Post Shannon Theory
Lecturer (assistant) | |
---|---|
Number | 0000000309 |
Type | lecture with integrated exercises |
Duration | 4 SWS |
Term | Sommersemester 2023 |
Language of instruction | English |
Position within curricula | See TUMonline |
Dates | See TUMonline |
- 19.04.2023 13:15-14:45 N2409, Seminarraum
- 21.04.2023 15:00-16:30 N2409, Seminarraum
- 26.04.2023 13:15-14:45 N2409, Seminarraum
- 28.04.2023 15:00-16:30 N2409, Seminarraum
- 03.05.2023 13:15-14:45 N2409, Seminarraum
- 05.05.2023 15:00-16:30 N2409, Seminarraum
- 10.05.2023 13:15-14:45 N2409, Seminarraum
- 12.05.2023 15:00-16:30 N2409, Seminarraum
- 17.05.2023 13:15-14:45 N2409, Seminarraum
- 19.05.2023 15:00-16:30 N2409, Seminarraum
- 24.05.2023 13:15-14:45 N2409, Seminarraum
- 26.05.2023 15:00-16:30 N2409, Seminarraum
- 31.05.2023 13:15-14:45 N2409, Seminarraum
- 02.06.2023 15:00-16:30 N2409, Seminarraum
- 07.06.2023 13:15-14:45 N2409, Seminarraum
- 09.06.2023 15:00-16:30 N2409, Seminarraum
- 14.06.2023 13:15-14:45 N2409, Seminarraum
- 16.06.2023 15:00-16:30 N2409, Seminarraum
- 21.06.2023 13:15-14:45 N2409, Seminarraum
- 23.06.2023 15:00-16:30 N2409, Seminarraum
- 28.06.2023 13:15-14:45 N2409, Seminarraum
- 30.06.2023 15:00-16:30 N2409, Seminarraum
- 05.07.2023 13:15-14:45 N2409, Seminarraum
- 07.07.2023 15:00-16:30 N2409, Seminarraum
- 12.07.2023 13:15-14:45 N2409, Seminarraum
- 14.07.2023 15:00-16:30 N2409, Seminarraum
- 19.07.2023 13:15-14:45 N2409, Seminarraum
- 21.07.2023 15:00-16:30 N2409, Seminarraum
Admission information
Objectives
After successful completion of the module, students will be able to apply mathematical and conceptual methods to deal with post-Shannon communication models.
They can analyse communication scenarios and develop coding sets as well as general and specific strategies.
They can analyse communication scenarios and develop coding sets as well as general and specific strategies.
Description
Nowadays, machine-to-machine communication and machine-to-human communication are essential components of the 5th mobile generation. In order to realize these high demanding applications, the necessary latency resilience and data security requirements must be embedded in the physical domain.
Many of these applications are implemented in the sense of the Shannon transfer schemes. For this type of communication, the recipient must be able to decode all messages of the sender. The corresponding communication task is inefficient in many cases.
In contrast, new communication models can lead to significant performance increases. An example is the identification scheme of Ahlswede and Dueck when it is suitable for the aforementioned applications. In this scenario, the recipient only wants to decide whether the transmitter has sent a relevant message or not. Of course, the station has no prior information about the news that the recipient keeps important. The relevance of certain messages for the receiver can be changed during the application.
Many of these applications are implemented in the sense of the Shannon transfer schemes. For this type of communication, the recipient must be able to decode all messages of the sender. The corresponding communication task is inefficient in many cases.
In contrast, new communication models can lead to significant performance increases. An example is the identification scheme of Ahlswede and Dueck when it is suitable for the aforementioned applications. In this scenario, the recipient only wants to decide whether the transmitter has sent a relevant message or not. Of course, the station has no prior information about the news that the recipient keeps important. The relevance of certain messages for the receiver can be changed during the application.
Prerequisites
Interest in mathematical modelling and
basic knowledge of information theory.
basic knowledge of information theory.