This document discusses error coding techniques used in digital communications. It begins by explaining modulo-2 arithmetic operations that are the basis for digital coding. It then covers binary manipulation of addition and multiplication. Various error detection and correction codes are described, including cyclic redundancy check (CRC), linear block codes, and Hamming codes. Hamming codes add redundant bits to allow detection and correction of bit errors during transmission.
In this slide we have discussed, different arithmetic operations like addition, subtraction, multiplication and division for binary numbers. Addition and subtraction operation is achieved using one's complement and two's complement number system.
Chapter 2.1 introduction to number systemISMT College
Binary Number System, Decimal Number System, Octal Number System, Hexadecimal Number System, Conversion, Binary Arithmetic, Signed Binary Number Representation, 1's complement, 2's complement, 9's complement, 10's complement
A power point presentation on number system which briefly explains the conversion of decimal to binary, binary to decimal, binary to octal, octal to decimal. Ping me at Twitter (https://twitter.com/rishabh_kanth), to Download this Presentation.
FYBSC IT Digital Electronics Unit I Chapter II Number System and Binary Arith...Arti Parab Academics
Binary Arithmetic:
Binary addition, Binary subtraction, Negative number representation,
Subtraction using 1’s complement and 2’s complement, Binary
multiplication and division, Arithmetic in octal number system,
Arithmetic in hexadecimal number system, BCD and Excess – 3
arithmetic.
In this slide we have discussed, different arithmetic operations like addition, subtraction, multiplication and division for binary numbers. Addition and subtraction operation is achieved using one's complement and two's complement number system.
Chapter 2.1 introduction to number systemISMT College
Binary Number System, Decimal Number System, Octal Number System, Hexadecimal Number System, Conversion, Binary Arithmetic, Signed Binary Number Representation, 1's complement, 2's complement, 9's complement, 10's complement
A power point presentation on number system which briefly explains the conversion of decimal to binary, binary to decimal, binary to octal, octal to decimal. Ping me at Twitter (https://twitter.com/rishabh_kanth), to Download this Presentation.
FYBSC IT Digital Electronics Unit I Chapter II Number System and Binary Arith...Arti Parab Academics
Binary Arithmetic:
Binary addition, Binary subtraction, Negative number representation,
Subtraction using 1’s complement and 2’s complement, Binary
multiplication and division, Arithmetic in octal number system,
Arithmetic in hexadecimal number system, BCD and Excess – 3
arithmetic.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
1. CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
5: Error Coding
2. CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
5: Error Coding: Modulo-2
3. Modulo-2
Digital coding uses modulo-2 arithmetic where addition becomes the following
operations:
• 0+0=0 1+1=0
• 0+1=1 1+0=1
It performs the equivalent operation to an exclusive-OR (XOR) function. For
modulo-2 arithmetic, subtraction is the same operation as addition:
• 0–0=0 1–1=0
• 0–1=1 1–0=1
Multiplication is performed with the following:
• 00=0 01=0
• 10=0 11=1
which is an equivalent operation to a logical AND operation.
4. Binary Manipulation
• Link.
10111 x4
+x2
+x+1
1000 0001 x7
+ 1
1111 1111 1111 1111 x11
+x10
+x9
+x8
+x7
+x6
+x5
+x4
+x3
+x2
+x+1
10101010 x6
+x4
+x2
+x
For example: 101110
is represented as: (x2
+1)(x2
+x)
which equates to: x4
+x3
+x2
+x
which is thus: 11110
8. Hamming distance
• Hamming difference between 101101010 and 011101100? Link.
• The Hamming distance can be used to determine how well the code
will cope with errors. The minimum Hamming distance min{d(C1,C2)}
defines by how many bits the code must change so that one code can
become another code.
• A code C can detect up to N errors for any code word if d(C) is greater
than or equal to N+1 (that is, d(C)N+1).
• A code C can correct up to M errors in any code word if d(C) is greater
than or equal to 2M+1 (that is, d(C)2M+1).
9. Error detection
• For example: {00000, 01101, 10110, 11011} has a Hamming distance
of 3. Link.
• d(C)N+1
• d(C) is 3, thus N must be 2. So we can detect one or two bits in error
in the code.
• Eg 00000 could become 01010 ... and this will be detected as an error,
as the code does not exist.
10. Error correction
• For example: {00000, 01101, 10110, 11011} has a Hamming distance
of 3. Link.
• d(C)2M+1
• d(C) is 3, thus M must be 1. So we can correct one bit in error in the
code.
• Eg 00000 could become 00010 ... and as the nearest code will be
“00000”.
11. Examples
• What is the Hamming distance of {00000000, 11111111, 11110000,
01010101} Link? How many errors can be detected? How many errors
can be corrected?
• What is the Hamming distance of {10111101011, 10011111011,
11110101011, 10100101011, 10111101000} Link?
12. CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
5: Error Coding: Error Correction
13. Linear and cyclic codes
• Linear Code: sum of any two codes equals another code - {00, 01, 10,
11} and {00000, 01101, 10110, 11011}.
• Cyclic Codes: Linear Code + When a cyclic shift also gives a code word
- {0000, 0110, 0011, 1001, 1100, 0001, 0010, 0100, 1000}
• Is {000, 010, 011, 100, 001} cyclic?
14. Block parity
• Odd parity (make number of 1s
odd) or Even parity (make
number of 1s even).
• Detects single bit errors.
• Cannot detect when two bits in
error in the same position.
• Example (binary). Link.
• Example (int). Link.
1 0000 0001
4 0000 0100
12 0000 1100
–1 1111 1111
–6 1111 1010
17 0001 0001
0 0000 0000
–10 1111 0110
1110 1011
16. Cyclic redundancy checking (CRC)
Example: We have 32, and make it divisible by 9, we add a ‘0’ to make
‘320’, and now divide by 9, to give 35 remainder 4. So lets add ‘4’ to
make 324. Now when it is received we divide by 9, and if the answer is
zero, there are no errors, and we can ignore the last digit.
CRC-CCITT: x16+x12+x5+1
• The error correction code is 16 bits long and is the remainder
of the data message polynomial G(x) divided by the
generator polynomial P(x) (x16+x12+x5+1, i.e.
10001000000100001).
• The quotient is discarded and the remainder is truncated to
16 bits. This is then appended to the message as the coded
word.
x16+x12+x5+1 G(x)
17. CRC Example
• Example. Link.
For a 7-bit data code 1001100 determine the encoded bit pattern using a CRC generating
polynomial of P(x)=x3
+x2
+x0
. Show that the receiver will not detect an error if there are no
bits in error.
P(x)=x3
+x2
+x0
(1101)
G(x)=x6
+x3
+x2
(1001100)
Multiply by the number of bits in the CRC polynomial.
x3
(x6
+x3
+x2
)
x9
+x6
+x5
(1001100000)
Figure 5.3 shows the operations at the transmitter. The transmitted message is thus:
1001100001
Figure 5.3
18. CRC (Receiving)
• Example. Link.
For a 7-bit data code 1001100 determine the encoded bit pattern using a CRC generating
polynomial of P(x)=x3
+x2
+x0
. Show that the receiver will not detect an error if there are no
bits in error.
P(x)=x3
+x2
+x0
(1101)
G(x)=x6
+x3
+x2
(1001100)
Multiply by the number of bits in the CRC polynomial.
x3
(x6
+x3
+x2
)
x9
+x6
+x5
(1001100000)
Figure 5.3 shows the operations at the transmitter. The transmitted message is thus:
1001100001
No error!
20. CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
Hamming Code
21. Hamming Codes
Error correction: m is number of bits in the data symbol
n is number of Hamming bits
Eg if we have 4 bits (m=4). Then to correct we need n=3 (as 8 is greater
than or equal to 4+3+1).
How many error correcting bits would be need for 5 bits?
12 nmn
22. Hamming Codes
The character is 011001
The Hamming bits are HHHH
The message format will be 01H100H1HH
Position Code
9 1001
7 0111
3 0011
XOR 1101
10 9 8 7 6 5 4 3 2 1
0 1 1 1 0 0 1 1 0 1
26. Hamming Code (receiving)
• At the receiver we calculate the Syndrome matrix S ... if all zeros ... no
error!
3
2
1
4
3
2
3
1
2
1
1111000
1100110
1010101
S
S
S
D
D
D
P
D
P
P
T
HRS
27. Hamming Code (Example)
• Link.
1111000
1100110
1010101
H and
0
1
0
1
1
0
1
T
T
D1
D2
D3
D4
4323121 DDDPDPPT
and D1=1, D2=0, D3=1, D4=0
for even parity:
P1 checks the 1st, 3rd, 5th and 7th, so P1 D1 D2 D4 = 0; thus P1 =1
P2 checks the 2nd, 3rd, 6th and 7th, so P2 D1 D3 D4 = 0; thus P2 =0
P3 checks the 4th, 5th, 6th and 7th, so P3 D2 D3 D4 = 0; thus P3 =1