Question

In: Computer Science

What would be the encoded version of the message using LZW compression technique xxyz xxy xxyz...

  1. What would be the encoded version of the message using LZW compression technique

xxyz xxy xxyz xxyz xxyz

Solutions

Expert Solution

Some Infomation about LZW encoding.

Encoded o/p :- It contain message sequence.

index :- It is unique index of a certain pattern

Initial LZW dictionary:- It contain unique letter with unique index in the given sequence.

Algo:

1. Start with initial letter of the given sequence check it already exist in the table or not . If yes, then add another next letter do the same thing.

2. Give this pattern a unique index. Write the index of the entry which match the new pattern upto second last letter in the encoded o/p row.

3.Now find the another new pattern and start with last letter of the previous pattern.

4. Repeat the these again until string exhaust.

Answer:

Encode message: 1 1 2 3 4 2 8 7 5 11 6

Note: In some other methods , They use assci codes of the letter as index but the procedure of the answer is same.


Related Solutions

What characteristics of the image matrix would be suitable for SVD compression technique (i.e., high compression...
What characteristics of the image matrix would be suitable for SVD compression technique (i.e., high compression rate).
Using a technique called randomized encryption, convert textbook AES and RSA to a secured version with...
Using a technique called randomized encryption, convert textbook AES and RSA to a secured version with an initialization vector (IV). Assume we have a message (m) with 128 bits, show how to encrypt (m) with secured AES. Explain why IEEE 802.11 (i.e., WEP) is not secure due to the inappropriate usage of an IV.
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In...
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In exclusive or, 0⊕0 = 0, 1⊕0 = 1, 0⊕1 = 1, and 1⊕1 = 0.) a. Recover the original message from the random stream and encrypted stream, by filling in the blanks in the “Recovered” and “ASCII” rows. (In the ASCII column, interpret the byte as an ASCII character and write the value in that row.) Message: ? ? ? ? ? ? ?...
QUESTION 6 A cryptographic technique that allows the creator of a message to prove that they...
QUESTION 6 A cryptographic technique that allows the creator of a message to prove that they created it, helps to provide authentication, uses public key encryption 2 points    QUESTION 7 Organization that assumes the responsibility for validating identities and certifying public keys 2 points    QUESTION 8 Attack in which falsified DNS replies are sent. An attacker hears a DNS request and then sends DNS replies with bogus A and sometimes NS resource records that are then cached by...
If you were to have completed the experiment using the Tube Formation Assay technique, what would...
If you were to have completed the experiment using the Tube Formation Assay technique, what would have been some of the expected results and what would have been some of the potential difficulties you might have encountered during the protocol?
The Gauss-Seidel method as an iterative technique often refers to an improved version of the Jacobi...
The Gauss-Seidel method as an iterative technique often refers to an improved version of the Jacobi method, since the Gauss-Seidel method generally achieves a faster convergence. Describe the difference between the Gauss-Seidel and Jacobi methods.
WHAT DOES THE ENCODED PROTEIN DO IN THE BODY?
WHAT DOES THE ENCODED PROTEIN DO IN THE BODY?
What aseptic technique practices would be most important with this patient?
What aseptic technique practices would be most important with this patient?
Suppose both the compression and the expansion were adiabatic. What would be the values of pp...
Suppose both the compression and the expansion were adiabatic. What would be the values of pp and TT when the gas reached its original volume? Express your answers in terms of some or all of the variables V0V0, T0T0, p0p0, γγ, and RR separated by a comma. Term 1: The correct answer does not depend on: P0P0, γγ. A cylinder contains nn moles of an ideal gas that is at initial temperature T0T0, volume V0V0, and pressure p0p0. The gas...
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011...
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective Repeat sliding window flow control methods? Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT