Huffman coding for compression

Assignment Help Computer Engineering
Reference no: EM13306531

Description

In the last episode of the Mafghanistan trilogy, the Mamerican forces invaded liberated Mafghanistan in pursuit of mineral freedom. However, terrorist attacks spread across Mafghanistan like the oil spill from the Deepwater Horizon. You, as the Commanding General of the Mamerican forces and their Mafghan puppets allies, just discovered the book, which describes efficient algorithms for terminating insurgents, that would ensure victory in Mafghanistan. You wish to send this book to all the troops via the Internet ASAP. However, due to the astronomical deficit of the Mamerican government, you wish to compress the book to reduce your ISP charges.

Use Huffman coding for compression/decompression.

The input to compression is a sequence of 8-bit characters.

When computing the Huffman tree, do not compute the code for any character that does not exist in the input. Do not insert these characters into the min-heap.

To ensure consistent behavior between your program and mine, during the delete operation on the min-heap, you need to determine the priority of the subtrees that have the same weight. Let S and T be two subtrees. S has a higher priority than T if and only if:

S's weight is smaller than T's weight, or

S and T have the same weight, and the smallest character (in ASCII value) in any of S's leaf nodes is smaller than that in any of T's leaf nodes.

Under this definition, the delete operation should remove the subtree with the highest priority from the min-heap. Also when merging two subtrees, set the tree with the lower priority as the left subtree (whose code is 0), and the tree with the higher priority as the right subtree (whose code is 1).

You may NOT use STL classes except the string class.

Command line: Your program accepts an optional command line argument "-d":

When this argument is absent, compress the input and writes the compressed data to the output.

When this argument is present, decompress the input and writes the decompressed data to the output.

Read input from cin and write output to cout.

Uncompressed data: The uncompressed data contains a sequence of 8-bit characters. The input contains at most 232-1 characters.

Compressed data: The compressed data contains three sections:

Magic cookie. This section contains 8 characters: the string "HUFFMA5" followed by the ASCII 0 character ('\0').

Frequencies. This section contains the frequencies of all the characters from ASCII 0 to ASCII 255, even if a characer is absent from the uncompressed data. The frequency of a character is its count in the uncompressed data. Order the frequencies by the ASCII values of their corresponding characters. Write each frequency as a 4-byte unsigned integer in the little-endian form.

Compressed data. This section contains the codes of all the characters in the same order as they appear in the uncompressed data. Since this section contains a sequence of bits but the smallest unit of data is a byte in files, you need to convert bits into bytes by the following rules:

Starting from the beginning of the bit sequence, convert each sequence of 8 consecutive bits into 1 byte. If the number of bits is not a multiple of 8, pad the end of the bit sequence with 0s.

When converting 8 bits into 1 byte, let the first bit be the least significant bit (LSB) in the byte, the second bit be the second LSB, and so on.

We will test the decompression function of your program with only valid compressed data, so your program need not handle errors in the compressed data.

Reference no: EM13306531

Questions Cloud

Describe the graphical coordinate system in java : How do you specify that the color orange will be used as fill when using the Graphics class? Give the Java statement needed.
Obtain the index of refraction of the glass : Light is reflected from a glass coffee table. When the angle of incidence is 50.0 °, What is the index of refraction of the glass
Case study on vanust - a tale of two perspectives : Case study on Vanust - a tale of two perspectives
Will everything eventually be ethernet / csma/cd : Is Ethernet that good that it's the predominant form of LAN? Will everything eventually be Ethernet / CSMA/CD?
Huffman coding for compression : Huffman coding for compression - Starting from the beginning of the bit sequence, convert each sequence of 8 consecutive bits into 1 byte. If the number of bits is not a multiple of 8, pad the end of the bit sequence with 0s.
Calculate distance downwind xl at which the plume released : A powerplant is burning coal on a cold, clear winter morning at 8am with a wind speed of 2.6m/s measure at 30m and an inversion layer with its base height of 697m. The effective stack height is 30m.
Calculate the maximum coefficient of performance : It is desired to build a heat pump that has an output temperature of 31 °C. Calculate the maximum coefficient of performance for the pump when the input source is ground water at 8.1 °C
Describe the difference between the two locations at time t : The peak-hour volumes at two locations were counted and found to be equal. However, the PHFs were .85 at the first location and .60 at the second. Describe the difference between the two locations if t=5 min.
How high can that person climb the ladder before the slip : A ladder is supported by a horizontal floor and a vertical wall. Is 15 feet long and weighs 50 lbs, with the weight concentrated at its midlength. The ladder supports a person weighing 180 lbs.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Provide the menu interface to get to all the rest

Square foot to acreage and acreage to square foot conversion, this function must take a numeric value and an alphabetic value and convert from one to the other. use calculations in square footage for final pricing.

  Find an instance method whenever the method is called

A ____ reference is an automatically created variable that holds the address of an object and passes it to an instance method whenever the method is known.

  What are the benefits of networked computers

What are the advantages and drawbacks of email communication, or what if the email system went down in a major company. how will this impact productivity? Do companies rely on heavily on electronic communication today.

  What do you mean by pseudocode and case subroutine call

What do you mean by pseudocode and case Subroutine call

  Describe component method to draw the current value

Write down a program that uses the paint component method to draw the current value of a JSlider on a subclass of JPanel.

  What may cause the loss of one control file

Why must a business have its database in ARCHIVELOG mode?

  Validate the input begins with a series of characters

expalin how cookies can be used to store information on a computer and how the information can be retrieved by a PHP program. Assume that cookies are not disabled on the client.

  Display all 52 cards in a standard deck of playing cards

Display all 52 cards in a standard deck of playing cards

  Related to the polygon

Assume n=3 and P has positive area. Explain how to determine efficiently whether exactly one of the point’s q and r falls inside of P. Analyze how much time is utilized.

  Write down program that models an employee

Write down program that models an employee

  Group of data elements that describes a single entity

Which of the following data structures is a group of data elements that usually describes a single entity or event.

  Make a math tutor program in vb.net

make a math tutor program in VB.Net.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd