(a) Peter wants to send Alice a text T in the form of binary sequence, T=...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
(a) Peter wants to send Alice a text T in the form of binary sequence, T= (0, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0, 1). To ensure correct transmission of the text received by Alice, he splits T into a sequence of 4-bit binary vectors, w= (a, b, c, d) {k=1, 2, 3}, and produces for each of them coded vectors u using the matrix >G ((1, 1, 1, 0, 0, 0, 0)|(1, 0, 0, 1, 1, 0, 0)|(0, 1, 0, 1, 0, 1, 0)|(1, 1, 0, 1, 0, 0, 1)); Find the vectors (ul, u2, u3) that Peter should send to Alice in this case. 1 1 0 1 1 0 1 1 1 0 0 0 G 0111 0 1 0 0 0 0 1 0 0 0 0 1 Also identify whether this encoding method correspond to Humming Code I or Humming Code II. Explain. (b) In another instance (not the case described in (a)!) Alice receives 4 vectors: v1, v2, v3, v4=(0, 1, 0, 0, 0, 1, 1), (1, 1, 0, 1, 0, 0, 1), (0, 0, 1, 1, 0, 1, 1), (0, 0, 1, 1, 0, 0, 1); and uses the decoding matrix H-Matrix(3, 7, [1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1]); 0 T11 O 0 1 1 19 O 11001 0 1010101 0 1 1 0 0 1 1 0 0 0 1 1 1 1 to recover the original 16-bit text (wl, w2, w3, w4). Assuming there is not more than 1 error in each transmitted vector, determine which of the received vectors {v1, v2, v3, v4} have been send correctly, and which ones contain transmission error. Correct those vectors that have been transmitted with an error. Explain your solution. Also determine the 16-bit binary text (w1, w2, w3, w4) that Alice will be recovering. (HINT: you can use the matrix G to figure out the positions of the parity bits in the 7-bit vectors being transmitted.) (c) Explain what will happen if more than 1 error occurs during the transmission of any vector coded with this Hamming code. (a) Peter wants to send Alice a text T in the form of binary sequence, T= (0, 0, 1, 0, 1, 0, 0, 1, 0, 1, 0, 1). To ensure correct transmission of the text received by Alice, he splits T into a sequence of 4-bit binary vectors, w= (a, b, c, d) {k=1, 2, 3}, and produces for each of them coded vectors u using the matrix >G ((1, 1, 1, 0, 0, 0, 0)|(1, 0, 0, 1, 1, 0, 0)|(0, 1, 0, 1, 0, 1, 0)|(1, 1, 0, 1, 0, 0, 1)); Find the vectors (ul, u2, u3) that Peter should send to Alice in this case. 1 1 0 1 1 0 1 1 1 0 0 0 G 0111 0 1 0 0 0 0 1 0 0 0 0 1 Also identify whether this encoding method correspond to Humming Code I or Humming Code II. Explain. (b) In another instance (not the case described in (a)!) Alice receives 4 vectors: v1, v2, v3, v4=(0, 1, 0, 0, 0, 1, 1), (1, 1, 0, 1, 0, 0, 1), (0, 0, 1, 1, 0, 1, 1), (0, 0, 1, 1, 0, 0, 1); and uses the decoding matrix H-Matrix(3, 7, [1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1]); 0 T11 O 0 1 1 19 O 11001 0 1010101 0 1 1 0 0 1 1 0 0 0 1 1 1 1 to recover the original 16-bit text (wl, w2, w3, w4). Assuming there is not more than 1 error in each transmitted vector, determine which of the received vectors {v1, v2, v3, v4} have been send correctly, and which ones contain transmission error. Correct those vectors that have been transmitted with an error. Explain your solution. Also determine the 16-bit binary text (w1, w2, w3, w4) that Alice will be recovering. (HINT: you can use the matrix G to figure out the positions of the parity bits in the 7-bit vectors being transmitted.) (c) Explain what will happen if more than 1 error occurs during the transmission of any vector coded with this Hamming code.
Expert Answer:
Related Book For
Data Structures and Algorithms in Java
ISBN: 978-1118771334
6th edition
Authors: Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser
Posted Date:
Students also viewed these mathematics questions
-
Here are definitions of sequences and trees with integer elements: type iseq = Nil | Cons of int * (unit -> iseq) type itree = Leaf of int | Branch of itree * itree (a) In an ascending sequence such...
-
Give the typing rules for Peano natural numbers and their eliminator.(ii) Using the rules given above, define the addition function.] (iii) Let a binary tree be either a leaf Leaf or a node...
-
Upton Computers makes bulk purchases of small computers, stocks them in conveniently located warehouses, ships them to its chain of retail stores, and has a staff to advise customers and help them...
-
Distinguish between (a) Voltammetry and amperometry. (b) differential-pulse voltammetry and square-wave voltammetry. (c) A limiting current and a diffusion current. (d) The standard electrode...
-
Put the following sequences of terms in the order of increasing intension: a. conifer, Sitka spruce, tree, spruce, plant b. Italian sports car, car, vehicle, Maserati, sports car c. doctor of...
-
A delivery person in an elevator is holding a package by an elastic cord. (Don't ask why.) (a) What happens to the length of the cord when the elevator accelerates upward? Draw the free-body diagram...
-
Three wealthy friends, Tom, Grant, and Karen, each decided to donate $5,000,000 to the not-for-profit organization of their choice. Each donation was made on May 21, 2011. Prepare the entries...
-
The Police-Mental Health Collaboration (PMHC) program, like many other organizations, ensures transparency in its budget development, accounting, and reporting processes through, Public...
-
Office Mart Inc. has "cash and carry" customers and credit customers. Office Mart estimates that 20% of monthly sales are to cash customers, while the remaining sales are to credit customers. Of the...
-
Question Content AreaMichaela is in the business of creating posters (display art) for the movie industry. She creates a poster and sells it for a lump sum. She has: a. Sold a capital asset. b. Sold...
-
Do you think most people have a shared understanding of the definition of "ethics"? Share 1-2 examples to support your opinion. Looking back on your previous employers, have you experienced ethical...
-
Complete the following requirements: Describe the components of the common body of tax law (CBOTL). Include in your response answers to the following questions: * What role does the U.S. Congress...
-
Explain the common law system of precedent in the US (based on English law). Differences between common law versus civil law (used in other countries)
-
You are the CISO at 123 Stores Inc. Your department performs an annual risk assessment. Your greatest concern in relying on your department's peformance of the assessment in developing...
-
1. A new designer drug, kratom, is becoming popular with the youth in your area. Local police are concerned that this will lead to increased erratic behavior among teens in town. You have been hired...
-
The following items were displayed in the statement of affairs for Lubbock Company: Fully secured liabilities ......... $90,000 Partially secured liabilities ....... 12,000 Unsecured liabilities...
-
The data in Table 1 represent the first exam score of 10 students enrolled in Introductory Statistics. Treat the 10 students as a population. (a) Compute the population mean. (b) Find a simple random...
-
Consider an asymmetric potential barrier, with Calculate the tunneling probability \(T\) for energy \(U_{1} U_{0}\). 0, x < 0 U(x) = U> U, 0 < x 0, x > L. (7.96)
-
The data in Table 2 represent the length (in seconds) of a random sample of songs released in the 1970s. Find the median length of the songs. Approach Follow the steps listed above. Table 2 Song Name...
Study smarter with the SolutionInn App