12 views

Uploaded by Tony Kennedy Anthonysamy

This document contain logic gates, 2's complement and also about data compression

- 04310806
- pdfjoiner(3).pdf
- Introduction to PHP - SpringPeople
- RFUMS
- Codecs
- IPR2015-01216
- Digital Representation
- An Enhanced Low Bit Rate Audio Codec Using Discrete Wavelet
- 61_Audio
- Ch 5 Data Pre Processing
- 50120130406040
- [IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranjana Batham
- Ieee Transactions on Learning Technologies, Manuscript Id
- CIS 115 Lecture05 VB-Variables
- Multimedia Patent Trust v. LG Electronics et. al.
- O'Connor -- Floating Point Arithmetic, DAMC Talk 2005
- 4. Optimum Operational.full
- Low Power VLSI Architectures for One Bit Transformation
- Vlsi Project Topics
- Streaming Technique

You are on page 1of 36

Assignment 2

LIST OF QUESTION

Question 1 ----- Logic Gate

QUESTION 1

Given an expression; Y =(AB + BC). (AB + CD).

QUESTION 1(I)

Y = (AB + BC) . (AB + CD)

Y = (0.(1)) + (1.(1)) . [((0).1) + (1.0)] Y = [(0.0) + (1.0)] . [(1.1) + (1.0)] Y = (0 + 0) . (1 + 0) Y = (0) . (1)' Y = (0.0) Y=0

QUESTION 1(II)

Generate the truth table to list out all possible combinations for the expression given above. Y = (AB + BC) . (AB + CD)

OUTPUT

QUESTION 1(III)

Sketch out the logic gate symbol for this equation. Y = (AB + BC) . (AB + CD)

QUESTION 2

Perform binary subtraction in eight bits of 2s complement system for -7610 with -351o by listing out all the working steps clearly.

QUESTION 2

QUESTION 2

QUESTION 2

QUESTION 3(I)

Explain in detail about Data Compression. Identify TWO main techniques applied in data compression and explained them in detail.

QUESTION 3(I)

Run-length

Huffman

Lempel Ziv

JPEG

MPEG

MP3

QUESTION 3(I)

Run-length encoding is probably the simplest method of compression. It can be used to compress data made of any combination of symbols.

QUESTION 3(I)

Huffman coding assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.

Table 1

QUESTION 3(I)

QUESTION 3(I)

Note :

It does not matter how the characters are arranged. I have arranged it above so that the final code tree looks nice and neat. It does not matter how the final code tree are labelled (with 0s and 1s). I chose to label the upper branches with 0s and the lower branches with 1s. Huffman codes are not unique.

QUESTION 3(I)

Lempel Ziv (LZ) encoding is an example of a category of algorithms called dictionary-based encoding. The idea is to create a dictionary (table) of strings used during the communication session.

Steps :

1. Initialize the dictionary to contain all blocks of length one (D={a,b}). 2. Search for the longest block D which has appeared in the dictionary. 3. Encode D by its index in the dictionary. 4. Add D followed by the first symbol of the next block to the dictionary.

QUESTION 3(I)

QUESTION 3(I)

There are three major types of lossy data compression technique. They are as follows: Lossy transform codecs Lossy predictive codecs Chroma subsampling

QUESTION 3(I)

Lossy transfrom codecs Generally used for JPEG images only. The picture is taken, they are then chopped into smaller segments. Then transformed into a new image. The resulted image has fewer colours than its original.

QUESTION 3(I)

Lossy predictive codecs

In predictive codecs, previous and/or subsequent decoded data is used to predict the compressed image frame.

QUESTION 3(I)

Chroma subsampling Its takes into account that the human eye perceives changes in brightness more sharply than changes of colour. Takes advantage of it by dropping or averaging some chroma information. While maintaining luma information.

QUESTION 3(II)

Explain in detail any FIVE data types that you have studied.

QUESTION 3(II)

Type 1: Integer data The integer data kind basically represents complete numbers and the value jumps from one value to another. Integers are embodied in a computer as a group of binary digits.

QUESTION 3(II)

QUESTION 3(II)

Type 2: Boolean data Boolean is a data kind that has two benefits that are true or false kinds of data. A Boolean table column will encompass whichever thread benefits of "True" and "False" or the numeric equivalent representation, alongside 0 being false and 1 being true.

QUESTION 3(II)

QUESTION 3(II)

Type 3: Character data

A character is any space, number, punctuation mark, letter, or symbol that can be typed on a computer.

