Implement the lzw algorithm

Assignment Help Computer Engineering
Reference no: EM13323047

In this assignment, you will learn about the famous Lempel-Ziv-Welch (LZW) compression algorithm. Most compression algorithms including UNIX compress are based on the LZW algorithm. The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .

Your assignment is to implement the LZW algorithm. You can assume that the input text contains english characters (capital and small), space, and full stop. You need to write two programs - one for compressing an input text, and the other to uncompress the compressed text to the original text. To implement the dictionary of code and key, you will use a hash table. Use your own hash function, but you must use quadratic probing to resolve collisions.

 

Reference no: EM13323047

Questions Cloud

Impact of american culture on their country : Which European country has expressed the greatest concern about the impact of American culture on their country?
Generate and display on the console the elements : Generate and display on the console the elements of a one-dimensional array b[M] where each element of b[M] represents the average grade over the semester of each of the M students .
Highest ranking pirate makes a proposal : You are the highest ranking pirate of a group of five pirates which has just captured a treasure of 100 gold pieces. To divide up the treasure, the group uses the following scheme: The highest ranking pirate makes a proposal on how the treasure shoul..
How far above the diver does it appear to be : A skin diver is 2.1m below the surface of a lake. A bird flies overhead 7.2m above the surface of the lake. how far above the diver does it appear to be
Implement the lzw algorithm : The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .
Cybersecurity dr - bcp presentation : Discuss the benefits of incorporating technology-based solutions when planning for recovery and restoral of IT operations.
What is the magnitude of the electron after its collision : An incident x-ray photon is scatterted from a free electron that is initailly at rest. What is the magnitude of the electron after its collision
What is the purpose of earthly rewards according to dante : While a naive reader of Augustine would assume that all things of this world are occasions of sin, the biography of St. Louis seems to offer an alternative view. With some precision and detail, describe what significance the French King assigns to ea..
How far did it travel horizontally and vertically : A bullet is fired from at a shooting range. The bullet hits the ground after 0.32 seconds. How far did it travel horizontally and vertically in this time

Reviews

Write a Review

Computer Engineering Questions & Answers

  Impact on the quality of software available for used

Will commercial software manufacturers be justified in raising their prices to make up for revenue lost to open source competitors? Do you think that strategy will be effective.

  Think about a cellular system with a total bandwidth

Think about a cellular system with a total bandwidth

  Give an example demonstrating the explanation

explain the the importance of inheritance in allowing extensible designs, by giving an example demonstrating the explanation

  Offer the average and worst case running time

offer the average and worst case running time and the space requirements.

  Explain two types of computer attacks/ viruses

In order to limit the creation of malicious code, do you think that access to elements of document object model and some Javascript functionality be limited? In discussing the answer, describe two types of computer attacks/ viruses that may be ini..

  Write down a recurrence relation

Write down a recurrence relation

  Write down pseudo-code for the following problem

Think of scenarios when you would use a) a while-loop, b) a do-until loop, c) a for-loop. Write down one pseudo-code example for each.

  Organization to consolidate servers

Utilizing any organizational model from your experience and or research, describe the pros and cons of this organization in order to consolidate the servers and to relocate the primary data centers.

  Operation of project management

Operation of project management to the specification, design and implementation of the project -  corporate management

  Work out the matrix dimension n automatically

Write down a C++ program that uses class Matrix for dealing with the square matrices (n x n tables of integers). The class constructor has to create a dynamic nxn matrix for n passed as a parameter.

  Write down a program that ask the user to enter a word

Write down a program that ask the user for starting value and an ending value and then writes all the integers (inclusive) between those two values.

  Listing all the visual basic looping

Listing all the visual basic looping and decision constructs that you think you would need to write a program that sorts the grades for you. DO NOT write the program, simply list the constructs and justify the decision for choosing them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd