Calculate the reliability of this code-and-channel system

Assignment Help Basic Computer Science
Reference no: EM131241579

Suppose the available channel is binary symmetric with reliability .8. Suppose S = {a,b}, fa = .999, fb = .001, and the encoding scheme is a → 000,b → 111.

(a) Verify that MLD will decode every word w ∈ {0,1}3 as ‘a'.

(b) Calculate the reliability of this code-and-channel system and the maximum error probability. (c) Same question as (b), but use NCWD.

(d) How large must t be so that, if we consider the encoding scheme a → 0t = 0···0 (t zeroes) and b → 1t , then MLD will decode 1t as b?

(e) Find the reliability and the maximum error probability of the codeand-channel system obtained by taking the scheme you found in part (d), when the decoding method is MLD and again when it is NCWD.

Reference no: EM131241579

Questions Cloud

What about from a cfos perspective : What do you expect the price reaction to be on the day that the new seasoned equity offering shares are sold into the market?
How easy or difficult might it be to get the entire family : After reviewing the module material, reflect on the following questions: How easy or difficult might it be to get the entire family involved in treatment? Why might this be a challenge?
Estimate the reliability of each of the channels : Estimate the reliability of each of the channels mentioned in exercise 1, above, by imposing equal source frequencies on the input characters. (Of course, in (c) the result will be exact.)
Federal reserve system have improved or impaired the economy : Why is the New York Federal Reserve president always on the FOMC? Does the committee meet often enough? Should its meetings be closed to the public? Have its recent attempts at greater transparency helped its image? In responding to your classmates’ ..
Calculate the reliability of this code-and-channel system : Suppose the available channel is binary symmetric with reliability .8. Suppose S = {a,b}, fa = .999, fb = .001, and the encoding scheme is a → 000,b → 111.
Use an indifference curve budget line analysis : Some of the largest import tariffs are on shoes. Strangely, the cheaper the shoes, the higher the tariff. The highest US tariff. 67%, is on a pair of $3 canvas sneakers, while the tarriff on $12 sneakers is 37% and that on $300 Italian leather import..
Determine the amount of underapplied overhead cost : At the end of the year, the firm's records revealed the following actual cost and operating data for all cases handled during the year. Determine the amount of underapplied overhead cost in each department for the year.
Do they provide information on standardization or validity : Give one a try and then do a web search for intelligence tests and see if you get the same results when you take a different test. Do the websites tell you how reliable the tests are? Do they provide information on standardization or validity? If ..
Purchase fits with the monopoly price-quantity model : Think of a time when you purchased something in a monopoly market. For example, purchasing a soft drink at movie theater is close to being a monopoly market since consumers have little choice of an alternative supply. Discuss how this purchase fits w..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Charitable donation since the selling price

A firm has fully depreciated its network server, but a buyer is willing to pay $5,000 for it. If the firm sells the depreciated server, which of the following consequences is MOST accurate?

  Function that displays the following message to the user

Your program must check for input validity. It must display an appropriate error message and terminate if the three inputs for date (day, month, and year) do not form a valid date.

  What is the order of the public key?

the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z ? 29 with the primitive element ?= 2. His public key is ?= 28.

  Find the average number of books borrowed per member

Find the average number of books borrowed per member

  Design a program that accepts player data

Design an application that produces a count of the number of players registered for each team listed in Exercise 4a.

  Focus on paramtized queries and stored procedure

The testing phase will include creating a simple page of login as password with simple code and show that the sql injections occurs (show codes and snapshots where necessary)

  Context of information technology and information security

How is "compromise" defined in the context of information technology and information security? A compromise is a security breach that is always perpetrated by a malicious attacker.

  What is the effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of those remaining, 10 percent (or 2 percent of the total) cause page faults. What is the effective memory access time?

  Cases for a university library borrowing system

Create a set of use cases for a university library borrowing system. (Do not worry about catalogue searching, etc.) The system will record the books owned by the library and will record who has borrowed what books.

  Main ways to interface with the database

There are 2 main ways to interface with the database: using stored procedures or passing in the raw queries directly. If the class scheduler needed a screen to search for students, how might each approach be used?

  Using social media for marketing

Using Social Media for Marketing

  What is included in an it policy framework

What is included in an IT policy framework. Incident reporting, incident management, and user ID addition/removal are examples of which of the following

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd