Implement the lzw algorithm

Assignment Help Computer Engineering
Reference no: EM13323047

In this assignment, you will learn about the famous Lempel-Ziv-Welch (LZW) compression algorithm. Most compression algorithms including UNIX compress are based on the LZW algorithm. The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .

Your assignment is to implement the LZW algorithm. You can assume that the input text contains english characters (capital and small), space, and full stop. You need to write two programs - one for compressing an input text, and the other to uncompress the compressed text to the original text. To implement the dictionary of code and key, you will use a hash table. Use your own hash function, but you must use quadratic probing to resolve collisions.

 

Reference no: EM13323047

Questions Cloud

Impact of american culture on their country : Which European country has expressed the greatest concern about the impact of American culture on their country?
Generate and display on the console the elements : Generate and display on the console the elements of a one-dimensional array b[M] where each element of b[M] represents the average grade over the semester of each of the M students .
Highest ranking pirate makes a proposal : You are the highest ranking pirate of a group of five pirates which has just captured a treasure of 100 gold pieces. To divide up the treasure, the group uses the following scheme: The highest ranking pirate makes a proposal on how the treasure shoul..
How far above the diver does it appear to be : A skin diver is 2.1m below the surface of a lake. A bird flies overhead 7.2m above the surface of the lake. how far above the diver does it appear to be
Implement the lzw algorithm : The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .
Cybersecurity dr - bcp presentation : Discuss the benefits of incorporating technology-based solutions when planning for recovery and restoral of IT operations.
What is the magnitude of the electron after its collision : An incident x-ray photon is scatterted from a free electron that is initailly at rest. What is the magnitude of the electron after its collision
What is the purpose of earthly rewards according to dante : While a naive reader of Augustine would assume that all things of this world are occasions of sin, the biography of St. Louis seems to offer an alternative view. With some precision and detail, describe what significance the French King assigns to ea..
How far did it travel horizontally and vertically : A bullet is fired from at a shooting range. The bullet hits the ground after 0.32 seconds. How far did it travel horizontally and vertically in this time

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to create a javascript program

Create a JavaScript program that declares and prints an array that contains at least 20 of your favorite songs. For each song, determine the best means for storing the year it was published.

  A class named customerrecord that holds customer number

create a class named CustomerRecord that holds a customer number, name, and address. Include methods to set the values for each data field and output the values for each data field. design the class diagram and write the code (not language specifi..

  Create a class named order that performs order processing

Create a class named Order that performs order processing of a single item that sells for $19.99 each. o Create 4 Order class fields: order number, customer name, quantity ordered, and total price.

  Find how to perform system calls in each operating system

Write a C++ or Java program that reads from one file and writes to another find how to perform system calls in each operating system.

  What is the capacity of a particular airplane sort

You must first determine what entities want to track. Next determine what attributes are needed for each entity, and what relations exist between these entities. You should draw an E-R diagram to show these relations. Be sure to indicate all keys...

  Problem on encryption using a one-round version of des

Problem on encryption using a one-round version of DES.

  Analze the letter grade the student has earned

suppose the full score for each assignment is 100. Student will get 0 for each unsubmitted assignment.

  Build a program to implement the selection sort algorithm

build a program to implement the selection sort algorithm, which will sort a list of strings. Selection sort function should sort the list of strings in alphabetical order. You only need to provide the details for the selectionSort() function base..

  What are two processes of conserving ip addresses

How are default subnet masks determined.What are two processes of conserving IP addresses? Explain these methods.

  What are the characteristics of application

offer examples of business applications that exhibit these characteristics. You can provide examples of applications from any client/server development environment. The two main platforms are Microsoft .NET and Sun JAVA J2EE.

  Compute the entropy and clarity of each cluster

Compute the entropy and clarity of each cluster

  Define what situations are appropriate for hard disks

define what situations are appropriate for Tape. Explain why.define what situations are appropriate for hard disks. Explain why.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd