Modify the cellular telephone coding system

Assignment Help Basic Computer Science
Reference no: EM131081989

Suppose a 10-digit phone number is transmitted by a cellular phone using four binary symbols for each digit, using the model of binary symbol errors and deletions given in Problem 1.10.2. If C denotes the number of bits sent correctly, D the number of deletions, and E the number of errors, what is P[C = c, D = d, E = e]? Your answer should be correct for any choice of c, d, and e.

Problem 1.10.2

We wish to modify the cellular telephone coding system in Example 1.41 in order to reduce the number of errors. In particular, if there are two or three zeroes in the received sequence of 5 bits, we will say that a deletion (event D) occurs. Otherwise, if at least 4 zeroes are received, then the receiver decides a zero was sent. Similarly, if at least 4 ones are received, then the receiver decides a one was sent. We say that an error occurs if either a one was sent and the receiver decides zero was sent or if a zero was sent and the receiver decides a one was sent. For this modified protocol, what is the probability P[E] of an error? What is the probability P[D] of a deletion?

Example 1.41

To communicate one bit of information reliably, cellular phones transmit the same binary symbol five times. Thus the information "zero" is transmitted as 00000 and "one" is 11111. The receiver detects the correct information if three or more binary symbols are received correctly. What is the information error probability P[E], if the binary symbol error probability is q = 0.1?

Reference no: EM131081989

Questions Cloud

New division of existing business : Write a 350-word executive summary defining the new division of existing business. Share your Vision, Mission, final business model, and value proposition, and list your key assumptions, risks, and change management issues. Quantify the growth and..
How many code words have exactly three 0''s : How many code words have exactly three 0's?
Important decision for operational risk managers : An important decision for operational risk managers is the extent to which operational risks should be insured against. What are the two major problems facing an insurance company?
Discuss whether you think this statement is a valid one : In addition it is virtual that the " whole organization sings the same song when implementing the marketing strategy". Discuss whether you think this statement is a valid one, assess the pros and cons of the organization wide implementation of mar..
Modify the cellular telephone coding system : To communicate one bit of information reliably, cellular phones transmit the same binary symbol five times. Thus the information "zero" is transmitted as 00000 and "one" is 11111. The receiver detects the correct information if three or more binar..
Goal of achieving a specific task : Create an agenda for a team meeting on a topic of your choice. Draw from your own experience working within a group with the goal of achieving a specific task. You may use your experience as a student working in a group, or develop a plan for a fu..
Compute the maximum points scored by player one and two : Compute the maximum points scored by Player 1 and Player 2. Compute the maximum number of points scored in a continuous sequence by Player 1 and Player 2.
Problem regarding the targeting specific customers : Competitors are firms competing in the same market, offering products that are similar, while targeting specific customers in order to gain a competitive advantage. In this assignment you will demonstrate your understanding of how to create and ma..
What is the present value of an annuity : What is the present value of an annuity of $1,000 paid every year for five (5) years when the funds are received at the beginning of the year discounted at a rate of 9.0 percent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Smallest exponent that can be stored using this 16 bit stand

storing number in a string of 16 bits, the first bit is used for the sign of the number, and the next 5 bits store the exponent plus the bias, and the remaining 10 bits store the mantissa.  The bias is 15. What is the smallest exponent that can be st..

  Describe the major components of a datawarehouse

Briefly describe the major components of a datawarehouse architecture. Explain how the volatility of a datawarehouse is different from the volatility of a database for an operational information system. Please cite sources if any used.

  Scope and lifetime are distinct

Scope and lifetime are distinct yet related issues in programming languages. Languages can sometimes make design decisions that cause a conflict between the scope and the lifetime of variables. Java's decision to allow classes to be defined inside..

  A one-variable quadratic expression

A one-variable quadratic expression is an arithmetic expression of the form ax^2+bx+c, where a,b, and cc are some fixed numbers (called the coefficients) and x is a variable that can take on different vaues

  Discuss the efficiency of the queue''s enqueue

Discuss the efficiency of the queue's enqueue

  In 2pc processing of distributed database system

In 2PC processing of distributed database system: When one site gets the Prepare message from the coordinator what does this local site react?

  Population distribution is exactly normal

The most important condition for sound conclusions from statistical inference is usually

  What would be the best way for an electrical

What would be the best way for an electrical engineer to enter the automotive industry?

  Would an arraylist be better suited for your use

Would an ArrayList be better suited for your use

  What are two possible ways to achieve this goal

You need to relocate the existing user and computer objects in your company to different organizational units. What are two possible ways to achieve this goal? (Note: not the two "options" in the book.)

  What do you think that future holds for virtual computing

What do you think that the future holds for virtual computing? Virtual computers will allow users access to all of their files and applications from any computer

  What is necessary for the instantiating data type

Given a search template function that will look for an occurrence of target in an array of items, what is necessary for the instantiating data type to implement? