UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016)
|
|
- Tiffany McKenzie
- 5 years ago
- Views:
Transcription
1 UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, June 8, 27 Solutions to Practice Final Examination (Spring 26) There are 4 problems, each problem with multiple parts, each part worth points. Your answer should be as clear and readable as possible. Please justify any claim that you make.. Lossless source coding (3 points). Consider a source S that produces independent and identically distributed symbols from the alphabet {A, B, C} with p A =.5, p B =.3, and p C =.2. (a) Find a binary Tunstall code that encodes the source sequence into 3 binary code symbols at a time. (b) What is the rate of this code, i.e., the average number of encoded source symbols per code symbol? (c) Suppose now that the Tunstall code is followed by a binary Huffman code, forming a variable-to-variable-length code. What is the rate of this code, i.e., the ratio of the average number of source symbols to the average number of code symbols? Solution : (a) We need 2 3 = 8 source sequences for the Tunstall coding. However, since we have three symbols, each branching in the Tunstall coding procedure yields 2 new source sequences, keeping the total number odd. Hence, we can only use 7 source strings for the encoding. The Tunstall coding procedure is shown below. A.5 B.3 C AA AB AC BA BB BC One possible encoding is as follows: AA AB AC BA BB BC C.
2 (b) The average number of encoded source symbols is given by L s = 2 ( ) +.2 =.8. Alternatively, the average number of encoded source symbols can be calculated by adding up the probabilities at the nodes of the graph, giving L s = =.8. Thus, the rate of this code is.8/3 =.6. (c) One possible way to do the Huffman coding is shown below. AB.5.3 BA.5.55 AA.25. C.2 AC..45 BB BC.6 This gives the encoding AA AB AC BA BB BC C. 2
3 The average number of code symbols is given by L c = 2 ( ) + 3 ( ) + 4 (.9 +.6) = 2.7. Alternatively, the average number of code symbols can be computed by adding the probabilities at the internal nodes, so we have L c = = 2.7. Thus the rate of this code is given by L s / L c = A binary code (4 points). Consider a binary code with the following four codewords:,,, and. (a) What is the rate of this code? Justify your answer. (b) Is this code linear? Justify your answer. (c) How many errors is this code guaranteed to correct? (d) Suppose that this code is used over a binary symmetric channel with crossover probability p [, /2]. What is the conditional probability of an undetected error, given that the codeword was sent? Solution : (a) The block length n is 7, and there are four codewords, so 2 k = 4, giving k = 2. Thus, the rate of the code is k n = 2 7. (b) The sum of the second and third codewords is, which is not a codeword. Thus the code is not linear. (c) By looking at all possible Hamming distances between distinct codewords, we see that the minimum distance of this code is d min = 3. Thus, this code is guaranteed to correct one bit error. (Note : This code is not linear; therefore, in order to find d min, it is not enough to merely look at the distances of one particular codeword from other codewords, or at the Hamming weights of all codewords. We actually have to check all ( 4 2) = 6 distances.) (d) An undetected error will occur if the received vector is the same as one of the other three codewords. This can happen in the following ways. i. The second, third and fourth bits are flipped. In this case, we get the all-zero codeword as output. ii. The first, fifth, sixth and seventh bits are flipped. In this case, we get the all-one codeword as output. 3
4 iii. The first six bits are flipped. output. In this case, we get the third codeword as By adding the probablities for these individual cases, we see that the conditional probability of an undetected error, given was sent, is P e = p 3 ( p) 4 + p 4 ( p) 3 + p 6 ( p). 3. Linear parity check codes (5 points). Consider a binary linear code defined by the generator matrix G =. (a) Find the parity check matrix of the form H = [ A I ]. (b) What is the minimum distance of this code? Justify your answer. (c) Find all the patterns of 4 erasures that this code can fill in correctly. Suppose now that a new code is formed by puncturing the last bit of all codewords. (d) Find the parity check matrix for the new code of the form H = [ B I ]. (e) What is the minimum distance of the new code? Solution : (a) Replacing the first row of G by the (modulo 2) sum of the second and third rows, the second row by the sum of the first and second rows, and the third row by the sum of all three rows, we get a new generator matrix G =. Note : This transformation is equivalent to pre-multiplying G by the full-rank matrix M =. Since G is now of the form [ I A t], we can now readily write down H as H = [ A I ] =. 4
5 (b) Notice that H does not have two identical columns; thus, d min 3. Also, the first, fourth and sixth columns of H sum to zero, and are thus linearly dependent. So, d min = 3 for this code. (c) Recall that an erasure pattern can be filled in uniquely, if and only if the corresponding columns of H are linearly independent. Based on this, the following 2 patterns of 4 erasures can be uniquely filled in by this code: (, 2, 3, 4), (, 2, 3, 5), (, 2, 3, 6), (, 2, 3, 7), (, 2, 4, 5), (, 2, 4, 7), (, 2, 5, 6), (, 2, 6, 7), (, 3, 4, 7), (, 3, 5, 7), (, 3, 6, 7), (, 4, 5, 7), (, 5, 6, 7), (2, 3, 4, 5), (2, 3, 4, 6), (2, 3, 4, 7), (2, 4, 5, 6), (2, 4, 6, 7), (3, 4, 5, 7), (3, 4, 6, 7), (4, 5, 6, 7). Alternatively, recall that an erasure pattern cannot be filled in uniquely, if and only if the location of the erasures is a superset of the location of s in some nonzero codeword. Using the generator matrix G, the codewords can be enumerated as follows:. Based on the codewords, we see that the following patterns of four erasures cannot be filled in: (, 3, 5, 6), (2, 3, 5, 6), (3, 4, 5, 6), (3, 5, 6, 7), (, 2, 5, 7), (2, 3, 5, 7), (2, 4, 5, 7), (2, 5, 6, 7), (, 2, 4, 6), (, 3, 4, 6), (, 4, 5, 6), (, 4, 6, 7), (, 3, 4, 5), (2, 3, 6, 7). (d) Observe that the last bit of the codewords occur only in the last parity relation. So, if we remove the last row and last column of H, we will get a parity check matrix for the punctured code. Thus, a parity check matrix for the punctured code is given by H p =. This parity check matrix is of the required form H p = [ B I ]. (e) Observe that the second and fifth columns of H p are identical, i.e., linearly dependent. This shows that the punctured code has d min = Convolutional codes (3 points). Consider a binary convolutional code with the fol- 5
6 lowing encoder structure and initial state : y x. z z z (a) What is the rate of this code? Justify your answer. (b) Draw a trellis diagram for this code corresponding to the first 5 input symbols. (c) Find the free Hamming distance d free of this code. We now increase the rate of the code by puncturing under the pattern (, X,, X,, X,...). For example, a codeword... in the original code becomes... in the punctured code. The next 7 questions are on this punctured code. (d) What is the rate of this code? Justify your answer. (e) Draw a trellis diagram for this code corresponding to the first 5 input symbols. (f) Find the free Hamming distance d free of this code. (g) Find the codeword corresponding to the input sequence. How about? (h) Let y()y(2)y(3) be the codeword corresponding to the input x()x(2)x(3). Find y(3) and y(6) in terms of x(), x(2),.... More generally, what is y(3k), k =, 2,..., in terms of the input symbols? (i) Suppose that the sequence is received when this code is used for a binary symmetric channel. Find the codeword nearest to this sequence in Hamming distance. What is the corresponding input sequence? (j) Suppose that the sequence??? is received when this code is used for a binary erasure channel. Find the codeword by filling in the erasures. Repeat this problem for the received sequence???. Now, consider the binary 4-state convolutional code represented by the following en- 6
7 coder structure and initial state : z c a b z c 2 c 3 Here, a and b are the binary input symbols, and c, c 2, and c 3 are the binary output symbols. (k) What is the rate of this code? Justify your answer. (l) Find c 3 (k), k =, 2,..., in terms of the input symbols a(), b(), a(2), b(2),.... (m) (Difficult.) Is the free Hamming distance d free of this code smaller than, equal to, or larger than that of the punctured code in part (f)? Justify your answer. (Hint: It may be useful to compare the answers to parts (h) and (l).) Solution : (a) Each input bit corresponds to two code bits, thus the rate is /2. (b) 7
8 For the branches going out of each state, the top branch corresponds to input, and the bottom branch corresponds to input. (c) By inspecting the trellis, we can find d free for this code, constraining the path to diverge from state and end at state. The relevant path is shown in bold in the following trellis diagram. We thus have d free = 5. (d) Every two input bits correspond to three code bits, thus the rate is 2/3. (e) 8
9 For the branches going out of each state, the top branch corresponds to input, and the bottom branch corresponds to input. (f) By inspecting the trellis, we can find d free for this code, constraining the path to diverge from state and end at state. The relevant path is shown in red in the following trellis diagram. We thus have d free = 3. (g) From the trellis diagram in part (e), we see that the codeword corresponding to the input sequence is, and the codeword corresponding to the input sequence is. (h) y(3) is the same as the fourth bit of the unpunctured code, and thus we have, from the encoder structure, that y(3) = x(2) x() (since the initial state is.) Similarly, y(6) is the 8 th bit of the unpunctured code, and thus, y(6) = x(4) x(3) x(2). In general, y(3k) is the same as the (4k) th bit of the unpunctured code, and is thus given by y(3k) = x(2k) x(2k ) x(2k 2). (i) We can use Viterbi decoding to find the codeword closest in Hamming distance. 9
10 The relevant path is shown in red in the following trellis diagram. Therefore, the closest codeword is, which is at a Hamming distance of from the received sequence, and the corresponding input sequence is. (j) The erasures can be filled in by analyzing the possible paths at each step in the trellis. From inspection, the codeword corresponding to the first erasure pattern is, since none of the other 7 possible ways of filling in the erasures produces a valid codeword. The path corresponding to the correct codeword for the first received sequence is shown in red in the following trellis diagram. From inspection, the correct codeword corresponding to the second erasure pattern is, since none of the other 7 possible ways of filling in the
11 erasures produces a valid codeword. The path corresponding to the correct codeword for the second received sequence is shown in red in the following trellis diagram. (k) Every two input bits correspond to three code bits, thus the rate is 2/3. (l) From the encoder diagram, we have (m) Similar to part (l), we have Similar to part (h), we have c 3 (k) = a(k) b(k) b(k ). c (k) = a(k) a(k ), and c 2 (k) = a(k) a(k ) b(k ). y(3k 2) = x(2k ) x(2k 3), and y(3k ) = x(2k ) x(2k 2) x(2k 3). If we map c (k) y(3k 2), c 2 (k) y(3k ), c 3 (k) y(3k), a(k) x(2k ), and b(k) x(2k), we see that this code is, in fact, the same as the punctured code above. Thus, d free of this code is also equal to 3.
12
13
14
15
16
17
18
Homework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C.
Homework #5 Solutions Due: July 7, Do the following exercises from Lax: Page 4: 4 Page 34: 35, 36 Page 43: 44, 45, 46 4 Let C be the (5, 3) binary code with generator matrix G = Find a standard form generator
More informationConvolutional Codes. COS 463: Wireless Networks Lecture 9 Kyle Jamieson. [Parts adapted from H. Balakrishnan]
Convolutional Codes COS 463: Wireless Networks Lecture 9 Kyle Jamieson [Parts adapted from H. Balakrishnan] Today 1. Encoding data using convolutional codes Encoder state Changing code rate: Puncturing
More informationT325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:
T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding
More informationLinear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions
Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator
More informationELG3175 Introduction to Communication Systems. Introduction to Error Control Coding
ELG375 Introduction to Communication Systems Introduction to Error Control Coding Types of Error Control Codes Block Codes Linear Hamming, LDPC Non-Linear Cyclic BCH, RS Convolutional Codes Turbo Codes
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationKevin Buckley
Kevin Buckley - 69 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 3 Convolutional Codes x c (a) (b) (,) (,) (,) (,)
More informationENEE x Digital Logic Design. Lecture 3
ENEE244-x Digital Logic Design Lecture 3 Announcements Homework due today. Homework 2 will be posted by tonight, due Monday, 9/2. First recitation quiz will be tomorrow on the material from Lectures and
More informationHamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics
Hamming Codes Hamming codes belong to the class of codes known as Linear Block Codes. We will discuss the generation of single error correction Hamming codes and give several mathematical descriptions
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationQED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C:
Lecture 3: Lecture notes posted online each week. Recall Defn Hamming distance: for words x = x 1... x n, y = y 1... y n of the same length over the same alphabet, d(x, y) = {1 i n : x i y i } i.e., d(x,
More informationDescribe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.
Quiz Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.) What are the two subspaces associated with a matrix? Describe
More informationABSTRACT ALGEBRA FINAL PROJECT: GROUP CODES AND COSET DECODING
ABSTRACT ALGEBRA FINAL PROJECT: GROUP CODES AND COSET DECODING 1. Preface: Stumbling Blocks and the Learning Process Initially, this topic was a bit intimidating to me. It seemed highly technical at first,
More informationSolutions to Exercises 9
Discrete Mathematics Lent 2009 MA210 Solutions to Exercises 9 (1) There are 5 cities. The cost of building a road directly between i and j is the entry a i,j in the matrix below. An indefinite entry indicates
More informationThe Data Link Layer. CS158a Chris Pollett Feb 26, 2007.
The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining
More informationLOW-density parity-check (LDPC) codes are widely
1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationHuffman Code Application. Lecture7: Huffman Code. A simple application of Huffman coding of image compression which would be :
Lecture7: Huffman Code Lossless Image Compression Huffman Code Application A simple application of Huffman coding of image compression which would be : Generation of a Huffman code for the set of values
More informationError-Correcting Codes
Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The
More informationFinite Math - J-term Homework. Section Inverse of a Square Matrix
Section.5-77, 78, 79, 80 Finite Math - J-term 017 Lecture Notes - 1/19/017 Homework Section.6-9, 1, 1, 15, 17, 18, 1, 6, 9, 3, 37, 39, 1,, 5, 6, 55 Section 5.1-9, 11, 1, 13, 1, 17, 9, 30 Section.5 - Inverse
More informationProject 1. Implementation. Massachusetts Institute of Technology : Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A.
Massachusetts Institute of Technology Handout 18.413: Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A. Spielman Project 1 In this project, you are going to implement the simplest low
More informationScribe: Virginia Williams, Sam Kim (2016), Mary Wootters (2017) Date: May 22, 2017
CS6 Lecture 4 Greedy Algorithms Scribe: Virginia Williams, Sam Kim (26), Mary Wootters (27) Date: May 22, 27 Greedy Algorithms Suppose we want to solve a problem, and we re able to come up with some recursive
More information392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions
92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm
More informationCS321: Computer Networks Error Detection and Correction
CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must
More informationITERATIVE decoders have gained widespread attention
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents
More informationForward Error Correction Codes
Appendix 6 Wireless Access Networks: Fixed Wireless Access and WLL Networks Ð Design and Operation. Martin P. Clark Copyright & 000 John Wiley & Sons Ltd Print ISBN 0-471-4998-1 Online ISBN 0-470-84151-6
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More informationCSEP 561 Error detection & correction. David Wetherall
CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled
More informationDue dates are as mentioned above. Checkoff interviews for PS2 and PS3 will be held together and will happen between October 4 and 8.
Problem Set 3 Your answers will be graded by actual human beings (at least that ' s what we believe!), so don' t limit your answers to machine-gradable responses. Some of the questions specifically ask
More informationCSC 310, Fall 2011 Solutions to Theory Assignment #1
CSC 310, Fall 2011 Solutions to Theory Assignment #1 Question 1 (15 marks): Consider a source with an alphabet of three symbols, a 1,a 2,a 3, with probabilities p 1,p 2,p 3. Suppose we use a code in which
More informationCHAPTER 8. Copyright Cengage Learning. All rights reserved.
CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation
More information4. Write a sum-of-products representation of the following circuit. Y = (A + B + C) (A + B + C)
COP 273, Winter 26 Exercises 2 - combinational logic Questions. How many boolean functions can be defined on n input variables? 2. Consider the function: Y = (A B) (A C) B (a) Draw a combinational logic
More informationMath 355: Linear Algebra: Midterm 1 Colin Carroll June 25, 2011
Rice University, Summer 20 Math 355: Linear Algebra: Midterm Colin Carroll June 25, 20 I have adhered to the Rice honor code in completing this test. Signature: Name: Date: Time: Please read the following
More informationProblem Set 5 Due: Friday, November 2
CS231 Algorithms Handout # 19 Prof. Lyn Turbak October 26, 2001 Wellesley College Problem Set 5 Due: Friday, November 2 Important: On Friday, Nov. 2, you will receive a take-home midterm exam that is due
More informationChapter 5 VARIABLE-LENGTH CODING Information Theory Results (II)
Chapter 5 VARIABLE-LENGTH CODING ---- Information Theory Results (II) 1 Some Fundamental Results Coding an Information Source Consider an information source, represented by a source alphabet S. S = { s,
More informationData Compression Fundamentals
1 Data Compression Fundamentals Touradj Ebrahimi Touradj.Ebrahimi@epfl.ch 2 Several classifications of compression methods are possible Based on data type :» Generic data compression» Audio compression»
More informationECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II
ECE 333: Introduction to Communication Networks Fall 00 Lecture 6: Data Link Layer II Error Correction/Detection 1 Notes In Lectures 3 and 4, we studied various impairments that can occur at the physical
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due Thursday! Error handling through redundancy Adding extra bits to the frame Hamming Distance When we can detect When we can correct Checksum Cyclic Remainder
More informationCSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan
CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images
More informationELEC 691X/498X Broadcast Signal Transmission Winter 2018
ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this
More informationLink Layer: Error detection and correction
Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability
More informationCPSC 121: Models of Computation Assignment #4, due Thursday, March 16 th,2017at16:00
CPSC 121: Models of Computation Assignment #4, due Thursday, March 16 th,2017at16:00 [18] 1. Consider the following predicate logic statement: 9x 2 A, 8y 2 B,9z 2 C, P(x, y, z)! Q(x, y, z), where A, B,
More informationChapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 9 Greedy Technique Copyright 2007 Pearson Addison-Wesley. All rights reserved. Greedy Technique Constructs a solution to an optimization problem piece by piece through a sequence of choices that
More informationCS Computer Architecture
CS 35101 Computer Architecture Section 600 Dr. Angela Guercio Fall 2010 Computer Systems Organization The CPU (Central Processing Unit) is the brain of the computer. Fetches instructions from main memory.
More informationReview of Number Systems
Review of Number Systems The study of number systems is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a digital computer.
More informationUNIT- V COMBINATIONAL LOGIC DESIGN
UNIT- V COMBINATIONAL LOGIC DESIGN NOTE: This is UNIT-V in JNTUK and UNIT-III and HALF PART OF UNIT-IV in JNTUA SYLLABUS (JNTUK)UNIT-V: Combinational Logic Design: Adders & Subtractors, Ripple Adder, Look
More informationMultimedia Networking ECE 599
Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics
More informationIf m = f(m), m is said to be perfect; if m < f(m), m is said to be abundant; if m > f(m), m is said to be deficient.
Problem 1: Abundant Numbers For any natural number (i.e., nonnegative integer) m, let f(m) be the sum of the positive divisors of m, not including m itself. As examples, f(28) = 1 + 2 + 4 + 7 + 14 = 28,
More information1 Counting triangles and cliques
ITCSC-INC Winter School 2015 26 January 2014 notes by Andrej Bogdanov Today we will talk about randomness and some of the surprising roles it plays in the theory of computing and in coding theory. Let
More informationR07. Code No: V0423. II B. Tech II Semester, Supplementary Examinations, April
SET - 1 II B. Tech II Semester, Supplementary Examinations, April - 2012 SWITCHING THEORY AND LOGIC DESIGN (Electronics and Communications Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions
More informationMidterm Exam 2B Answer key
Midterm Exam 2B Answer key 15110 Principles of Computing Fall 2015 April 6, 2015 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling
More informationLDPC Codes a brief Tutorial
LDPC Codes a brief Tutorial Bernhard M.J. Leiner, Stud.ID.: 53418L bleiner@gmail.com April 8, 2005 1 Introduction Low-density parity-check (LDPC) codes are a class of linear block LDPC codes. The name
More informationOperations and Properties
. Operations and Properties. OBJECTIVES. Represent the four arithmetic operations using variables. Evaluate expressions using the order of operations. Recognize and apply the properties of addition 4.
More informationOn the construction of Tanner graphs
On the construction of Tanner graphs Jesús Martínez Mateo Universidad Politécnica de Madrid Outline Introduction Low-density parity-check (LDPC) codes LDPC decoding Belief propagation based algorithms
More informationBasics of Information Worksheet
Basics of Information Worksheet Concept Inventory: Notes: Measuring information content; entropy Two s complement; modular arithmetic Variable-length encodings; Huffman s algorithm Hamming distance, error
More information15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2
15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic
More informationIntroduction to Variables, Terms, and Expressions
Introduction to Variables, Terms, and Expressions Interactive Math Notebook Activities and Scaffolded Notes What is a Variable? What is an Expression? What is an Exponent? Exponents: the Short Way vs.
More informationChapter LU Decomposition More Examples Electrical Engineering
Chapter 4.7 LU Decomposition More Examples Electrical Engineering Example Three-phase loads e common in AC systems. When the system is balanced the analysis can be simplified to a single equivalent rcuit
More information1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM
1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1.1 Introduction Given that digital logic and memory devices are based on two electrical states (on and off), it is natural to use a number
More informationCounting the Number of Fixed Points in the Phase Space of Circ n
Counting the Number of Fixed Points in the Phase Space of Circ n Adam Reevesman February 24, 2015 This paper will discuss a method for counting the number of fixed points in the phase space of the Circ
More informationFor decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 10,
Math 167 Ch 17 WIR 1 (c) Janice Epstein and Tamara Carter, 2015 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9)
More informationCHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =
Math 167 Ch 17 Review 1 (c) Janice Epstein, 2013 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = Math 167
More informationLSN 4 Boolean Algebra & Logic Simplification. ECT 224 Digital Computer Fundamentals. Department of Engineering Technology
LSN 4 Boolean Algebra & Logic Simplification Department of Engineering Technology LSN 4 Key Terms Variable: a symbol used to represent a logic quantity Compliment: the inverse of a variable Literal: a
More informationViterbi Algorithm for error detection and correction
IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil
More information16 Greedy Algorithms
16 Greedy Algorithms Optimization algorithms typically go through a sequence of steps, with a set of choices at each For many optimization problems, using dynamic programming to determine the best choices
More informationImplementation of Hamming code using VLSI
International Journal of Engineering Trends and Technology- Volume4Issue2-23 Implementation of Hamming code using VLSI Nutan Shep, Mrs. P.H. Bhagat 2 Department of Electronics & Telecommunication Dr.B.A.M.U,Aurangabad
More informationErrors. Chapter Extension of System Model
Chapter 4 Errors In Chapter 2 we saw examples of how symbols could be represented by arrays of bits. In Chapter 3 we looked at some techniques of compressing the bit representations of such symbols, or
More informationEncryption à la Mod Name
Rock Around the Clock Part Encryption à la Mod Let s call the integers,, 3,, 5, and the mod 7 encryption numbers and define a new mod 7 multiplication operation, denoted by, in the following manner: a
More informationP( Hit 2nd ) = P( Hit 2nd Miss 1st )P( Miss 1st ) = (1/15)(15/16) = 1/16. P( Hit 3rd ) = (1/14) * P( Miss 2nd and 1st ) = (1/14)(14/15)(15/16) = 1/16
CODING and INFORMATION We need encodings for data. How many questions must be asked to be certain where the ball is. (cases: avg, worst, best) P( Hit 1st ) = 1/16 P( Hit 2nd ) = P( Hit 2nd Miss 1st )P(
More informationP( Hit 2nd ) = P( Hit 2nd Miss 1st )P( Miss 1st ) = (1/15)(15/16) = 1/16. P( Hit 3rd ) = (1/14) * P( Miss 2nd and 1st ) = (1/14)(14/15)(15/16) = 1/16
CODING and INFORMATION We need encodings for data. How many questions must be asked to be certain where the ball is. (cases: avg, worst, best) P( Hit 1st ) = 1/16 P( Hit 2nd ) = P( Hit 2nd Miss 1st )P(
More informationCommunication Fundamentals in Computer Networks
Lecture 7 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationFormally Self-Dual Codes Related to Type II Codes
Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya 464 8602, Japan and Masaaki Harada Department of Mathematical Sciences Yamagata
More informationEncoding/Decoding, Counting graphs
Encoding/Decoding, Counting graphs Russell Impagliazzo and Miles Jones Thanks to Janine Tiefenbruck http://cseweb.ucsd.edu/classes/sp16/cse21-bd/ May 13, 2016 11-avoiding binary strings Let s consider
More informationData Compression - Seminar 4
Data Compression - Seminar 4 October 29, 2013 Problem 1 (Uniquely decodable and instantaneous codes) Let L = p i l 100 i be the expected value of the 100th power of the word lengths associated with an
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationMath 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)
Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.
More informationOUTLINE. Paper Review First Paper The Zero-Error Side Information Problem and Chromatic Numbers, H. S. Witsenhausen Definitions:
OUTLINE Definitions: - Source Code - Expected Length of a source code - Length of a codeword - Variable/fixed length coding - Example: Huffman coding - Lossless coding - Distortion - Worst case length
More informationYes, it is non singular. The two codewords are different.
