MH 8300 Tutorial Activity 10
PageRank
Question 1. Consider the following webgraph with four websites.
(a) Write down the adjacency matrix A for the webgraph.
0 1
1 0
A=
0 1
0 0
(b) Write down the Ma
Reliable communication over
unreliable channel
Shannons Noisy Channel Coding Theorem
Coding Theory
Channel
Channel
Sender
Channel
Receiver
Cheryl
Mobile Network
Albert
Phone
WiFi Network
Router
You
Di
Its a Discreetly
Discrete World
Mathematics in Real-Life Applications
What if
2+3=17?
Modular Arithmetic
What if 2+3=17?
2+3=17 implies that 0=12
35
34
23
22
10
20
-1
-12
1
14
-11
-10
-2
mod 12
-3
8
2
How many points
determine a line?
Coding Theory
A Game
I draw a straight line on the paper
(which I do not tell you).
You are to guess as many points as
possible on the line.
Before guessing, you m
Can we
communicate reliably over an
unreliable channel?
Coding Theory
You have 1TB of data
You have 1TB of data
replicate
You have 1TB of data
You have 600TB of data
1
2
3
100
101
102
103
200
501
502
The War of Codemakers & Codebreakers
etin Kaya Ko
[email protected]
Since the time of Caesar or even earlier, people are interested
in secret communications
Communication Line
Caesar
Generals
Enemy
To h
MH 8300 Tutorial Activity 1
Modular Arithmetic
Group Members
Name
Marks :
NTU Email ID
/10
Question 0. For the following values of M , fill up the diagrams with numbers and determine
5
(mod M ) and 31
MH 8300 Tutorial Activity 1
Modular Arithmetic
Group Members
Name
Marks :
NTU Email ID
/10
Question 0. For the following values of M , fill up the diagrams with numbers and determine
5
(mod M ) and 31
MH 8300 Tutorial Activity 4
Caesar Cipher, Affine Cipher
Group Members
Name
Marks :
NTU Email ID
/10
Question A. Consider a Caesar cipher with the following plaintexts.
jan
feb
mar
apr
may
jun
jul
aug
MH 8300 Tutorial Activity 2
Single Parity Check Code
Hamming Code
Group Members
Name
Marks :
NTU Email ID
/10
Question A1. Consider the following code C.
C = cfw_(x1 , x2 , x3 , x4 , x5 , x6 , x1 + x2
MH 8300 Tutorial Activity 2
Single Parity Check Code
Hamming Code
Group Members
Name
Marks :
NTU Email ID
/10
Question A1. Consider the following code C.
C = cfw_(x1 , x2 , x3 , x4 , x5 , x6 , x1 + x2
MH 8300 Tutorial Activity 3
Reed-Solomon Codes
Group Members
Name
Marks :
NTU Email ID
/10
Question A. Consider a Reed-Solomon code of length n = 6 and dimension k = 3, defined over the
integers modul
MH 8300 Tutorial Activity 3
Reed-Solomon Codes
Group Members
Name
Marks :
NTU Email ID
/10
Question A. Consider a Reed-Solomon code of length n = 6 and dimension k = 3, defined over the
integers modul
MH 8300 Tutorial Activity 5
Diffie Hellman Key Exchange
Group Members
Name
Marks :
NTU Email ID
/10
Question 0. Use the square-multiply method to compute
826
(mod 107).
t
A
Question 1. In this tutoria
2016S1 PH1012: Physics A
Work, Energy and Power
Dr Ho Shen Yong
Lecturer, School of Physical and Mathematical Sciences
Nanyang Technological University
Weeks 6 and 7
Giancoli 7.1-7.4, 8.1-8.4
"Long-ra
2016S1 PH1012: Physics A
Basics and Fluids
Dr Ho Shen Yong
Lecturer, School of Physical and Mathematical Sciences
Nanyang Technological University
Week 1
Giancoli Chap 13.1 13.7
"The true sign of inte
2016S1 PH1012: Physics A
Vectors, Projectile and Circular Motion
Dr Ho Shen Yong
Lecturer, School of Physical and Mathematical Sciences
Nanyang Technological University
Week 4
Giancoli Chap 5.2, 10.1-
MH 8300 Tutorial Activity 3
Caesar Cipher, Affine Cipher and Frequency Analysis
Set A
Question 1. (Frequency Analysis of the Caesar Cipher)
Consider the following ciphertext that has been encrypted by
MH 8300 Tutorial Activity 4
RSA
Set A
The following describes the communication between Alice and Bob via RSA public key encryption. Eve is
eavesdropping on their communication and trying to decrypt t
MH 8300 Tutorial Activity 6
Mutilated Chessboard Problem
Question 1. Consider the following mutilated chessboard with 5 white squares and 5 black squares.
Figure 1: Mutilated Chessboard
(a) Construct
MH 8300 Tutorial Activity 5
De Bruijn Graphs and Sequence Assembly
Set A
Question 1. Suppose we have a circular sequence of length 14 over the alphabet cfw_A, T, C, G. We obtain
the following 14 fragm
MH 8300 Tutorial Activity 8
Minimum Spanning Tree
Consider the following undirected edge-weighted graph G on the vertex set V = cfw_A, B, C, D, E, F, G, H, I,
J.
Question 1. Answer the following quest
MH 8300 Tutorial Activity 7
Assignment Problem
Your company is now doing very well and your business clients have increased. Your sales representatives,
Albert (A), Bernard (B) and Cheryl (C) are now
MH 8300 Tutorial Activity 1
Principles of Error Correction
Set A
Question 1. Let the code C1 = cfw_00000, 11011, 11100, 00111.
Sender sends the codeword 11011 across a channel and the receiver receive
Algebra: Matrices II - Determinants
Tang Wee Kee
Division of Mathematical Sciences
School of Physical and Mathematical Sciences
Nanyang Technological University
(Division of Mathematical Sciences Scho
2016S1 PH1012: Physics A
More about forces
Dr Ho Shen Yong
Lecturer, School of Physical and Mathematical Sciences
Nanyang Technological University
Week 5
Giancoli Chap 5.1, 5.6, 14.1
"Sometimes it is
MH1810 Math 1 Part 1 Algebra
Tang Wee Kee
Nanyang Technological University
(Nanyang Technological University)
Complex Numbers
1 / 66
Imaginary number
Does the quadratic equation x 2 + 1 = 0 have a rea
2016S1 PH1012: Physics A
Static Equilibrium
Dr Ho Shen Yong
Lecturer, School of Physical and Mathematical Sciences
Nanyang Technological University
Week 5
Giancoli Chap 12.1-12.3, 12.6
"We are what we