Starting from:

$25

CS 300  - Data Structures - Homework 2 - Solved

Introduction  
In this assignment you will implement an algorithm for data compression. The purpose of data compression is to take a file A and, within a reasonable amount of time, transform it into another file B in such a way that: (i) B is smaller than A, and (ii) it is possible to reconstruct A from B.  A program that converts A into B is called a compressor, and one that undoes this operation is called an uncompressor.  Popular programs such as WinZip perform this function, among others.  Compressing data enables us to store data more efficiently on our storage devices or transmit data faster using communication facilities since fewer bits are needed to represent the actual data.

 

Of course, a compressor cannot guarantee that the file B will always be smaller than A. It is easy to see why: if this were possible, then imagine what would happen if you just kept iterating the method, compressing the output of the compressor. In fact, with a little bit of thinking, you should be able to convince yourself that any compressor that compresses some files must also actually enlarge some files. (Understand why this should be the case!) Nevertheless, compressors tend to work pretty well on the kinds of files that are typically found on computers, and they are widely used in practice.  

 

The Ziv-Lempel Algorithm  
The algorithm that you will implement is a version of the Ziv-Lempel data compression algorithm, which is the basis for must popular compression programs such as winzip, zip or gzip. At first, you may find this algorithm a little difficult to understand, but in the end, the program that you will write to implement it should not be very long.  

 

Ziv-Lempel is an example of an adaptive data compression algorithm. What this means is that the code that the algorithm uses to represent a particular sequence of bytes in the input file will be different for different input files, and may even be different if the same sequence appears in more than one place in the input file.  

 

This is how the algorithm operates:  The Ziv-Lempel compression method maps strings of input characters into numeric codes. To begin with, all characters that may occur in the text file (that is, the alphabet) are assigned a code. For example, suppose the input file to be compressed has the string:

 

aaabbbbbbaabaaba
 

This string is composed of the characters 'a' and 'b'. Assuming our alphabet of symbols is just {a, b}, initially 'a' is assigned the code 0 and 'b' the code l.  The mapping between character strings and their codes is stored in a dictionary.  Each dictionary entry has two fields:  key and code. The character string represented by code is stored in the field key. The initial dictionary for our example is given by the first two columns below (i.e., the shaded part with codes 0 and l):

 

Code
0
1
2
3
4
5
6
7
Key
a
b
aa
aab
bb
bbb
bbba
aaba
 

 

Beginning with the dictionary initialized as above, the Ziv-Lempel compressor repeatedly finds the longest prefix, p, of the unencoded part of the input file that is in the dictionary and outputs its code. If there is a next character c in the input file, then pc (pc is the prefix string p followed by the character c) is assigned the next code and inserted into the dictionary. This strategy is called the Ziv-Lempel rule.

 

Let us try the Ziv-Lempel method on our example string. The longest prefix of the input that is in the initial dictionary is 'a'. Its code, 0, is output, and the string 'aa' (p = ‘a’ and c = ‘a’) is assigned the code 2 and entered into the dictionary.  'aa' is the longest prefix of the remaining string that is in the dictionary. Its code, 2, is output; the string 'aab' (p = ‘aa’, c =’b’) is assigned the code 3 and entered into the dictionary. Notice that even though 'aab' has the code 3 assigned to it, only the code 2 for 'aa' is output. The suffix 'b' will be part of the next code output. The reason for not outputting 3 is that the code table is not part of the compressed file. Instead, the code table has to be reconstructed during decompression using the compressed file.  This reconstruction is possible only if we adhere strictly to the Lempel-Ziv rule. 

 

Following the output of the code 2, the code for 'b' is output; 'bb' is assigned the code 4 and entered into the code dictionary. Then, the code for 'bb' is output, and 'bbb' is entered into the table with code 5. Next, the code 5 is output, and 'bbba' is entered with code 6. Then, the code 3 is output for 'aab', and 'aaba' is entered into the dictionary with code 7. Finally, the code 7 is output for the remaining string 'aaba'. Our sample string is thus encoded as the sequence of codes: 0 2 1 4 5 3 7.

 

The decompression algorithm proceeds as follows:  For decompression, we input the codes one at a time and replace them by the texts they denote. The code-to-text mapping can be reconstructed in the following way. The codes assigned for single character texts are entered into the dictionary at the initialization (just as we did for compression).  As before, the dictionary entries are code-text pairs. This time, however, the dictionary is searched for an entry with a given code (rather than with a given string). The first code in the compressed file must correspond to a single character (why?) and so may be replaced by the corresponding character (which is already in the dictionary!) For all other codes x in the compressed file, we have two cases to consider:  

(i)                 The code x is already in the dictionary: When x is in the dictionary, the corresponding text, text(x), to which it corresponds, is extracted from the dictionary and output. Also, from the working of the compressor, we know that if the code that precedes x in the compressed file is q and text (q) is the corresponding text, then the compressor would have created a new code for the text text(q) followed by the first character (that we will denote by fc(x)), of text(x) (Understand why this is the case!)  So, we enter the pair (next code, text(q)fc(x)) into the dictionary.   

 

(ii)              The code x is NOT in the dictionary: This case arises only when the current text segment has the form text(q)text(q)fc(q) and text(x) = text(q)fc(q) (Understand why this is the case!) The corresponding compressed file segment is qx. During compression, text(q)fc(q) is assigned the code x, and the code x is output for the text text(q)fc(q). During decompression, after q is replaced by text(q), we encounter the code x. However, there is no code-to-text mapping for x in our table. We are able to decode x using the fact that this situation arises only when the decompressed text segment is text(q)text(q)fc(q). When we encounter a code x for which the code-to-text mapping is undefined, the code-to-text mapping for x is text(q)fc(q), where q is the code that precedes x in the file.

 

 

Let us try this decompression scheme on our earlier sample string aaabbbbbbaabaaba 

which was compressed into the code sequence 0 2 1 4 5 3 7.  

 

1.      To begin, we initialize the dictionary with the pairs (0, a) and (l, b), and obtain the first two entries in the dictionary above.  

 

2.      The first code in the compressed file is 0. It is replaced by the text 'a'.  

 

3.      The next code, 2, is undefined. Since the previous code 0 has text (0) = 'a', fc(0)='a' then text(2) = text(0)fc(0) = 'aa'.  So, for code 2, 'aa' is output, and (2, 'aa') is entered into the dictionary.  

 

4.      The next code, 1, is replaced by text(1) = ‘b’ and (3, text(2)fc(l) ) = (3, 'aab') is entered into the dictionary.  

 

5.      The next code, 4, is not in the dictionary.  The code preceding it is 1 and so text(4)= text(l)fc(l)= 'bb'. The pair (4, 'bb') is entered into the dictionary, and 'bb' is output to the decompressed file.   

 

6.      When the next code, 5, is encountered, (5, 'bbb') is entered into the dictionary and 'bbb' is output to the decompressed file.  

 

7.      The next code is 3 which is already in the dictionary so text(3) = 'aab' is output to the decompressed file, and the pair (6, text (5)fc(3)) = (6, 'bbba') is entered into the dictionary.   

 

8.      Finally, when the code 7 is encountered, (7, text(3)fc(3)) = (7, 'aaba') is entered into the dictionary and ‘aaba' output.

 

 

Implementing the Ziv-Lempel Algorithm
The basic data structure used by the Ziv-Lempel compression algorithm is a hash table.  The hash table stores objects that consist of a string and the corresponding code that is assigned.  During compression you will insert new (string, code) pairs to the hash table (obviously hashing on just the string part), or query the hash table with a string and if it is there, obtain the code associated so that you can output it

 

One implementation restriction is that you should be able to assign a maximum number codes. Let us assume for this homework that you will need at most 4096 codes. (This means that you will be able to store only 4095 distinct strings including the single character strings.) Please note that codes 0 through 255 will be used for single character strings (although you will never encounter the character with value 0 in your input.) So the first code that YOUR PROGRAM will assign will be 256.  If during compression you find that you need more codes, you do not generate new codes but just use the available codes. This will give you less compression but otherwise it is not a problem.

 

The algorithm for uncompressing a file is actually simpler.  You need to keep an array (of size 4096) of strings.  This array is initialized for the first 256 singles character strings, so that for instance, array position, 65 (which corresponds to ASCII symbol A) contains or points to the string ″A″.  Starting with position 256, new character strings that are composed as described above for decompression are added to this table.  You can use a null pointer to detect that a string for a code is not yet composed.  

 

You should convince yourself that these two data structures should be sufficient for you to implement the compression and decompression algorithms.

 

Your Task
 

You will complete the following for this homework:

 

•      You will design and implement a hash table class using open addressing with linear probing. You can use the code available on the lecture slides for hash tables with quadratic probing if you want, and modify it (hopefully after understanding how it works) or you can design you own hash table class. But please make sure that your hash table is general and works for any arbitrary object class that overloads the operator == and/or != .  You will lose points if your hash-table class is not general. 

 

•      You will write two programs: The first one that you will call compress, will perform compression.  To avoid a number of problems we will make this program actually print out the sequence of codes as integers with one space between each integer with no spaces at the beginning of the file and exactly one space at the end of the file after the last integer code written. Actual compression will involve rather disgusting C++ details such a binary input/output, bit packing, etc., which is really beyond the scope of this homework. Thus, you will not actually compress but pretend you are compressing and print the sequence of integer codes for the file to be compressed. The compression program will read the input from a file called compin and will produce a file called compout.  

 

•      The second program that you will call decompress will perform decompression. It should be able to read the file compout and produce a file decompout. Obviously the contents of compin and decompout should be equal if you programs are working correctly.

 


 

•      Prepare two project folders: name one compress-program and name the second one decompress-program. Put your respective projects into the right folder and then put the two folders into a folder called XXXX-NameLastname where XXXX is your student number. Make sure you do NOT use any Turkish characters in the folder name.  You should remove any folders containing executables (Debug or Release), since they take up too much space.  

 

•      Use the Winzip program to compress your folders to a compressed file named,  for example, 5432-AliMehmetoglu.zip. After you compress, please make sure it uncompresses properly and reproduces your folder exactly

 
You can perform character input and output (for reading from compin and writing to decompout) as done in the example code below:

/* 

This piece of code reads one file "tale" character by character and writes them to another file "yaz". So in the end "yaz" is a copy of "tale". 

*/ 

#include <iostream> 

#include <fstream> 

 

using namespace std; 

 int main() 



      char ch; 

      ifstream deneme("tale");      ofstream sonuc("yaz");   while(!deneme.eof()) //eof returns true if next character  

                              //is eof  

      { 

            deneme.get(ch); //get command reads next character                        //unless you are at the end of the file 

            sonuc << ch; 

      } 

      deneme.close();   sonuc.close(); 

      return 0; 



 

For dealing with strings you may use the string class that you learned about in CS 201, or use the mystring class provided at the back of the textbook, or just use plain character arrays. The only interesting thing with strings that you will do (during decompression) is to make (deep) a copy of an existing string, and append a symbol to the end of it and store it somewhere in the array of strings you are maintaining.

More products