Compress some already compressed files

Assignment Help Basic Computer Science
Reference no: EM131045595

Suppose we have a compression function c, which takes a bit string s to a compressed string c(s).

(a) Show that for any integer N there must be a string s of length N for which length(c(s)) ≥ N; that is, no effective compression is done.

(b) Compress some already compressed files (try compressing with the same utility several times in sequence). What happens to the file size?

(c) Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.

Reference no: EM131045595

Questions Cloud

Key issues in supply chain management : 1. Explain the difficulties and key issues in supply chain management. Reference
Give the average number of byte-order conversions needed : The probability that both endpoints are big-endian is p 2 ; the probability that the two endpoints use different byte orders is 2p(1 - p).
Current cabinet secretary for lands in kenya : Name the current cabinet secretary for lands in Kenya... How many govenors are there in kenya?
Store with his own and moved them to a new : Johnson, who owned a hardware store, was indebted to Hutchinson, one of her suppliers. Johnson sold her business to Lockhart, one of Johnson's previous competitors, who combined the inventory from Johnson's store with his own and moved them to a n..
Compress some already compressed files : Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.
Management about the low pay : Three employees believe that their pay is too low, yet one of them quits, the second complains to management about the low pay and the third does nothing. Explain why these employees engaged in different behaviors even though they held the same be..
Performance on four primary groups of measures : Use the balanced scorecard or another similar tool to recommend indicators and measurements that will tell you if the company is successful or unsuccessful in progressing toward your vision through execution of  Sony corporation strategy.
Conduct research on company that uses marketing strategies : Conduct some research on 1 company that uses Cause Marketing strategies. Give a short description of the company.
Why is bit order then not relevant to presentation : [Pos81] defines (in its Appendix B) the standard network bit order. Why is bit order then not relevant to presentation formatting?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Ethical decision model to analyse the situation

A Essay Part 2 (of 2): Analysing an Ethical Dilemma Due Date: Midnight of Friday 17 October 2014, Weight: 50% (50 marks) Description: Part 2 is a new piece of work that should not include material from Part 1. As before, it is a written analysis (..

  How (it) support supply chains and business processes

How does information technology (IT) support supply chains and business processes in the global marketplace

  Compare performance-one-level split-two-level unified cache

Compare the performance (using AMAT) of a one-level split cache and a two-level unified cache system. For the one-level split cache, suppose a hit takes 2 clock cycles.

  Define average or mean

In numerical analysis the average and standard deviation is often calculated

  Determine the largest force p that can be applied to rope

The bucket has a mass of 20 kg and the coefficient of static friction between the pulley and the pin is µ= 0.3. Neglect the mass of the pulley and assume that the cable does not slip on the pulley.

  Perform the binary multiplication operations

Convert the hexadecimal number FE95 to decimal and the decimal number 98694 to hexadecimal. Be sure to show all the steps and perform the subsequent binary multiplication operations. Use as many bits as necessary to represent the result.

  A useful array populating the array processing the items

Select a task a program could perform over an array of items that would be useful. Your task must include the following: A useful array Populating the array Processing the items in the array Outputting the results of the processing (This may or may n..

  What is the application/service date and applicable release

Does it provide a new application/service, replace an existing application/service, or enhance an existing application/service?

  Communication links on the telephone network

The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication links on the telephone network between the caller and callee. Suppose the telephone network of a company named RT&T is a fre..

  Do you know anything about microsoft access

Do you know anything about Microsoft Access? Data Base mining the basics? over view of computer science?

  How can these limitations be overcome

What are the data limitations that occur when creating cookies from JavaScript® language? How can these limitations be overcome?

  What is the position of the first character in a string

1. What is the position of the first character in a string? 2. Which C++ function(s) return(s) the number of characters currently in a string? 3. Is the data type string part of the C++ language? 4. How many parameters does the substr function hav..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd