Question

In: Computer Science

Consider the middle 3 digits of your student ID composed of seven digits. Convert it to...

Consider the middle 3 digits of your student ID composed of seven digits. Convert it to binary format (each digit is represented by a maximum of 3bits). For example, 1060385 is simplified to 603 and then converted to 110 000 011. Assume now that we want to send your student ID while being able to detect and correct single bit errors. 1.1) Using two-dimensional parity check show what will be transmitted codeword using datawords of size 3bits. 1.2) Using the hamming code show what would be the codeword that corresponds to your simplified binary student ID. Dataword size is 9bits. 1.3) Assume that a single bit error occurred and corrupted the 8th bit (numbering starts from 1 and from right). Show that the receiver of such corrupted codeword will be able to correct the error when using the hamming code.720 is the id to be considered.

Solutions

Expert Solution

**********please post comment any dought *******give up vote

Answer:-


Related Solutions

Consider a student with an ID number: 13762348. The student is going to select two digits...
Consider a student with an ID number: 13762348. The student is going to select two digits at random from the digits in the ID number, one after another and without replacement. What is the probability that the sum of the two digits is less than 10, given that the first digit is an odd number?
Please consider FIRST 6 Character from your name and LAST 2 digits of your students ID....
Please consider FIRST 6 Character from your name and LAST 2 digits of your students ID. Calculate the checksum for the above text. The text needs to be divided into 2-byte (16-bit) words. Also check that the data is reached without any alteration using your checksum. [ the text is MajedA08]
Question 3 You should form the list of integers with your student ID. The numbers are...
Question 3 You should form the list of integers with your student ID. The numbers are generated as follows: Number Based on your student ID number, formed by its … a 1 st and 2nd digits b 2 nd and 3rd digits c 3rd and 4th digits d 4th and 5th digits e 5th and 6th digits f 6th and 7th digits g 7th and 8th digits For example, the student ID is 19563755A. Values of a to g are:...
Reconsider your student ID in a binary format (as explained in the previous question) as the...
Reconsider your student ID in a binary format (as explained in the previous question) as the dataword. 2.1) Find the codeword corresponding to this dataword using the CRC error detection technique, and the divisor polynomial g(x) = x3+x2+1. Do Binary division with 0s and 1s. 2.2) Compute now the codeword corresponding to this dataword assuming that the divisor polynomial that is used is f(x) = x5+1. Do Polynomial division. 2.3) Assume that an error corrupted the first two bits of...
Reconsider your student ID in a binary format (as explained in the previous question) as the...
Reconsider your student ID in a binary format (as explained in the previous question) as the dataword. 2.1) Find the codeword corresponding to this dataword using the CRC error detection technique, and the divisor polynomial g(x) = x3 +x2 +1. Do Binary division with 0s and 1s. 2.2) Compute now the codeword corresponding to this dataword assuming that the divisor polynomial that is used is f(x) = x5+1. Do Polynomial division. 2.3) Assume that an error corrupted the first two...
Consider you student ID as a decimal number (Example: MIT123456 should be ‘123456’) and covert to...
Consider you student ID as a decimal number (Example: MIT123456 should be ‘123456’) and covert to binary digits. You may use any online decimal to binary converter to convert this. Now draw the message signal for the binary numbers (consider this as your bit stream) and show ASK, BFSK and BPSK signal accordingly.
Please write your name and student ID number clearly at the top of your answer paper....
Please write your name and student ID number clearly at the top of your answer paper. 1. Production Possibilities Frontier gives us the information about the combinations of goods and services that can be produced by a country given its resources and production technology. a. Assume that China can only produce 2 goods: toys and computers. Draw China’s PPF and clearly specify the axes. b. In class we learned about China’s demographic challenge. Describe this challenge in a few sentences....
1. Consider the seven missteps mentioned in How to mess up your agile transformation in seven...
1. Consider the seven missteps mentioned in How to mess up your agile transformation in seven easy (mis)step. The concepts Handscomb discusses in each of the missteps do have much validity. Can you think of any modern day examples of firms and/or projects that have exhibited these pitfalls? In addition, what would you have done differently?
ID Documents 1 I love data mining 2 The seven dwarves love mining 3 Data science...
ID Documents 1 I love data mining 2 The seven dwarves love mining 3 Data science is a hot new career 4 I don't love my major or career Use the corpus of documents shown in the above table to answer the quiz questions below. What is the inverse document frequency (IDF) of the term "love"? (Round your answer to 2 decimal places). What is the TF-IDF value (importance) of the term "data" to document 1? (Round your answer to...
Q3. Create a Company trading computer accessories with your Student ID & Name, address, College Email...
Q3. Create a Company trading computer accessories with your Student ID & Name, address, College Email ID and phone number for the year ended 31st Mar, 2020, and enter the following transactions using appropriate vouchers in Tally ERP 9 software: (3 Marks + 7 Marks) 1st Jan 2020, Started his business with an investment of RO 45,000 in cash. 2nd Jan 2020, Purchases computer accessories of RO 20,000 on credit from Mr. Salim. 31st Jan 2020, Sold computer accessories worth...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT