Modify the cellular telephone coding system

Assignment Help Basic Computer Science
Reference no: EM131081989

Suppose a 10-digit phone number is transmitted by a cellular phone using four binary symbols for each digit, using the model of binary symbol errors and deletions given in Problem 1.10.2. If C denotes the number of bits sent correctly, D the number of deletions, and E the number of errors, what is P[C = c, D = d, E = e]? Your answer should be correct for any choice of c, d, and e.

Problem 1.10.2

We wish to modify the cellular telephone coding system in Example 1.41 in order to reduce the number of errors. In particular, if there are two or three zeroes in the received sequence of 5 bits, we will say that a deletion (event D) occurs. Otherwise, if at least 4 zeroes are received, then the receiver decides a zero was sent. Similarly, if at least 4 ones are received, then the receiver decides a one was sent. We say that an error occurs if either a one was sent and the receiver decides zero was sent or if a zero was sent and the receiver decides a one was sent. For this modified protocol, what is the probability P[E] of an error? What is the probability P[D] of a deletion?

Example 1.41

To communicate one bit of information reliably, cellular phones transmit the same binary symbol five times. Thus the information "zero" is transmitted as 00000 and "one" is 11111. The receiver detects the correct information if three or more binary symbols are received correctly. What is the information error probability P[E], if the binary symbol error probability is q = 0.1?

Reference no: EM131081989

Questions Cloud

New division of existing business : Write a 350-word executive summary defining the new division of existing business. Share your Vision, Mission, final business model, and value proposition, and list your key assumptions, risks, and change management issues. Quantify the growth and..
How many code words have exactly three 0''s : How many code words have exactly three 0's?
Important decision for operational risk managers : An important decision for operational risk managers is the extent to which operational risks should be insured against. What are the two major problems facing an insurance company?
Discuss whether you think this statement is a valid one : In addition it is virtual that the " whole organization sings the same song when implementing the marketing strategy". Discuss whether you think this statement is a valid one, assess the pros and cons of the organization wide implementation of mar..
Modify the cellular telephone coding system : To communicate one bit of information reliably, cellular phones transmit the same binary symbol five times. Thus the information "zero" is transmitted as 00000 and "one" is 11111. The receiver detects the correct information if three or more binar..
Goal of achieving a specific task : Create an agenda for a team meeting on a topic of your choice. Draw from your own experience working within a group with the goal of achieving a specific task. You may use your experience as a student working in a group, or develop a plan for a fu..
Compute the maximum points scored by player one and two : Compute the maximum points scored by Player 1 and Player 2. Compute the maximum number of points scored in a continuous sequence by Player 1 and Player 2.
Problem regarding the targeting specific customers : Competitors are firms competing in the same market, offering products that are similar, while targeting specific customers in order to gain a competitive advantage. In this assignment you will demonstrate your understanding of how to create and ma..
What is the present value of an annuity : What is the present value of an annuity of $1,000 paid every year for five (5) years when the funds are received at the beginning of the year discounted at a rate of 9.0 percent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Contact at least three people at your school or a nearby

1. contact at least three people at your school or a nearby company who use informationnbspsystems. list the systems

  How can buffer-overflow attacks be avoided

How can buffer-overflow attacks be avoided?

  Explain dispatcher and data access object design

Prepare a two page paper comparing and contrasting five of design. Dispatcher - controls client access and re-directs or dispatches client requests to proper party which can be located on same or different tier.

  Define and implement the adt circular list

Define and implement the ADT circular list as a derived class of Linked List

  Create a table consisting of each integer and its square

Write the MATLAB statements required to calculate and print out the squares of al the even integers between 0 and 50. Create a table consisting of each integer and its square, with appropriate labels over each column. I MUST use a while loop but I..

  Draw the pipeline execution diagram for this code

Draw the pipeline execution diagram for this code, assuming full forwarding is used and the branch is determined in the EX stage. The pipeline always predicts branch taken.

  You should write each functionality

You should write each functionality from 1-7 in separate functions. You should provide a menu to the user as following:For inputs:

  Discuss the different algorithms for implementing

Discuss the different algorithms for implementing

  Draw the block diagram of von neumann architecture

1. Draw the block diagram of von Neumann Architecture and explain about its parts in brief.2. What is the function of Program Status Word (PSW)? Explain the function of each flag that PSW contains.3. Explain the different types of computer architectu..

  Operations and information management

Operations and Information Management Operations and Information Management Semester 1, 2014-2015 Information Management Assignment: Sky High Airlines Report This is an individual assignment worth 50% of the module mark. Word length 2000 - 2500 wo..

  Determine the standard deviation and variation

Determine the standard deviation and variation, and explain their importance in statistical analysis of a data set.

  Greatest conceivable ability irregularity

He looks to isolate the players as unreasonably as could be expected under the circumstances, in order to make the greatest conceivable ability irregularity between group An and group B. Indicate how the Grinch can carry out the employment in O(nl..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd