FOR LARGE SERIAL NUMBERS. R. C. Bose. University of North Carolina. Institute of Statistics Mimeo Series No March 1965
|
|
- Chloe McDowell
- 5 years ago
- Views:
Transcription
1 .. e ERROR DETECTNG AND ERROR CORRECTNG ndexng SYSTEM> FOR LARGE SERAL NUMBERS R. C. Bose University of North Carolina nstitute of Statistics Mimeo Series No. 426 March 1965 Given a set of serial numbers, they can be indexed by adding a few redundant digits, calculated according to certain rules. f X is the original serial number, then the number X* obtained after addition of the redundant digits is called the index of X. The purpose of adding the redundant digits is to enable us either to detect, or to both detect and correct the more common errors which are liable to be made in reporting X*. The most common errors are (i) wrongly reporting a single digit (error of type ) (ii) reversal of two adjacent digits (error of type ). n this paper we describe two indexing systems. n the first system X is a six digit number, the digits being 0,1,2,3,4,5,6,7,8,9. Each X is indexed by adding no more than one redundant digit. Errors of type and in reporting X* can be detected. n the second system we consider an octal numerical system based on the 8 digits 0,1,, 7. We take X to be a seven digit serial number. t is indexed by adding three suitably chosen redundant digits. Errors of type and in reporting X* can be correc~ea. This research was supported by the National Science Foundation Grant No. GP-3792 and the Air Force Office of Scientific Research Grant No. AF-AFOSR DEPARTMENT OF STATSTCS UNVERSTY OF NORTH CAROLNA Chapel Hill, N. C.
2 .. e Error Detecting and Error Correcting ndexing Systems for Large Serial Numbers R. C. Bose University of North Carolina 1. ntroduction. Given a set of serial numbers, they can be indexed by adding a few redundant digits, calculated according to certain rules. X is the original serial number, then the number X* obtained after addition of the redundant digits is called the index of X. f The purpose of adding the redundant digits is to enable us either to detect, or to both detect and correct the JOOre common errors which are liable to be made in reporting X*. An indexing system is useful when information has to be stored with respect to a large number of individuals. a la.'rge clientele. he quotes in any correspondence. For example consider a firm with An index number is to be assigned to each client whicl1 The clients card on 'tmch the information relative to him is stored is identified by means of this index number. No..., the index number may be wrongly reported. The most collloon errors are (i) wrongly quoting a single digit (error of Type ), (ii) reversal of t...ro adjacent digits (error of type ). t would be useful to have an indexing system which is self-checking with respect to common errors, 1.e., When a client makes such an error it is readily detected. Also it would be desirable to have a system in which When an error has been detected, it should be possible to correct it. This research was supported by the National Science Foundation Grant No. GP-3792 and the Air Force Office of Scientific Research Grant No. AF-AFOSR-76o-65.
3 n this paper we describe two indexing systems. n the first system X is a six digit number, the digits being 0,1,2,3,4,5,6,7,8,9. Each X is indexed by adding no nx:>re than one redundant digit. Errors of type and in reporting x* can be detected. n the second system vie consider an octal numerical system based on the 8 digits 0, 1,, 7. We take X to be a seven digit serial number. redundant digits. t is indexed by adding three suitably chosen Errors of type and n in reporting X* can be corrected. 2. An Error Detecting ndexing Syste~ Suppose we have a set of six dibit serial numbers (the digits being 0,1,2,3,4,5,6,7,8,9). We give here an example of an indexing system employing no mare than one redundant digit and able to detect either a single error in one digit (including the redundant digit) or an error consisting of a reversal of two consecutive digits. These two types of error we shall call errors of type and type respectively. We shall also show that if an error has been detected then (under the assumption that the error belongs to one of the two types described above) there are only a few possibilities among which the true serial numbers must lie. Let the serial number to be indexed be X = x6~x4~~:lcj. where x. (i = 1,2,3,4,5,6) is one of the digits 0,1,, 9. Then there J. is a unique integer x such that o (2.1) X o == -(~+X4+x6) + (xl+~+x5) (nx:>d 11), S X o S 10 f < x < 9, we say that the index of X is the seven digit number ' ' ' el
4 .. e f X o = 10, we say that the index of X is the same as X. Thus in this case x* = X, is a six digit number. For example if X = , then x == -7 (rod 11). Hence x = and X is indexed by X* = Again if X = , x == -l(rod 11). 0 Hence x = 10, and X is indexed by X* = o N~l suppose we allow the possibility that in reporting x* one of the two types of errorsconsidered has been committed. a+l c == (-1) (ya - x ex), 3 (mod 11). Let the reported value be y* = Y6Y5Y4Y3Y2Y1YO in case, when X* is a seven digit number and y* = Y6Y5Y4Y3Y2Yl in case, when X* is a six digit number. We can find a unique integer c such that 0 ~ c ~ 10, and where Yo is taken to be 10 in case. Then if the index has been correctly reported c = O. Suppose now that in reporting X* an error of type has been cornrnit- ted, then there is an integer a such that Y a ~ X a whereas y. = x. ~ ~ for i ~ a. n case, 0 ~ a ~ 6 and i = 0,1,2,, 6. n case, 1 < a < 6 and i = 1,2,,6. Then from (2.1) and (2.2) (2.3) Since 0 <Y a - ~~ 9, c ~ o. Thus we will conclude that an error has been committed. Again suppose that in reporting X* an error of the second type has been committed. Then there is an integer a such that Y a = x a +1 ' Y a + l = x a Whereas Yi = Xi for i~ a or a + 1. Also vl'c can assume that X a ~ X a + l ' otherwise there would be no error. n case, 0 ~ a ~ 5 and
5 i = 0,1,2,, 6. n case, 1 ~ a ~ 5 and i = 0,1,2,, 6. Then from (2.1) and (2.2) we have, (2.1~) Since 0 < been committed. what error has been committed. Example 1. a+l c =(-1) 2(X a + - X l a ), (mod 11). ~+l- xal ~ 9, c" O. Thus we will conclude tnt an error has Notice that the non-vanishing of the check number c does not tell us x = then X* = For the purpose of illustration let us suppose that as 5. Then y* = Now 0 ~ c ~ 10 n reporting X* suppose 8 is wrongly reported Hence c = 8, and we conclude that an error has been committed. We can reconstruct the possible values of X* from y* using the fact that c = 8, and assuming that the error is of type or type, i.e., there is an error in a single digit or there has been a reversal of two digits. of type has been committed in reporting x a then from (2.3), We x a = Y a + (_l)a c, (mod 11). can make the following table: Table 1 Y a x a Correct x* '( f an error ell ' c =-( ) + ( ), (mod 11).
6 .. e then have Again it is possible that the discrepancy is due to a reversal of two consecutive digits in reporting X*. y* Table 2 ~ 5P:S:i:l: :* x Example 2. Let us next suppose that X = c =- ( ) + (8+7+9) 3. An error correctillg indexing system. n this case we can reconstruct X* by reversing two consecutive digits of y* and check whether (2.1) holds x x x x Since x must be the same as the last digit in X* the only possio bility is that the correct X* was Thus altogether there are 8 different values of X* which could have lead to Y*. Consider an octal system in which we use only the eight digits 5 x 0 (mod 11). Then x o X* = ; ; ; ; ; We = 10 and X* = Suppose there is an error of type reversing the position of the digits 2 and 7. Then X* would be reported as y* = Now o ~ c ~ 10, and Hence c = 10, which shows that an error has been conunitted. As in example 1, we find that any of the following 6 values of X* could have lead to y*: 0,1,2,3,4,5,6,7. A seven digit number in this system will take care of 8 7 = 221 = 2,097,152 or roughly two million serial numbers. We shall now
7 show that by adding 3 redundant digits, suitably calculated, one can correct any single error in a digit (error of type ), or any error consisting of a reversal of two adjacent digits (error of type ). Consider the Galois field GF 8 of 8 e1enents. Let the elements be 0: 0 = 0,0:1,0:2,ex;,0:4,0:5,0:6'~. t is well known [1,2, ] that the non-zero elements can be written in t'fq different forms: (i) The multiplicative form where each non-zero element is a power of a primitive element t (ii) The additive form where each element is a quadric polynomial of t with coefficients 0 or 0: 0 = 0 = 0 = to ~ = 1 0: 2 = t = t ex; = t 2 = t 2 C\ = t 3 = 1 + t 2 0: 5 = t 4 = 1 + t + t 2 0: 6 = t 5 = 1 + t 0: 7 = t 6 = t + t 2 To add two elements we take the additive form and remember that the coefficients of the polynomials add (mod 2). Thus ex; + ~ = t 2 + (1+t+t 2 ) = 1 + t = 0: 6 To multiply two elements we take the multiplicative form and remember that t 7 = t o Thus 6 _ Element Multiplicative form Additive form
8 .. e We can identify the digits 0,1,2,3,4,5,6,7 ~dth the elements ao,a1,a2'~'04,a5,a6,a7 respectively Then any seven digit octal number X can be made to correspond with a 7-vector! with elements from GF S. Consider the vector! = (x 1,x 2, 000, ~), where the Xi's belong to GFso Let X be encoded to so that x8,x9'~0 where H is the matrix given by!* = (X1'~'..., ~, xs ' x 9 ' x 10 ), are determined by the relation x:*'ht=o, t 0 0 H = t t 2 t 3 t 4 t 5 t This gives the encoding rules: t 2 xs = t 6 (x 1 +~+~+x4 +x5+x6+~) x 9 = t ~+ t2~ + t3~ + t4x4 + t 5 x 5 + ta.x 6 + t 7 x 7 x 10 = t 5 (x 2 + x4 + x6) Then the index of X is X* the octal number corresponding to the vector 2f* lor example to find the index of 2,401,546 vte identify it with the vector (a2'04,ao,a1'~'04,a6) or (t, t 3, 0, 1, t 4, t 3, t 5 ) :. Xs = t 7+ t 2 + t 6 + t 3 + t 2 + t 4 = 1 + t 2 + (t+t 2 ) + (1+t 2 ) + t 2 + (1+t+t 2 ) 7
9 x = t2 + t S + t 4 + t 2 + t S 9 = t 2 + (1+t) + (1+t+t 2 ) + t 2 + t 2 + (l+t) = 1 + t = t S = 0: 6 x = t 8 + t S + t 8 10 = t + (1+t) + t = 1 + t = 0: 6 :.!* = (0:2,C\,0:0,,\,~,C\,0:6,C\,0:6,0:6) Hence the index of X = 2,~01,546 is x* = 2,401,546,466. We shall now show that if an error of type or type is committed in reporting X* it can be corrected. Let X* be reported as y*. Let x* and 'if.!' be the vectors (with elements from GF 8 corresponding to X* and y* respectively. The error vector e* is defined by ~* = Y:.* - x*. f an error of the type has been committed, so that the i-th digit of X* has been wrongly reported, then e* = (0,0,, Yi-xi' 0) Now Y:.* is known to us. We may therefore calculate the syndrome of t* which may be defined as Y:.* i! = (!* + e*)jix = e* H! = e.h i ' J.-,.,here e i = y. - Xi and h. is the i-th row vector of vector of H T J. -J. 8 _
10 .. e are identical. Again suppose there is an error of type in reporting x* so that the i-th and {i+l)-th digits have been reversed. Since the field GF (1 Let S = e* = y* - x*" Nov; the syndrome of y* is y*rr = (x*" + e*)h T = e~ rr () o = (o,o,, xi+1-x i, xi-x i + 1,, 0) is of characteristic 2, addition and subtraction to 1 t Now it should be noted that the last three columns of S are 9 o o Then = z.(h. + h. 1), where h. and h'+ l are the i-th and {i+l)-th row vectors of rrr. -~ -~ The sum of i-th and (i+l)-th columns of H is given by the i-th col~~ of S, where proportional to 1 1 o 0 t is now easy to check that no two of the 19 columns of H and S are proportional to one another. f there is one error in a digit or a single reversal error, the syndrome of y* "lill be proportional to just one row of H T or st. n the first case we conclude that there is an error of type, and in the second case we conclude that there is an error of type.
11 ~ne position of the column will give the position of the error and the constant of proportionality will give e. or z. as the case may be. can then be corrected. ~ ~ The error E;KBJ.Ple. We shall novt illustrate the procedure of error correction. We have seen that the index of X = 2,401,546 is X* = 2,401,546,466. Suppose that there is an error of type, so that the digit 4 in the 6-th position in X* has been reported as 2, then y* = 2,401,526,466. Hence where Hence tl1e syndrome of ~ is N01.:r ~ = (t,t3,0,1,t4,t,t5,t3,t5,t5), ~ H T = (a 1,a 2,a.,), a 1 = t + t t 4 + t + t 5 + t = t 4, a 2 = t 2 + t t 4 + t t t = t 3, a., = 0 + t t t 7 = t 4 (t 4, t 3, t 4 ) = t 4 (1, t 6, 1) (1, t 6, 1) is the 6-th row of rt. Hence we conclude that there is an error of type in the 6th digit, and e6 = t 4 Now ~ =t. Hence ~ = Y"l + e6 = t + t 4 = t 3 = 0: 4 Hence we correct the 6-th digit of y* to 4, getting back the correct X* = 2,401,546,466. Now suppose there has been an error of type n, say the 5-th and 6-th digits of X* have been reversed giving y* = 2,401,456,466. ~ = (t, t 3, 0, 1, t 3, t 4, t 5, t 3, t 5,t 5 ), ~HT = (b 1, b 2, b 3 ), 10 Then _ :,
12 .. e where b 1 = t + t t 3 + t 4 + t 5 + t = 0, b = t 2 + t t 4 + t + t 3 + t t = t 4 2 b 3 = 0 + t t t 7 = t Hence the syndrome of ;[* is (0, t 4, t) = t(o, t 3, 1) He note that 0, t 3, 1 is the 5-th row of ST. Hence we conclude an that there has been/interchange in the 5th and 6th digits. Hence intercl~ing the 5-th and 6-th digits in y* we get back the correct which check~. x* = 2,401,546,466 The value of z5 is t. This should agree with x 5 -x 6 But t 4 3 X 5 - x6 (};5 - Cl4 = - t = t, References 1. R. C. Bose. On the application of the properties of Galois fields to the problem of construction of hyper-graeco-latin squares. Sankhya 3 (1938), pp R. D. Carmichael. ntroduction to the theory of groups of finite order. New York, Dover publications (1956), Chapter X 11
Institute of Statistics Mimeo Series No April 1965
_ - ON THE CONSTRUCTW OF DFFERENCE SETS AND THER USE N THE SEARCH FOR ORTHOGONAL ratn SQUARES AND ERROR CORRECTnm CODES by. M. Chakravarti University of North Carolina nstitute of Statistics Mimeo Series
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationUNIVERSITY OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C.
UNIVERSITY OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C. Mathematical Sciences Directorate Air Force Office of Scientific Research Washington 25, D. C. AFOSR Report No. THEOREMS IN THE
More informationSection 1.1: Patterns in Division
Section 1.1: Patterns in Division Dividing by 2 All even numbers are divisible by 2. E.g., all numbers ending in 0,2,4,6 or 8. Dividing by 4 1. Are the last two digits in your number divisible by 4? 2.
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationNUMBERS AND CODES CHAPTER Numbers
CHAPTER 2 NUMBERS AND CODES 2.1 Numbers When a number such as 101 is given, it is impossible to determine its numerical value. Some may say it is five. Others may say it is one hundred and one. Could it
More informationConstruction of latin squares of prime order
Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo
More informationEE512: Error Control Coding
EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to
More informationError Correction Review
Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols
More informationAFOSR Report No. ON A CLASS OF ERROR CORRECTING BINARY GROUP CODES by R. C. Bose and D. K. Ray-Chaudhuri September" 1959
[ I UNIVERSITY OF NORTH CAROLmA Department of Statistics Chapel Hill" N. C. Mathematical SCiences Directorate Air Force Office of Scientific Research Washington 25" D. c. AFOSR Report No. ON A CLASS OF
More informationExpanding brackets and factorising
Chapter 7 Expanding brackets and factorising This chapter will show you how to expand and simplify expressions with brackets solve equations and inequalities involving brackets factorise by removing a
More informationGalois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.
Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More
More information'i I 'i ; ~ A method for the easy storage of discriminant polynomials. by RANAN B. BANERJI FIELDS
A method for the easy storage of discriminant polynomials by RANAN B. BANERJI Case Western Reserve University Cleveland, Ohio I~TRODUCTIO~ One olthepurposes of. feature extraction is to save_ on the memory
More informationCommunications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved
Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming
More informationPETERSON'S TABLE OF IRREDUCIBLE POLYNOMIALS OVER GF(2)
PETERSON'S TABLE OF IRREDUCIBLE POLYNOMIALS OVER GF(2) This table was taken from Error-Correcting Codes by W. Wesley Peterson, MIT Press (1970), pages 251-155. This table is to be used only by students
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,
More informationB. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.
B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from
More informationQ 1 Find the square root of 729. 6. Squares and Square Roots Q 2 Fill in the blank using the given pattern. 7 2 = 49 67 2 = 4489 667 2 = 444889 6667 2 = Q 3 Without adding find the sum of 1 + 3 + 5 + 7
More information8+4 0 mod (12), mod (12), mod (12), mod (12), mod (12).
Decimal Codes Massoud Malek To make error correcting codes easier to use and analyze, it is necessary to impose some algebraic structure on them. It is especially useful to have an alphabet in which it
More informationPAIRED COMPARISON DESIGNS FOR TESTING CONCORDANCE BE.'TWEEN JUDGES
PARED COMPARSON DESGNS FOR TESTNG CONCORDANCE BE.'TWEEN JUDGES by R. C. Bose University of North Carolina and Division ot Research Techniques, London School of Economics and Political Sciences This research
More informationA 2-error Correcting Code
A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check
More informationImplementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes
BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation
More information4 2y. TlOWT. Write as a power. (0.06) (0.06) (0.06) (0.06) Write as a power. Identify the term that is multiplied repeatedly.
