SlideShare a Scribd company logo
Coding Theory 
Nithin Koshy 
14CS40128
Code Theory 
•Coding Theory is the study of error control codes 
•Error control codes are used to detect and correct 
the codes that occur when a data are transferred or 
stored 
Code Theory concept is a mix of Mathematics, 
computer science, electrical engineering, 
telecommunications 
Linear Algebra, Abstract Algebra(groups, rings,fields) 
Probability& Statistics, Signals &System etc…
Encoding and Decoding 
•An Encoding function is an one-to-one function which 
provides a means to detect or correct Errors occurred 
during transmission of signals(0’s and 1’s) 
•A Decoding function is an onto function which 
provides a means to recapture the transmitted word
• One to one function: 
• f(x1)=f(x2) =>x1=x2 or f(x1)!=f(x2) =>x1!=x2 
• Onto function: only if for every element in set ‘B’ 
there exists pre image in ’A’ 
• Generator Matrix 
• What is a generator Matrix? 
• Let us consider a encoding function say E: Z2(pow 
m ->z2 (pow n) 
• So this means that we are encoding M bit 
information into an ‘n’ bit code
• Matrix form is followed for E ie I MxM/Am(n-m) such 
type of Matrix is known as Generator Matrix for the 
given function E 
• How to generate a code word ? 
• C=M.G 
• M=Message in row matrix form , G=Generator 
Matrix
• An error-correcting code is an algorithm for 
expressing a sequence of numbers such that any 
errors which are introduced can be detected and 
corrected (within certain limitations) based on the 
remaining numbers. 
• MAXIMUM LIKELIHOOD TECHNIQUE : 
• Given an (m,n) encoding function e : Bm ->Bn , we 
often need to 
• determine an (n,m) decoding function d : Bn->Bm 
associated with e.
Parity Check 
• Suppose that a parity check bit is added to a bit 
string before it is transmitted. What can you 
conclude if you receive the bit strings 1110011 
• and 10111101 as messages? 
• Answer 
• Since the string 1110011 contains an odd number of 
1s, it cannot be a valid codeword therefore, 
contain an odd number of errors. 
• On the other hand, the string 10111101 contains an 
even number of 1s. Hence it is either a valid 
codeword or contains an even number of errors.
Hamming Distance 
• There is a simple way to measure the distance between two 
bit strings. We look at the number of positions in which these 
bit strings differ 
• Definition : The Hamming distance d(x, y) between the bit 
strings x = x1x2 . . . xn and y = y1y2 . . . yn is the number of 
positions in which these strings differ, that is, the number of i (i 
= 1, 2, . . . , n) for which xi != yi.. 
• ex: 01110 and 11011 
• Since 01110 and 11011 differ in their first, third, and fifth bits, 
d(01110, 11011) = 3
Thanks
Thanks

More Related Content

What's hot

Coa module2
Coa module2Coa module2
Coa module2
cs19club
 
Types of operations in machine instruction
Types of operations in machine instructionTypes of operations in machine instruction
Types of operations in machine instruction
sheiblu
 
B1-1-Data_Presentation
B1-1-Data_PresentationB1-1-Data_Presentation
B1-1-Data_Presentation
papettas
 
NLP Bootcamp 2018 : Representation Learning of text for NLP
NLP Bootcamp 2018 : Representation Learning of text for NLPNLP Bootcamp 2018 : Representation Learning of text for NLP
NLP Bootcamp 2018 : Representation Learning of text for NLP
Anuj Gupta
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeBala Ganesh
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Decimal number system
Decimal number systemDecimal number system
Decimal number system
Nisarg Amin
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE
INTRODUCTION TO ARTIFICIAL INTELLIGENCEINTRODUCTION TO ARTIFICIAL INTELLIGENCE
INTRODUCTION TO ARTIFICIAL INTELLIGENCE
ravi021
 
Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Hemita Dua
 
Associative memory 14208
Associative memory 14208Associative memory 14208
Associative memory 14208
Ameer Mehmood
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
Sam Bowne
 
როგორ ინახება ინფორმაცია
როგორ ინახება ინფორმაციაროგორ ინახება ინფორმაცია
როგორ ინახება ინფორმაციაLela Beridze-geradze
 
Representation of Integers
Representation of IntegersRepresentation of Integers
Representation of Integers
Susantha Herath
 
ΠΛΗ10 ΜΑΘΗΜΑ 1.1
ΠΛΗ10 ΜΑΘΗΜΑ 1.1ΠΛΗ10 ΜΑΘΗΜΑ 1.1
ΠΛΗ10 ΜΑΘΗΜΑ 1.1
Dimitris Psounis
 
Binary Number System and Codes
Binary Number System and CodesBinary Number System and Codes
Binary Number System and Codes
Digital System Design
 
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
Edureka!
 
ΠΛΗ10 ΤΕΣΤ 1
ΠΛΗ10 ΤΕΣΤ 1ΠΛΗ10 ΤΕΣΤ 1
ΠΛΗ10 ΤΕΣΤ 1
Dimitris Psounis
 
LSA algorithm
LSA algorithmLSA algorithm
LSA algorithm
Andrew Koo
 
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό ΥπολογιστώνΕφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
Anna Dimitrakopoulou
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 

What's hot (20)

Coa module2
Coa module2Coa module2
Coa module2
 
Types of operations in machine instruction
Types of operations in machine instructionTypes of operations in machine instruction
Types of operations in machine instruction
 
B1-1-Data_Presentation
B1-1-Data_PresentationB1-1-Data_Presentation
B1-1-Data_Presentation
 
NLP Bootcamp 2018 : Representation Learning of text for NLP
NLP Bootcamp 2018 : Representation Learning of text for NLPNLP Bootcamp 2018 : Representation Learning of text for NLP
NLP Bootcamp 2018 : Representation Learning of text for NLP
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Decimal number system
Decimal number systemDecimal number system
Decimal number system
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE
INTRODUCTION TO ARTIFICIAL INTELLIGENCEINTRODUCTION TO ARTIFICIAL INTELLIGENCE
INTRODUCTION TO ARTIFICIAL INTELLIGENCE
 
Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...
 
Associative memory 14208
Associative memory 14208Associative memory 14208
Associative memory 14208
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
როგორ ინახება ინფორმაცია
როგორ ინახება ინფორმაციაროგორ ინახება ინფორმაცია
როგორ ინახება ინფორმაცია
 
Representation of Integers
Representation of IntegersRepresentation of Integers
Representation of Integers
 
ΠΛΗ10 ΜΑΘΗΜΑ 1.1
ΠΛΗ10 ΜΑΘΗΜΑ 1.1ΠΛΗ10 ΜΑΘΗΜΑ 1.1
ΠΛΗ10 ΜΑΘΗΜΑ 1.1
 
Binary Number System and Codes
Binary Number System and CodesBinary Number System and Codes
Binary Number System and Codes
 
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
A Brief History Of Artificial Intelligence | Developing Text To Speech Recogn...
 
ΠΛΗ10 ΤΕΣΤ 1
ΠΛΗ10 ΤΕΣΤ 1ΠΛΗ10 ΤΕΣΤ 1
ΠΛΗ10 ΤΕΣΤ 1
 
LSA algorithm
LSA algorithmLSA algorithm
LSA algorithm
 
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό ΥπολογιστώνΕφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
Εφαρμογές Πληροφορικής - Κεφάλαιο 1: Υλικό Υπολογιστών
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 

Similar to Coding theory updated

Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
saigopinadh bodigiri
 
Unit-4.pptx
Unit-4.pptxUnit-4.pptx
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
Annymus
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
Kotresh Marali
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
SudhanshuSaini5
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010
Felicia Fort, MBA
 
Data links
Data links Data links
Data links
EshaAfzal5
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
WinterSnow16
 
unit 5 (1).pptx
unit 5 (1).pptxunit 5 (1).pptx
unit 5 (1).pptx
HimansuShekharPradha1
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
SneheshDutta
 
Source coding
Source coding Source coding
Source coding
Shankar Gangaju
 

Similar to Coding theory updated (20)

Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Unit-4.pptx
Unit-4.pptxUnit-4.pptx
Unit-4.pptx
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Ch3 datalink
Ch3 datalinkCh3 datalink
Ch3 datalink
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
Digital Communication Techniques
Digital Communication TechniquesDigital Communication Techniques
Digital Communication Techniques
 
Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010
 
Data links
Data links Data links
Data links
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
 
unit 5 (1).pptx
unit 5 (1).pptxunit 5 (1).pptx
unit 5 (1).pptx
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
Source coding
Source coding Source coding
Source coding
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Coding theory updated

  • 1. Coding Theory Nithin Koshy 14CS40128
  • 2. Code Theory •Coding Theory is the study of error control codes •Error control codes are used to detect and correct the codes that occur when a data are transferred or stored Code Theory concept is a mix of Mathematics, computer science, electrical engineering, telecommunications Linear Algebra, Abstract Algebra(groups, rings,fields) Probability& Statistics, Signals &System etc…
  • 3. Encoding and Decoding •An Encoding function is an one-to-one function which provides a means to detect or correct Errors occurred during transmission of signals(0’s and 1’s) •A Decoding function is an onto function which provides a means to recapture the transmitted word
  • 4. • One to one function: • f(x1)=f(x2) =>x1=x2 or f(x1)!=f(x2) =>x1!=x2 • Onto function: only if for every element in set ‘B’ there exists pre image in ’A’ • Generator Matrix • What is a generator Matrix? • Let us consider a encoding function say E: Z2(pow m ->z2 (pow n) • So this means that we are encoding M bit information into an ‘n’ bit code
  • 5. • Matrix form is followed for E ie I MxM/Am(n-m) such type of Matrix is known as Generator Matrix for the given function E • How to generate a code word ? • C=M.G • M=Message in row matrix form , G=Generator Matrix
  • 6. • An error-correcting code is an algorithm for expressing a sequence of numbers such that any errors which are introduced can be detected and corrected (within certain limitations) based on the remaining numbers. • MAXIMUM LIKELIHOOD TECHNIQUE : • Given an (m,n) encoding function e : Bm ->Bn , we often need to • determine an (n,m) decoding function d : Bn->Bm associated with e.
  • 7. Parity Check • Suppose that a parity check bit is added to a bit string before it is transmitted. What can you conclude if you receive the bit strings 1110011 • and 10111101 as messages? • Answer • Since the string 1110011 contains an odd number of 1s, it cannot be a valid codeword therefore, contain an odd number of errors. • On the other hand, the string 10111101 contains an even number of 1s. Hence it is either a valid codeword or contains an even number of errors.
  • 8. Hamming Distance • There is a simple way to measure the distance between two bit strings. We look at the number of positions in which these bit strings differ • Definition : The Hamming distance d(x, y) between the bit strings x = x1x2 . . . xn and y = y1y2 . . . yn is the number of positions in which these strings differ, that is, the number of i (i = 1, 2, . . . , n) for which xi != yi.. • ex: 01110 and 11011 • Since 01110 and 11011 differ in their first, third, and fifth bits, d(01110, 11011) = 3