To check a hamming code for a single-bit error

Assignment Help Computer Engineering
Reference no: EM132155906

Use C program:

Objective:

To check a Hamming code for a single-bit error, and to report and correct the error (if any).

Inputs: The maximum length of a Hamming code The parity of the check bits (even=0, odd=1) The Hamming code

Outputs: The erroneous bit (if any) The corrected Hamming code (if there was an error) Specification:

The program checks a Hamming code for a single-bit error based on choosing from a menu of choices, where each choice calls the appropriate procedure, where the choices are:

1) Enter parameters

2) Check Hamming code

3) Quit program

To use the Math library, use: "#include <math.h>" to access various functions, such as pow(base, exp), log(number), etc. To perform the XOR function, use the operator "^".

To use the String library, use: "#include <string.h>" to access various functions, such as
strlen(string) which returns an integer representing the length of a string of characters.

PLEASE MAKE SURE THE POGRAM RUNSSSSSS.

TEST CASES ARE:

1
12
0
2
1000110
1
21
1
2
1000110
2
1000111
3

Reference no: EM132155906

Questions Cloud

Write in pseudo-code the siftdown algorithm : A ternary max-heap is similar to the binary max-heap that we have discussed in class, but now non-leaf nodes can have 3 children instead of 2.
Probability distribution that best describes this situation : Note the size of the sample n is greater than 5% of the population size. Use the probability distribution that best describes this situation.
Determine the symbol placed by this player : Determine the symbol placed by this Player. Determine the next move for this Player.
A sample of 18 widgets has a mean : A sample of 18 widgets has a mean of 37.300 and standard division 8.150. At 99% confidence, the upper limit with 3 decimal places is?
To check a hamming code for a single-bit error : The program checks a Hamming code for a single-bit error based on choosing from a menu of choices.
Find the mean for the number of people : About 8% of the population has a particular genetic mutation. 900 people are randomly selected.
What is the probability that at least 3 of the 5 trees : What is the probability that at least 3 of the 5 trees that he measures are really Douglas-firs?
What code can be added : The ADT UnsortedType List function ‘DeleteItem(ItemType item)' creates an endless loop error when trying to delete a word or key that is not in the list.
Confidence interval for the true proportion : Construct a 95% confidence interval for the true proportion, mean, of Phantol users who got relief from using the drug.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implement a basic parser

Implement a basic parser for our dj2dism compiler. You will use bison to generate the parser - Precedence and Associativity of Operators

  Create preventative controls for sungrafix

Create Preventative Controls for SunGrafix, video game design company. In some cases, outage impacts identified in BIA may be mitigated or eliminated through preventive measures that deter and/or reduce impacts to  system.

  Display a menu to the user on the screen

Define a class called Dog, where a Dog is-a subclass of Animal. Also, a Dog can run (i.e. this class should implement the Runner interface).

  Identify the quality attributes the system will need

Identify the quality attributes this system will need for its architecture. Construct a matrix of quality attributes (nonfunctional requirements) that you've identified.

  Write a single EBNF rule for the language

What category or paradigm of programming language has a structure dictated by the von Neumann computer architecture - interpreter compared with using a compile

  Identify cyber related issue that require closer examination

Within INTL 647 you are required to identify a cyber-related issue that requires a solution. In this case, you will select a topic or issue as it relates.

  Create an implementation of the citypathconnector interface

Create an implementation of the CityPathConnector interface. Use the stack data structure (java.lang.Stack) in your implementation.

  Question1following two questions are related to congestion

question1.following two questions are related to congestion control in wired networks. let us assume that size of

  Describe the evolution and functions of computer hardware

IT DISCUSSIONS- Describe the evolution and functions of computer hardware, computer architecture, and system and application software.

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  What is the concurrency control and what is its objective

What is the role of a database management system (DBMS) and what are its benefits.

  Identify vulnerabilities within source code

List different methods to identify vulnerabilities within source code. What specific items should committee members looking for when considering vulnerability?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd