# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

2 Pages

### ps01

Course: ECEN 5682, Fall 2008
Rating:

Word Count: 381

#### Document Preview

5682 1-22-07 Theory ECEN and Practice of Error Control Codes Spring 2007 P. Mathys Problem Set 1 (Solutions are due Mon. 1-29-07) 1) The 10-digit ISBN (International Standard Book Number) system assigns a unique number of the form ISBN = d10 d9 d8 d7 d6 d5 d4 d3 d2 d1 , to each commercially traded book. The rst nine digits (d10 . . . d2 ) are all decimal and identify the language, the publisher, and the title...

Register Now

#### Unformatted Document Excerpt

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
5682 1-22-07 Theory ECEN and Practice of Error Control Codes Spring 2007 P. Mathys Problem Set 1 (Solutions are due Mon. 1-29-07) 1) The 10-digit ISBN (International Standard Book Number) system assigns a unique number of the form ISBN = d10 d9 d8 d7 d6 d5 d4 d3 d2 d1 , to each commercially traded book. The rst nine digits (d10 . . . d2 ) are all decimal and identify the language, the publisher, and the title and specic edition of the book. The last digit is a check digit that can be either 0 . . . 9 or X (=10). It is used to check the integrity of the ISBN number as follows: 10 v= i=1 i di . If v is divisible by 11 (without remainder), then the ISBN number is assumed to be correct, otherwise an error has been detected. (a) Compute the check digit d1 for the 9-digit (d10 . . . d2 ) book numbers (i) 2-253-00950 and (ii) 3-442-07553. (b) One of the most frequent errors that humans make is the transposition of two letters or digits, e.g., 478 becomes 487. Claim: The ISBN-10 code can detect any single transposition of digits. Prove or disprove this claim. (c) Claim: The ISBN-10 code can detect every double (i.e., error any two digits in error, but not necessarily transpositions). Prove or disprove this claim. 2) What is the shortest single-error correcting binary code with at least 8 codewords that you can nd by trial and error? Assume the memoryless BSC error model (i.e., errors 0 1 and 1 0 are equally likely and independent). Is an exhaustive search feasible? 3) The simplest model of an asymmetric binary channel is the memoryless Z-channel shown in the following gure. 1 Input X 0 p 1p 1 1 Output Y 0 Using trial and error, nd a binary single error correcting code of length n = 5 for the Z-channel with as many codewords as possible. 1 4) Problem 3.1 in the book. Consider a systematic binary (8, 4) code whose parity-check equations (modulo 2) are v 0 = u1 + u 2 + u 3 , v 1 = u0 + u 1 + u 2 , v 2 = u0 + u 1 + u 3 , v 3 = u0 + u 2 + u 3 , where u0 , u1 , u2 , and u3 are message digits and v0 , v1 , v2 , and v3 are parity-check digits. Find the generator and parity-check matrices for this code. Show analytically that the minimum distance of this code is 4. c 19942007, P. Mathys. Last revised: 1-21-07, PM. 2
Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

ECEN 56822-19-07Theory and Practice of Error Control CodesSpring 2007P. MathysProblem Set 4(Solutions are due Mon. 2-26-07)1) Problem 4.22 in the book. Prove that the minimum distance of the incomplete product of an n1 , k1 , d1 ) linear
ECEN 56822-26-07Theory and Practice of Error Control CodesSpring 2007P. MathysProblem Set 5(Solutions are due Mon. 3-05-07)1) Problem 11.1 in the book. Consider the (3,1,2) nonsystematic feedforward encoder with g(0) = (1 1 0) , g(0) = (1
ECEN 56823-12-07Theory and Practice of Error Control CodesSpring 2007P. MathysProblem Set 6(Solutions are due Mon. 3-19-07)1) It is desired to nd the best ternary (i.e., q = 3) rate R = 1/2 and constraint length K = 3 (i.e., m = 2 memory
Wells - CS - 131
CS 131 Exam 1 October 5, 2007 Name_ Time started_1. a.Finished_(12 points) Identify briefly 4 of the following. Syntax error. Define and give an example. An error in language. It will prevent the program from compiling. Example: cout &gt; &quot;hello&quot;;
University of Florida - SUR - 6427
A Place in the World:A Review of the Global Debate on Tenure SecurityFORD FOUNDATIONBy Lynn EllsworthMission StatementF ORD FOUNDATIONThe Ford Foundation is a resource for innovative people and institutions worldwide. Our goals are to: Stre
Allan Hancock College - N - 4377702
FUTURES&amp;LANGUAGESEdwardDeBonostheorythatyesandnoareusedtodetermine factfromfictioncanbefurtherexpandedtoforecastpossibilities forthefuturenomatterhowsurealthestatementmightbe. AccordingtoDeBonoapoisanextremeouttherestatementof possibility. DeBonosta
Uni. Worcester - MA - 3457
MA3457/CS4033 Assignment IDue: Friday 18th January, 20081. Section 1.2: 4abc 2. Section 1.2: 10 3. Section 1.2: 12 4. Compute (x, f ) (the condition number for f at x) for (a) f (x) = ex (b) f (x) = xp (p I R) Explain what the results tell you. 5
Uni. Worcester - MA - 3457
MA3457/CS4033 Assignment IIDue: Friday 25th January, 20081. Construct in two ways the polynomial of degree 2 or less whose graph passes through the points (0, 1.1), (1, 2), and (2, 4.2). Verify that they are the same. 2. Simple polynomial interpo
Uni. Worcester - MA - 3457
Assignment VIDue: Friday 22nd February, 20081. Section 4.1: 2a,b; 4a,b 2. Section 4.1: 6a,b; 8a,b 3. Section 4.1: 22 4. Section 4.1: 23 5. Section 5.2: 5a, 6b,d; 7a, 8b,d 6. Section 5.2: 10 7. Section 5.2: 16
Uni. Worcester - MA - 3457
MA3457/CS4033 Project IIDue: Friday 29th February, 2008This project is to be done in pairs. There are 3 problems that are to be completed. These problems are in a separate pdf le. The problems have come fom the book Numerical Computing with MATLA
Uni. Worcester - MA - 3457
Write a Matlab routine favouriteode to solve dy/dt = f (y, t), for t0 t tf inal using your favourite solver. The rst input argument of each routine species the function f (y, t). This argument should be the name of an M-le that takes y and t as in
UVA - DS - 237
Tiphaigne de la Roche - a 18th century writer - made a remarkable forecast of photography in his Giphantie - a phantasy sci-fi novel: subtitled: A view of what has passed, what is now passing, and during the present century what will pass in the worl
University of Florida - MIL - 4712
Computer Architecture in VHDL1Appendix A: The ISA of a Small 8-bit ProcessorIntroduction to Small8 An Instruction Set Processor (ISP) is characterized by its instruction set, address modes (means to access data), programming model, and the prese
UVA - DS - 237
Figure 2 The first use of the Kodak Girl motif in 1893.
UVA - DS - 237
UNI - CNS - 062
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Nov 2008 19:17:11 -0000 vti_extenderversion:SR|5.0.2.6790 vti_title:SR|CannonWorld, Event-driven Programming, and Border Layout vti_modifiedby:SR|BEN-SCHAFER\schafer vti_nexttolasttimemodified:TR|04
NYU - JEC - 375
Empirical Part of the Exam of Econometrics IIJAU-ER CHENMarch 27, 20061Data DescriptionThe data used in this exercise are the following: y : log of GNP, at 2000 prices; i: yield on threemonth Treasury bills; p: log of the Consumer Price Index
University of Florida - CGS - 2422
CGS 2422 EXAM III SPRING 1997The Registrar of the University of Florida uses the following database tokeep student records: Information about all the courses offered by theuniversity is stored in a file named 'COU
Texas San Antonio - MS - 317
University of Texas at San Antonio Archives and Special Collections MS 317. Archives for Research on Women and Gender Oral History Project Bonnie Reed Transcript, July 17, 1997Tori Beckman-Wilson: This is Tori Beckman-Wilson, its July seventeenth,
Texas San Antonio - MS - 317
University of Texas at San Antonio Archives and Special Collections MS 317. Archives for Research on Women and Gender Oral History Project Bonnie Reed Transcript, July 23, 1997Interview by Tori Beckman Wilson on July 23, 1997. She interviewed Bonni
Texas San Antonio - MS - 317
University of Texas at San Antonio Archives and Special Collections MS 317. Archives for Research on Women and Gender Oral History Project Julia Gayden Transcript, June 11, 1997Tori Beckman-Wilson: This is Tori Beckman-Wilson, its June eleventh, ni
W. Alabama - CS - 125
May students often wonder what is the best way to study for a CS exam. As with all exams, everyone has different method to studying. But, since for many of you this will be your first CS exam ever, it can be a bit confusing what you should concentrat
W. Alabama - CS - 125
Final Exam Study Questions1. If the value of a primitive parameter changes, does it change the value of the argument? Answer: No; a primitive argument keeps its original value. This is because primitives are passed by value.2. Cons
W. Alabama - CS - 125
Final Exam Study Questions1. If the value of a primitive parameter changes, does it change the value of the argument? Answer: No; a primitive argument keeps its original value. This is because primitives are passed by value.2. Cons
W. Alabama - CS - 125
1. Review Question: LoopsWrite a program that will read in two positive integers from the user, a and b, and determine whether or not either one is a multiple of the other (a is a multiple of b if there exists some integer k such that a = k*y). If i
W. Alabama - CS - 125
1. Identify the variables that are both valid in Java and follow its naming conventions:NumChequestypeoffile2ndCardcardOne2. Which of the following are primitive types?int char String Board boolean3. What is the assign
W. Alabama - CS - 125
1. Review Question: LoopsWrite a program that will read in two positive integers from the user, a and b, and determine whether or not either one is a multiple of the other (a is a multiple of b if there exists some integer k such that a = k*y). If i
W. Alabama - CS - 125
1. Review Question: LoopsWrite a program that will take in two positive integers, a and b, read in from the user, and determine whether or not either one is a multiple of the other (a is a multiple of b if there exists some integer k such that a = k
W. Alabama - CS - 125
Additional Programming Problems1. Given an integer n, place pegs on a 2n+1 by 2n+1 board to form a &quot;T&quot;. 2. Given three integers a, b, and c as input, print out: &quot;There are q integers between a and b which are divisible by c.&quot; For example, if a=1, b=
W. Alabama - CS - 125
Additional Programming Problems1. Given an integer n, place pegs on a 2n+1 by 2n+1 board to form a &quot;T&quot;.2. Given three integers a, b, and c as input, print out: &quot;There are q integers between a and b which are divisible by c.&quot; For example, if a=1, b
W. Alabama - CS - 125
Writing a Class You wish to create a class that will model an Online Messenger Account. Instance Variables: * there will be an instance variable to keep track of the email address of the person using the account * there will be an instance variable t
W. Alabama - CS - 125
1. Review Question: LoopsWrite a program that will take in two positive integers, a and b, read in from the user, and determine whether or not either one is a multiple of the other (a is a multiple of b if there exists some integer k such that a = k
W. Alabama - CS - 125
Wint er 2007 Midt erm R e vi e w S tuffW e will go through these two questions in the Re view on Friday. 1. Write a program called BoardThingy to draw the following diagram. The user sup plies the size of the board.Board Size = 1Board Size = 4
W. Alabama - CS - 125
1.IdentifythevariablesthatarebothvalidinJavaandfollowits namingconventions: NumChequestypeoffile2ndCardcardOne2. Which of the following are primitive types? int char String Board boolean3.WhatistheassignmentoperatorinJava? Answer:=4. Use 2 lines
Texas San Antonio - CS - 6453
1 d 9 d9U dd d) d 1UDQdQ191 Y4&amp; G 1 DiDeb 4 ibbn m i l j d i i g d odhBPkag DtdFd@td hf e&amp; D&amp;U u p y xuvrwvurs prp i P&amp;r &amp;Pa DI@tF@tFqh
Drexel - MATH - 633
Homework 71. Problem 14, page 147. Everybody was OK with this problem. 2. Problem 20, page 149. Everybody was OK with this problem. 3. Problem 21, page 149. (a) If xn is a sequence in E that converges to x E then this sequence is Cauchy. By Propos
UGA - CS - 1730
University of Florida - FIN - 6434
Are U.S. CEOs Overpaid?Steven N. Kaplan University of Chicago Booth School of Business12008 by S. KaplanU.S corporate governance system has been demonized.Ebbers - WorldcomSkilling - EnronGrasso - NYSEScrushy - HealthsouthKozlowski
Carnegie Mellon - EE - 525
DynamicTrafficControlChunHanChen TimothyKwan TomBolds ShangYiLin RandalHongGroup2Project Objective : Dynamic Control of Traffic Lights Wed. Dec. 3ManagerPresentationOutlineMarketing ProjectDescription DesignProcess FloorPlanEvolution Layout
Vanderbilt - ME - 248
Pipe ow assignmentME 2481. Download and install the CFD package Fluent: The website is www.fluentusers.com You will need to create a username with a vanderbilt address. It is important that you use your own username (not the one I gave you in cla
Vanderbilt - ME - 248
Chip cooling CFD assignmentME 248We want the heat transfer coecient for a chip in an air channel. A CFD analysis has been set up and can be downloaded from Oak. Run the analysis for the conditions described and answer the following questions. The
Drexel - PHYS - 750
Homework set #1 1. Using the resultsd 2z M F ( y a) = = 2 dy EI EI for the cantilever shown, (a) Show that the deflection of the cantileverat a distance y from the fixed end is 2z L a y z FFy z= ( y 3a ) 6 EI(b) Show that, for a cantilever w
Penn State - CS - 101
CMPSC 101 Ch. 3 worksheet #Name -Trace the following program. Show the output in a rectangle &amp; trace the values of each variable in a column. 1. Assume that the user inputs the value 3. #include &lt;iostream&gt; using namespace std; double computePrice
Penn State - CS - 101
CMPSC 101 Name Nick Robin Ch. 3 worksheet #3 Trace the following program. Show the output in a rectangle &amp; trace the values of each variable in a column. 1. Assume that the user inputs the value 4. \$36.18 #include &lt;iostream&gt; using namespace std; dou
Penn State - CS - 101
CMPSC 101 - Ch. 10 Worksheet #3Name Nick Robin1. (True/False) The five-dimensional array is the most common type of multidimensional array. 2. (True/False) C+ will only allow you to declare five-dimensional or smaller arrays. 3. (True/False) Whe
Penn State - CS - 101
CMPSC 101 - Ch . 7 Worksheet #1Name Nick Robin1. In the right margin, show what output would be displayed by the following program. #include &lt;iostream&gt; using namespace std; int main() { int a = 3; int b = 4; int c = 8; if (a &lt; b) cout &lt; &quot;a is le
Penn State - CS - 101
CMPSC 101 - Ch. 1 Worksheet #4Name Nicholas Robin1. Write a declaration statement that declares a double variable named salary. Double salary =0.0;2. Write an assignment statement that assigns the value 30000.56 to a variable named salary. Sal
Penn State - CS - 101
Nick Robin CMPS 101 a2 Test Case # 1 2 3 4 5 6 Movies 0 50 3 47 13 30 Possible Inputs Books Peanuts 0 0 50 50 5 1.3 49 44 25 16 48 1.6 Expected Outputs Average 0 1403.48 100.36 1332.43 492.16 957.31 Reasons Lower Boundary Upper Boundary Small Order L
Washington University in St. Louis - MEXMRS - 0106
PDS_VERSION_ID = PDS3 RECORD_TYPE = STREAM OBJECT = TEXT PUBLICATION_DATE = 2005-10-19 NOTE
Washington University in St. Louis - MEXMRS - 0106
=Upfront Notes= This &quot;aareadme.txt&quot; file contains the description of the naming convention that will be used for all MEX kernels. One part of them will be directly produced by an automated system located at ESTEC,PST. Consequently, we c
Washington University in St. Louis - MEXMRS - 0106
\$MEX LIGHT TIME FILE 1*LITIME 2*PREP JPL Mars Express Navigation Team 3*TITLE
Washington University in St. Louis - MEXMRS - 0106
\$MEX ORBIT PROPAGATION AND TIMING GEOMETRY FILE v002* OPTG optg.out* TITLE 2004 Mars Express Mapping: OPTG File* CREATION JPL 04-JUN-30/08:28:01* BEGIN SCE 04-JUN-30/00:00:00.000* CUTOFF SCE 04-AUG-17/00:00:00.000*
Washington University in St. Louis - MEXMRS - 0106
=MEX CK Files= Last update: 10 NOV 2004 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/CK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX CK kernels, and it provi
Washington University in St. Louis - MEXMRS - 0106
=MEX FK Files= Last Update: 27 JUL 2005 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/FK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX FK kernels, and it provides id
Washington University in St. Louis - MEXMRS - 0106
=MEX SPK Files= Last update: 27 JUL 2005 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/SPK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX SPK kernels, and it pr
Washington University in St. Louis - MEXMRS - 0106
=MEX PCK Files= Last Update: 10 NOV 2004 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/PCK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX PCK kernels, and it provides
Washington University in St. Louis - MEXMRS - 0106
=MEX LSK Files= Last update: 08 AUG 2005 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/LSK directory. It also provides the file naming conventions used for the MEX LSK kernels, and it provides identification of the m
Washington University in St. Louis - MEXMRS - 0106
=MEX SCLK Files= Last update: 22 MAR 2004 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/SCLK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX SCLK kernels, and it
Washington University in St. Louis - MEXMRS - 0106
=MEX Orbit Number Files= Last update: 22 MAR 2004 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/ORBNUM directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX Orbit Numb
Princeton - PHI - 340
Problems on Philosophical LogicFor each of the five logics treated (temporal, modal, conditional, relevantistic, intuitionistic) the list below first collects the half-dozen proofs and verifications left to the reader in the corresponding chapter of
UGA - MIST - 4600
Lecture 9: Security, Menus, and FilesDaniel ChenSecurity Passwords are often used to control access to a computer or software program. Passwords should be at least 6 characters in length and something that cannot be easily guessed. It should no