Yes, it is non singular. The two codewords are different. Yes, it is UD. Given a sequence of codewords, first isolate occurrences of 01 (i.e., find all the ones) and then parse the rest into 0's. Remark:
More informationGreedy Algorithms and Matroids. Andreas Klappenecker
Greedy Algorithms and Matroids Andreas Klappenecker Greedy Algorithms A greedy algorithm solves an optimization problem by working in several phases. In each phase, a decision is made that is locally optimal
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationJ. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India.
Design of Single Correction-Double -Triple -Tetra (Sec-Daed-Taed- Tetra Aed) Codes J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India. Dr. M. Manikandan Associate Professor,
More informationDesign and Implementation of Low Density Parity Check Codes
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes
More informationFundamentals of Multimedia. Lecture 5 Lossless Data Compression Variable Length Coding
Fundamentals of Multimedia Lecture 5 Lossless Data Compression Variable Length Coding Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Fundamentals of Multimedia 1 Data Compression Compression
More informationOptimization Methods in Management Science
Problem Set Rules: Optimization Methods in Management Science MIT 15.053, Spring 2013 Problem Set 6, Due: Thursday April 11th, 2013 1. Each student should hand in an individual problem set. 2. Discussing
More information1. Fill in the entries in the truth table below to specify the logic function described by the expression, AB AC A B C Z
CS W3827 05S Solutions for Midterm Exam 3/3/05. Fill in the entries in the truth table below to specify the logic function described by the expression, AB AC A B C Z 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2.
More informationCSE Penn State University - Spring 2006 Professor John Hannan Lecture 7: Problem Solving with Logic - February 21&23, 2006
CSE 097 - Penn State University - Spring 2006 Professor John Hannan Lecture 7: Problem Solving with Logic - February 21&23, 2006 From Last Time Boolean Logic Constants: 0 and 1 Operators: & and and! 0
More informationHorn Formulae. CS124 Course Notes 8 Spring 2018
CS124 Course Notes 8 Spring 2018 In today s lecture we will be looking a bit more closely at the Greedy approach to designing algorithms. As we will see, sometimes it works, and sometimes even when it
More informationCode No: R Set No. 1
Code No: R059210504 Set No. 1 II B.Tech I Semester Supplementary Examinations, February 2007 DIGITAL LOGIC DESIGN ( Common to Computer Science & Engineering, Information Technology and Computer Science
More informationDiscrete Mathematics, Spring 2004 Homework 8 Sample Solutions
Discrete Mathematics, Spring 4 Homework 8 Sample Solutions 6.4 #. Find the length of a shortest path and a shortest path between the vertices h and d in the following graph: b c d a 7 6 7 4 f 4 6 e g 4
More informationStructure of Computer Systems
288 between this new matrix and the initial collision matrix M A, because the original forbidden latencies for functional unit A still have to be considered in later initiations. Figure 5.37. State diagram
More informationTURBO codes, [1], [2], have attracted much interest due
800 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 2, FEBRUARY 2001 Zigzag Codes and Concatenated Zigzag Codes Li Ping, Member, IEEE, Xiaoling Huang, and Nam Phamdo, Senior Member, IEEE Abstract
More informationLOW-density parity-check (LDPC) codes have attracted
2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,
More informationStereo Image Compression
Stereo Image Compression Deepa P. Sundar, Debabrata Sengupta, Divya Elayakumar {deepaps, dsgupta, divyae}@stanford.edu Electrical Engineering, Stanford University, CA. Abstract In this report we describe
More informationHardware Implementation of Single Bit Error Correction and Double Bit Error Detection through Selective Bit Placement for Memory
Hardware Implementation of Single Bit Error Correction and Double Bit Error Detection through Selective Bit Placement for Memory Lankesh M. Tech student, Dept. of Telecommunication Engineering, Siddaganga
More informationError Correcting Codes
Error Correcting Codes 2. The Hamming Codes Priti Shankar Priti Shankar is with the Department of Computer Science and Automation at the Indian Institute of Science, Bangalore. Her interests are in Theoretical
More informationON THE STRONGLY REGULAR GRAPH OF PARAMETERS
ON THE STRONGLY REGULAR GRAPH OF PARAMETERS (99, 14, 1, 2) SUZY LOU AND MAX MURIN Abstract. In an attempt to find a strongly regular graph of parameters (99, 14, 1, 2) or to disprove its existence, we
More information