4 2y X TlOWT Write as a power. (0.06) (0.06) (0.06) (0.06) Write as a power. (1.7) (1.7) (1.7) Identify the term that is multiplied repeatedly. Identify the term that is multiplied repeatedly. The term
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationAn Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission
An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,
More informationMCR3U Unit 7 Lesson Notes
7.1 Arithmetic Sequences Sequence: An ordered list of numbers identified by a pattern or rule that may stop at some number or continue indefinitely. Ex. 1, 2, 4, 8,... Ex. 3, 7, 11, 15 Term (of a sequence):
More informationSYNCHRONIZABLE ERROR- CORRECTING CODES by R. C. Bose and J. G. Caldwell University of North Carolina. Institute of Statistics Mimeo Series No.
e e - SYNCHRONZABLE ERROR- CORRECTNG CODES by R. C. Bose and J. G. Caldwell University of North Carolina nstitute of Statistics Mimeo Series No. 498 November 1966 A new technique for correcting synchronization
More informationPROBLEMS ON DIGITS / NUMBERS / FRACTIONS Ex-1: The sum of five consecutive positive integers is 55. The sum of the squares of the extreme terms is (1) 308 (2) 240 (3) 250 (4) 180 Let the five consecutive
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationPAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes
359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm
More informationApplications Using Factoring Polynomials
Applications Using Factoring Polynomials This section will discuss applications involving the area of a rectangle, consecutive integers, and right triangles. Recall the steps that will help to translate
More information12.1 Arithmetic Progression Geometric Progression General things about sequences
ENGR11 Engineering Mathematics Lecture Notes SMS, Victoria University of Wellington Week Five. 1.1 Arithmetic Progression An arithmetic progression is a sequence where each term is found by adding a fixed
More information} has dimension = k rank A > 0 over F. For any vector b!
FINAL EXAM Math 115B, UCSB, Winter 2009 - SOLUTIONS Due in SH6518 or as an email attachment at 12:00pm, March 16, 2009. You are to work on your own, and may only consult your notes, text and the class
More informationName: Chapter 7: Exponents and Polynomials
Name: Chapter 7: Exponents and Polynomials 7-1: Integer Exponents Objectives: Evaluate expressions containing zero and integer exponents. Simplify expressions containing zero and integer exponents. You
More informationConstruction of Galois Fields of Characteristic
Construction of Galois Fields of Characteristic Two and Irreducible Polynomials By J. D. Swift 1. Introduction. The primary purpose of this paper is to provide a practical method of constructing Galois
More informationDESIGN AND IMPLEMENTATION OF ENCODERS AND DECODERS. To design and implement encoders and decoders using logic gates.
DESIGN AND IMPLEMENTATION OF ENCODERS AND DECODERS AIM To design and implement encoders and decoders using logic gates. COMPONENTS REQUIRED S.No Components Specification Quantity 1. Digital IC Trainer
More informationWarm-Up. Simplify the following terms:
Warm-Up Simplify the following terms: 81 40 20 i 3 i 16 i 82 TEST Our Ch. 9 Test will be on 5/29/14 Complex Number Operations Learning Targets Adding Complex Numbers Multiplying Complex Numbers Rules for
More informationGenerator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.
Cyclic Codes II Generator Matrix We would now like to consider how the ideas we have previously discussed for linear codes are interpreted in this polynomial version of cyclic codes. Theorem 6: If the
More informationImplementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes
BCH Codes Wireless Information Transmission System La. Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation
More informationYear 6 Place Value Maths Chilli Challenge Cards
Year 6 Place Value Maths Chilli Challenge Cards Use negative numbers in context, and calculate intervals across zero. What number is three less than one? Count forwards from -3. -3,,, 0,, 2,, Read, write,
More informationSIMPLIFIED CALCULATION OF PRINCIPAL COMPONENTS HAROLD HOTELLING
PSYCHOMETRIKA--VOL. 1, NO. 1 SIMPLIFIED CALCULATION OF PRINCIPAL COMPONENTS HAROLD HOTELLING The resolution of a set of n tests or other variates into components 7~, each of which accounts for the greatest
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationFinite arithmetic and Latin squares
Finite arithmetic and Latin squares Robin McLean 27th January 2018 Can you imagine a world in which there are only a finite number of numbers?... not simply a world with only a finite number of numerals
More informationFast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium
More informationSolutions, 2004 NCS/MAA TEAM COMPETITION
Solutions, 004 NCS/MAA TEAM COMPETITION Each problem number is followed by an 11-tuple (a 10, a 9, a 8, a 7, a 6, a 5, a 4, a 3, a, a 1, a 0 ), where a k is the number of teams that scored k points on
More informationDiscrete Mathematics and Probability Theory Fall 2013 Vazirani Note 6
CS 70 Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 6 Error Correcting Codes We will consider two situations in which we wish to transmit information on an unreliable channel. The
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationERROR-CORRECTING CODES AND LATIN SQUARES
ERROR-CORRECTING CODES AND LATIN SQUARES Ritu Ahuja Department of Mathematics, Khalsa College for Women, Civil Lines, Ludhiana 141001, Punjab, (India) ABSTRACT Data stored and transmitted in digital form
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationPY 351 Modern Physics Short assignment 4, Nov. 9, 2018, to be returned in class on Nov. 15.
PY 351 Modern Physics Short assignment 4, Nov. 9, 2018, to be returned in class on Nov. 15. You may write your answers on this sheet or on a separate paper. Remember to write your name on top. Please note:
More informationREPRESENTATIONS FOR A SPECIAL SEQUENCE
REPRESENTATIONS FOR A SPECIAL SEQUENCE L. CARLITZ* RICHARD SCOVILLE Dyke University, Durham,!\!orth Carolina VERNERE.HOGGATTJR. San Jose State University, San Jose, California Consider the sequence defined
More informationREED-SOLOMON CODE SYMBOL AVOIDANCE
Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University
More informationAlgebra Summer Review Packet
Name: Algebra Summer Review Packet About Algebra 1: Algebra 1 teaches students to think, reason, and communicate mathematically. Students use variables to determine solutions to real world problems. Skills
More informationL1 2.1 Long Division of Polynomials and The Remainder Theorem Lesson MHF4U Jensen
L1 2.1 Long Division of Polynomials and The Remainder Theorem Lesson MHF4U Jensen In this section you will apply the method of long division to divide a polynomial by a binomial. You will also learn to
More informationNumber Bases. Ioan Despi. University of New England. August 4, 2013
Number Bases Ioan Despi despi@turing.une.edu.au University of New England August 4, 2013 Outline Ioan Despi AMTH140 2 of 21 1 Frequently Used Number Systems 2 Conversion to Numbers of Different Bases 3
More informationSTEP Support Programme. Hints and Partial Solutions for Assignment 17
STEP Support Programme Hints and Partial Solutions for Assignment 7 Warm-up You need to be quite careful with these proofs to ensure that you are not assuming something that should not be assumed. For
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationCyclic Redundancy Check Codes
Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic
More informationFinite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal
Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................
More informationDiscrete Mathematics and Probability Theory Spring 2015 Vazirani Midterm #2 Solution
CS 70 Discrete Mathematics and Probability Theory Spring 015 Vazirani Midterm # Solution PRINT your name:, (last) SIGN your name: (first) PRINT your student ID: CIRCLE your exam room: 3106 Etcheverry 3108
More informationPolynomial and Rational Functions. Copyright Cengage Learning. All rights reserved.
2 Polynomial and Rational Functions Copyright Cengage Learning. All rights reserved. 2.3 Real Zeros of Polynomial Functions Copyright Cengage Learning. All rights reserved. What You Should Learn Use long
More informationWallace R. Blischke, Research Associate Biometrics Unit New York State College of Agriculture Cornell University Ithaca, New York
LEAST SQUARES ESTIMATORS OF TWO INTERSECTING LINES Technical Report No. 7 Department of Navy Office of Naval Research Contract No. Nonr-401(39) Project No. (NR 042-212) Wallace R. Blischke, Research Associate
More information22. The Quadratic Sieve and Elliptic Curves. 22.a The Quadratic Sieve
22. The Quadratic Sieve and Elliptic Curves 22.a The Quadratic Sieve Sieve methods for finding primes or for finding factors of numbers are methods by which you take a set P of prime numbers one by one,
More informationLT1: Adding and Subtracting Polynomials. *When subtracting polynomials, distribute the negative to the second parentheses. Then combine like terms.
LT1: Adding and Subtracting Polynomials *When adding polynomials, simply combine like terms. *When subtracting polynomials, distribute the negative to the second parentheses. Then combine like terms. 1.
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More information2013/Fall-Winter Term Monday 12:50 Room# or 5F Meeting Room Instructor: Fire Tom Wada, Professor
SYSTEM ARCHITECTURE ADVANCED SYSTEM ARCHITECTURE Error Correction Code 1 01/Fall-Winter Term Monday 1:50 Room# 1- or 5F Meeting Room Instructor: Fire Tom Wada, Professor 014/1/0 System Arch 1 Introduction
More informationL1 2.1 Long Division of Polynomials and The Remainder Theorem Lesson MHF4U Jensen
L1 2.1 Long Division of Polynomials and The Remainder Theorem Lesson MHF4U Jensen In this section you will apply the method of long division to divide a polynomial by a binomial. You will also learn to
More informationPrepared by Sa diyya Hendrickson. Package Summary
Introduction Prepared by Sa diyya Hendrickson Name: Date: Package Summary Understanding Variables Translations The Distributive Property Expanding Expressions Collecting Like Terms Solving Linear Equations
More informationALGEBRA 1. Interactive Notebook Chapter 2: Linear Equations
ALGEBRA 1 Interactive Notebook Chapter 2: Linear Equations 1 TO WRITE AN EQUATION: 1. Identify the unknown (the variable which you are looking to find) 2. Write the sentence as an equation 3. Look for
More informationOptical Storage Technology. Error Correction
Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event
More informationConversions between Decimal and Binary
Conversions between Decimal and Binary Binary to Decimal Technique - use the definition of a number in a positional number system with base 2 - evaluate the definition formula ( the formula ) using decimal
More informationBinomial coefficient codes over W2)
Discrete Mathematics 106/107 (1992) 181-188 North-Holland 181 Binomial coefficient codes over W2) Persi Diaconis Harvard University, Cambridge, MA 02138, USA Ron Graham AT & T Bell Laboratories, Murray
More informationCS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability
More informationNumerical Methods and Computation Prof. S.R.K. Iyengar Department of Mathematics Indian Institute of Technology Delhi
Numerical Methods and Computation Prof. S.R.K. Iyengar Department of Mathematics Indian Institute of Technology Delhi Lecture No - 27 Interpolation and Approximation (Continued.) In our last lecture we
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More information6-3 Solving Systems by Elimination
Another method for solving systems of equations is elimination. Like substitution, the goal of elimination is to get one equation that has only one variable. To do this by elimination, you add the two
More informationA General Formula of Polynomial Interpolation. A. C. AITKEN. (Received 2nd March Bead 3rd May 1929.) 1. ENUNCIATION AND PEOOF.
199 A General Formula of Polynomial Interpolation. By A. C. AITKEN. (Received 2nd March 1929. Bead 3rd May 1929.) 1. ENUNCIATION AND PEOOF. The operations 1 of differentiation, ordinary and central differencing,
More informationChapter 3: Inequalities
Chapter 3: Inequalities 3-1: Graphing and Writing Inequalities Objectives: Identify solutions of inequalities in one variable. Write and graph inequalities in one variable. Inequality: The quantities are
More informationEXTRA CREDIT FOR MATH 39
EXTRA CREDIT FOR MATH 39 This is the second, theoretical, part of an extra credit homework. This homework in not compulsory. If you do it, you can get up to 6 points (3 points for each part) of extra credit
More informationCONVOLUTION TREES AND PASCAL-T TRIANGLES. JOHN C. TURNER University of Waikato, Hamilton, New Zealand (Submitted December 1986) 1.
JOHN C. TURNER University of Waikato, Hamilton, New Zealand (Submitted December 986). INTRODUCTION Pascal (6-66) made extensive use of the famous arithmetical triangle which now bears his name. He wrote
More informationUNIVERSITY OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C. RICHARD F. POTTHOFF February, Contract No.
UNIVERSITY OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C. COlPARING THE MEDIANS OF TvlO SYNMEl'RICAL POPULATICNS by RICHARD F. POTTHOFF February, 962 Contract No. AF 49(638)-23 This paper
More informationA General Class of Optimal Polynomials Related to Electric Filters
J. Inst. Maths Applies (1979) 24, 197-208 A General Class of Optimal Polynomials Related to Electric Filters E. COHEN Department of Electrical Engineering, New Jersey Institute of Technology, Newark, New
More informationSchool of Business. Blank Page
Maxima and Minima 9 This unit is designed to introduce the learners to the basic concepts associated with Optimization. The readers will learn about different types of functions that are closely related
More informationDivisibility, Factors, and Multiples
Divisibility, Factors, and Multiples An Integer is said to have divisibility with another non-zero Integer if it can divide into the number and have a remainder of zero. Remember: Zero divided by any number
More informationEarly Start: Worksheet #1 No calculator/phone use (11 16) (17 10)3
Early Start: Worksheet #1 No calculator/phone use I. Perform the operations; simplify completely. a) 8 ( + 4) ( 7) + ( 1) b) (11 16) (17 10) c) 7 14 6 d) 1 6 5 e) 4 1 + f) 6 9() 10 + 5 5 1 5 4 g) 9 9 +
More informationLecture 2: Mutually Orthogonal Latin Squares and Finite Fields
Latin Squares Instructor: Padraic Bartlett Lecture 2: Mutually Orthogonal Latin Squares and Finite Fields Week 2 Mathcamp 2012 Before we start this lecture, try solving the following problem: Question
More information) sm wl t. _.!!... e -pt sinh y t. Vo + mx" + cx' + kx = 0 (26) has a unique tions x(o) solution for t ;?; 0 satisfying given initial condi
1 48 Chapter 2 Linear Equations of Higher Order 28. (Overdamped) If Xo = 0, deduce from Problem 27 that x(t) Vo = e -pt sinh y t. Y 29. (Overdamped) Prove that in this case the mass can pass through its
More informationTwitter: @Owen134866 www.mathsfreeresourcelibrary.com Prior Knowledge Check 1) Simplify: a) 3x 2 5x 5 b) 5x3 y 2 15x 7 2) Factorise: a) x 2 2x 24 b) 3x 2 17x + 20 15x 2 y 3 3) Use long division to calculate:
More informationModule 2 Advanced Symmetric Ciphers
Module 2 Advanced Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Data Encryption Standard (DES) The DES algorithm
More informationAlgebraic Expressions and Identities
9 Algebraic Epressions and Identities introduction In previous classes, you have studied the fundamental concepts of algebra, algebraic epressions and their addition and subtraction. In this chapter, we
More informationUNC Charlotte 2004 Algebra with solutions
with solutions March 8, 2004 1. Let z denote the real number solution to of the digits of z? (A) 13 (B) 14 (C) 15 (D) 16 (E) 17 3 + x 1 = 5. What is the sum Solution: E. Square both sides twice to get
More informationLet s Do Algebra Tiles
Let s Do Algebra Tiles Algebra Tiles Algebra tiles can be used to model operations involving integers. Let the small green square represent +1 and the small pink square represent -1. The green and pink
More informationSecondary Math 2H Unit 3 Notes: Factoring and Solving Quadratics
Secondary Math H Unit 3 Notes: Factoring and Solving Quadratics 3.1 Factoring out the Greatest Common Factor (GCF) Factoring: The reverse of multiplying. It means figuring out what you would multiply together
More informationIntermediate Mathematics League of Eastern Massachusetts
Meet #4 February, 2003 Intermediate Mathematics League of Eastern Massachusetts www.imlem.org Meet #4 February, 2003 Category 1 Mystery You may use a calculator 1. The numbers 1, 5, 12, and 22 are called
More information3.4. ZEROS OF POLYNOMIAL FUNCTIONS
3.4. ZEROS OF POLYNOMIAL FUNCTIONS What You Should Learn Use the Fundamental Theorem of Algebra to determine the number of zeros of polynomial functions. Find rational zeros of polynomial functions. Find
More informationPYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
More informationRevision papers for class VI
Revision papers for class VI 1. Fill in the blanks; a. 1 lakh=--------ten thousand b. 1 million=-------hundred thousand c. 1 Crore=--------------million d. 1 million=------------1 lakh 2. Add the difference
More informationNumbering Systems. Contents: Binary & Decimal. Converting From: B D, D B. Arithmetic operation on Binary.
Numbering Systems Contents: Binary & Decimal. Converting From: B D, D B. Arithmetic operation on Binary. Addition & Subtraction using Octal & Hexadecimal 2 s Complement, Subtraction Using 2 s Complement.
More informationPartial Fractions. June 27, In this section, we will learn to integrate another class of functions: the rational functions.
Partial Fractions June 7, 04 In this section, we will learn to integrate another class of functions: the rational functions. Definition. A rational function is a fraction of two polynomials. For example,
More informationON DIFFERENCE SETS WHOSE PARAMETERS SATISFY A CERTAIN RELATION
ON DIFFERENCE SETS WHOSE PARAMETERS SATISFY A CERTAIN RELATION P. KESAVA MENON 1. Introduction. Let us denote, as usual, the parameters of a difference set by v, k, X, n so that (1.1) k2=n + \v, il.2)
More information