Preview

Coding Theory Paper

Better Essays
Open Document
Open Document
1294 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Coding Theory Paper
Coding Theory
Patrick C Davis
MTH/221
24 Nov 2014
Gerald Weyand
University of Phoenix
Coding Theory Case Study
When representing, manipulating, and transmitting information, it is crucial to use the sequence of zeros and ones. However, it is often impossible and difficult to prevent errors especially in retrieving, operating, transmitting and storing any form of data. Errors occur from different sources, for instance, human beings, equipment, and communication and electrical interference. In most cases, errors occur into data that has been stored for a long period mostly on magnetic tapes when the tape deteriorates. It is significant to make sure that there is reliable transmission especially when large computer files are hastily transmitted (Rosen, 2012). In addition, reliable transmission should be prioritized when sending data over long distances, for instance, from probes billions of millions away. This essay discusses both error correcting and error detecting codes. Further, it will introduce a significant family of codes useful in correcting errors. The essay will also cover the current applications of coding theory as well as the latest technical developments.
It is always important to recover data that has degraded due to long storage in a tape. There are several techniques from the coding theory that guarantees reliable transmission of data and recovery of the degraded data. Messages that occur in the form of bit strings can be encoded through translating them into code word’s or rather bits strings that are a bit longer. A code is a set of code words (Rosen, 2012). It is possible to detect errors using definite codes. Moreover, as long as not too many errors have been made, it is simple to determine whether at least one or many errors have been introduced after transmitting a bit string. Further, it is simple to correct errors that occur due to the use of codes with redundancy.
The study of codes also known as the coding theory involves error



References: Huffman, W. C., & Pless, V. (2003). Fundamentals of error-correcting codes. Cambridge, U.K: Cambridge University Press. MacWilliams, F. J., & Sloane, N. J. A. (1978). The theory of error-correcting codes. Amsterdam: North-Holland Pub. Co. Roman, S. (1996). An introduction to coding and information theory. New York: Springer. Rosen K. (2012). Coding theory. Retrieved from http://www.mhhe.com/math/advmath/rosen/r5/instructor/applications/ch

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Error detection – It is useful to have some error detection capability built into the physical signaling encoding scheme. This allows to be detected more quickly.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Figure: Euclidean division algorithm The message is represented by a information polynomial i(x). i(x) is store as a bit pattern of k length in an integer array. The k information bits are represented by k-1 degree polynomial i(x) = i(k-1)x(k-1) + i(k-2)x(k-2) +……………………………..+i1x+i0 A polynomial code is specified by its generating polynomial g(x). If we assume that we are dealing with a code in which codewords have n bits of which k are information bits and n-k are check bits . The…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Pt1420 Unit 1 Assignment 2

    • 1305 Words
    • 6 Pages

    Das, D., Gregersen, E., Hosch, L., Lotha, G., Sampaolo, M., Sinha, S. (2014). C++. In Encyclopedia Britannica.…

    • 1305 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    CS 220 – Programming w/ Data Structures: You have missed one assignment and one quiz. Your instructor has extended your assignment due date to this Sunday, April 10. Your instructor has also let you to take your Quiz # 2 during his office hours during this week. Let me know if you need additional support to study for this quiz. Your grade to date in this class is 30.2/37 81.62% B.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    OCR F215 Biology notes

    • 11050 Words
    • 45 Pages

    It is a degenerate code- All amino acids bar one have more than one code…

    • 11050 Words
    • 45 Pages
    Better Essays
  • Powerful Essays

    CSEC 630 Lab Assignment 1 – Introduction to Cryptography. (n.d.). University of Maryland University College. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    2.3 The process that takes advantage of redundancy to reduce the number of bits sent for a given…

    • 2555 Words
    • 9 Pages
    Good Essays
  • Good Essays

    In short, a Coder is someone who has a thorough understanding of the ICD-9 codes, Modifiers, and CPT codes and uses this knowledge to ensure the proper application. Coders most often review the work of the physician, apply modifiers, and check for errors in CPT code bundling or ICD-9(Diagnosis Code) appendage.…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Communication is the most important part of my job. For nine hours a day or more my job is to talk on the phone to guests, managers, or other personnel of the LOEWS branded hotels. Group communication happens through team meetings, emails, phone conferences, or face-to-face conversations. Without our pathways of communication our jobs would not exist and LOEWS as a company would not be as successful as it is.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Greater Good

    • 1842 Words
    • 8 Pages

    are humans, and humans are not perfect beings. There is no possible way for the coder to be able to…

    • 1842 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Diversity scheme, a method for improving reliability of a message signal by using multiple communications channels…

    • 647 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    level 5 unit 10

    • 1326 Words
    • 6 Pages

    Communication is a process through which information is passed from an encoder to a decoder through and agreed channel, which has a feed back loop. Given that all enabling conditions that eliminates barriers to effective information or date transition and feedback are in place.…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The message authentication code is calculated by the sender and the receiver of a data transmission.…

    • 3404 Words
    • 14 Pages
    Better Essays
  • Good Essays

    H. 264/Avr Analysis

    • 826 Words
    • 4 Pages

    In the techniques discussed thus far, the encoder operates independent of the decoder in order to combat the effects of transmission error in the video bitstream. In a situation where both the encoder and decoder are required to interactively combat transmission losses, then a feedback channel can be designed between the decoder and the encoder. The decoder can relay information about which part of the transmitted video data is corrupted by errors, and the encoder can strategize its operation to mitigate the effect of such errors [186]. A simple approach is to retransmit the lost packet especially in an underlying network that supports ARQ or to intra code the data. However, as previously explained, this will incur delays and losses that can…

    • 826 Words
    • 4 Pages
    Good Essays