 Decoding of BCH Codes 147
    5.7 Reed-Solomon Codes 150
    5.8 Implementation of Reed-Solomon Encoders and Decoders 153
    5.9 Nested Codes 153
    5.10 Concluding Remarks 155
    Summary 156
    Problems 157
    Computer Problems 158
    6. Convolutional Codes
    6.1 Introduction to Convolutional Codes 159
    6.2 Tree Codes and Trellis Codes 160
    6.3 Polynomial Description of Convolutional Codes
    (Analytical Representation) 165
    6.4 Distance Notions for Convolutional Codes 170
    6.5 The Generating Function 173
    6.6 Matrix Description of Convolutional Codes 776
    6.7 Viterbi Decoding of Convolutional Codes 178
    6.8 Distance Bounds for Convolutional Codes 185
    6.9 Performance Bounds 187
    6.10 Known Good Convolutional Codes 188
    6.11 Turbo Codes 190
    6.12 Turbo Decoding 192
    6.13 Concluding Remarks 198
    Summary 199
    Problems 201
    Computer Problems 203
    7. Trellis Coded Modulation 206
    7.1 Introduction to TCM 206
    7.2 The Concept of Coded Modulation 207
    7.3 Mapping by Set Partitioning 212
    7.4 Ungerboeck's TCM Design Rules 216
    7.5 Tcm Decoder 220
    7.6 Performance Evaluation for Awgn Channel 221
    7.7 Computation of dfree 227
    7.8 Tcm for Fading Channels 228
    7.9 Concluding Remarks 232
    Summary 233
    Problems 234
    Computer Problems 238
    Part III
    Coding for Secure Communications
    8. Cryptography 241
    8.1 Introduction to Cryptography 241
    8.2 An Overview of Encryption Techniques 242
    8.3 Operations Used By Encryption Algorithms 245
    8.4 Symmetric (Secret Key) Cryptography 246
    8.5 Data Encryption Standard (DES) 248
    8.6 International Data Encryption Algorithm (IDEA) 252
    8.7 RC Ciphers 253
    8.8 Asymmetric (Public-Key) Algorithms 254
    8.9 The RSA Algorithm 254
    8.10 Pretty Good Privacy (PGP) 256
    8.11 One-Way Hashing 253
    8.12 Other Techniques 260
    8.13 Secure Communication Using Chaos Functions 261
    8.14 Cryptanalysis 262
    8.15 Politics of Cryptography 264
    8.16 Concluding Remarks 265
    Summary 268
    Problems 269
    Computer Problems 271
    Index 273
    编辑推荐语
    经典原版书库---信息论、编码与密码学(英文版)。

    与描述相符

    100

    北京 天津 河北 山西 内蒙古 辽宁 吉林 黑龙江 上海 江苏 浙江 安徽 福建 江西 山东 河南 湖北 湖南 广东 广西 海南 重庆 四川 贵州 云南 西藏 陕西 甘肃 青海 宁夏 新疆 台湾 香港 澳门 海外