QUESTION 3(II)

QUESTION 3(II)

Type 4: Floating point number data

As the term implies, floating point numbers are numbers that encompass floating decimal points.

QUESTION 3(II)

QUESTION 3(II)

Type 5: Alphanumeric data

A string is a data type utilized in software design, such as an integer and floating point, but is utilized to embody text rather than numbers

QUESTION 3(II)

- 04310806Uploaded byMilagros Mercedes Olmos Cervantes
- pdfjoiner(3).pdfUploaded byMahaveer Suthar
- Introduction to PHP - SpringPeopleUploaded bySpringPeople
- RFUMSUploaded bySivakumar Thangarajan
- CodecsUploaded byarpan47
- IPR2015-01216Uploaded by304024
- Digital RepresentationUploaded bySihHeng
- An Enhanced Low Bit Rate Audio Codec Using Discrete WaveletUploaded byHiep Truong
- 61_AudioUploaded byVu Hung Cuong
- Ch 5 Data Pre ProcessingUploaded bySanjana Agarwal
- 50120130406040Uploaded byIAEME Publication
- [IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranjana BathamUploaded byInternational Journal of Engineering and Techniques
- Ieee Transactions on Learning Technologies, Manuscript IdUploaded byCarsten Ullrich
- CIS 115 Lecture05 VB-VariablesUploaded byVikash Yadav
- Multimedia Patent Trust v. LG Electronics et. al.Uploaded byPriorSmart
- O'Connor -- Floating Point Arithmetic, DAMC Talk 2005Uploaded byDerek O'Connor
- 4. Optimum Operational.fullUploaded byTJPRC Publications
- Low Power VLSI Architectures for One Bit TransformationUploaded byJohn Leons E
- Vlsi Project TopicsUploaded byverilogcourseteam
- Streaming TechniqueUploaded byShanmugapriyaVinodkumar
- 10. Comp Sci - Image Steganography - Hardikkumar v. DesaiUploaded byTJPRC Publications
- CUploaded byattique
- c2-10s04.pdfUploaded byLakkepogu Ashok
- ResumeUploaded byPavan Kumar
- CN-2 MARKSUploaded byShriRaji
- Chapter 3Uploaded byRahul Jaiswal
- CSC101_L2 - Basic JavaUploaded byBryan Gallego
- paper1Uploaded bymehtaaditya28
- ArraysUploaded bymariana
- Nfocube CompressionUploaded bySuraj Reddy

- Practical Inference - Georg-Henrik Von WrightUploaded byMarcela
- IEEE Format 4 Journal PaperUploaded byTinu Paul
- PlatesUploaded byCharles Ritter
- 221639253 Algorithm Graph TheoryUploaded bySagnik Saha
- OIF-SPI4-2.01Uploaded byhortj
- Shark SuspensionUploaded bySuman Raj
- 2013 Art Glass - 004_041Uploaded byjdrmyers
- Buchmueller, Rueckl, WylerUploaded byzcapg17
- BCA_VI_May_2013_553198501Uploaded byshubham
- ghytUploaded byxneo
- nc3Uploaded byyash_ganatra
- Decimals NewUploaded byBoni Sánchez
- Seismic Superheroes - Evolutia Explicatiilor Despre CutremureUploaded byEalangi Ionut
- PhD Thesis-roller CompactionUploaded byJiang Zhang
- UWEZO REPORT 2013 - The state of Literacy and Numeracy Across East AfricaUploaded byjadwongscribd
- Article - On Multi-Objective Optimization Heuristics for NSPUploaded byDavid
- Physics of BridgesUploaded bythe-spirit
- 1stMailboxFebMar2014Uploaded bykmachamer
- The atomic construct a discussionUploaded byBranko R Babic
- Magnetostatics.pdfUploaded byrizwan
- Bachelor of Business AdministrationUploaded byKamala Kanta Dash
- Introduction.docUploaded byAlex Negulescu
- ch07.pptxUploaded byThành Nguyễn
- Chapter 2.pptUploaded byshakirah277
- Template Journal MS Word 0425 2015Uploaded byKekek Brunei
- Arup Blockchain Technology ReportUploaded byakiro
- ee4015_1Uploaded byAntonio Martinez
- IV Sem AssignmentUploaded byRabsimranSingh
- Matilda TranscriptUploaded bykasie
- Flow Routing TechniquesUploaded byFaye Gacosta