Compress some already compressed files

Assignment Help Basic Computer Science
Reference no: EM131045595

Suppose we have a compression function c, which takes a bit string s to a compressed string c(s).

(a) Show that for any integer N there must be a string s of length N for which length(c(s)) ≥ N; that is, no effective compression is done.

(b) Compress some already compressed files (try compressing with the same utility several times in sequence). What happens to the file size?

(c) Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.

Reference no: EM131045595

Questions Cloud

Key issues in supply chain management : 1. Explain the difficulties and key issues in supply chain management. Reference
Give the average number of byte-order conversions needed : The probability that both endpoints are big-endian is p 2 ; the probability that the two endpoints use different byte orders is 2p(1 - p).
Current cabinet secretary for lands in kenya : Name the current cabinet secretary for lands in Kenya... How many govenors are there in kenya?
Store with his own and moved them to a new : Johnson, who owned a hardware store, was indebted to Hutchinson, one of her suppliers. Johnson sold her business to Lockhart, one of Johnson's previous competitors, who combined the inventory from Johnson's store with his own and moved them to a n..
Compress some already compressed files : Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.
Management about the low pay : Three employees believe that their pay is too low, yet one of them quits, the second complains to management about the low pay and the third does nothing. Explain why these employees engaged in different behaviors even though they held the same be..
Performance on four primary groups of measures : Use the balanced scorecard or another similar tool to recommend indicators and measurements that will tell you if the company is successful or unsuccessful in progressing toward your vision through execution of  Sony corporation strategy.
Conduct research on company that uses marketing strategies : Conduct some research on 1 company that uses Cause Marketing strategies. Give a short description of the company.
Why is bit order then not relevant to presentation : [Pos81] defines (in its Appendix B) the standard network bit order. Why is bit order then not relevant to presentation formatting?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a statement that''s reads an integer value

Write a statement That's reads An integer value from Standard imput Val. Assume val Has already been declared as int variable. Assume Also stdin is a variable That reference A scanner object Associated with standard imput.

  What is the difference between the if then elseif

What is the difference between the If Then ElseIF clause and a Nested If Block? Please provide examples of how you would use each.

  Create method takes two integers input parameters and cheks

Create a method that takes two integers input parameters and checks whether one number is divisible by the other

  The game tic-tac-toe

For your first assignment, download the linked file below. This is a .cpp file of the game Tic-Tac-Toe. Unzip the file, and run the game. Play a few games and begin to analyze the artificial intelligence that is currently programmed. Then, rev..

  Return a version of the given array

Return a version of the given array where all the 10's have been removed

  Methods for information systems can become vulnerable

While word weakness seems to define it pretty well, there are a number of mthods that information systems can become vulnerable.

  Steps to diagnose application changed from original state

Write down steps would you take in diagnosing the application which has been changed from its original state? Describe the answer.

  Program that determines for each of the five hands

Write a program that determines, for each of the five hands of the game, whether or not then Ace is played.

  Hardware affect this advantage

Write a 200- to 300-word short answer response that addresses the following: What competitive advantage does technology give to business? How does aging hardware affect this advantage?

  Look through a newspaper and circulars for advertisement

Look through a newspaper and circulars for advertisement for training and education in security- and technology-related areas. What are the costs of the advertised security training? Network certification ? General computer training?

  What window events can a program handle

What is the paintComponent method? How is it used in Java graphics? How does a program intentionally cause the paintComponent method to execute?

  Write instructions to move value of register and add them

Write instructions to move value 34H into register A and value 3FH into register B, then add them together. Where is the result

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd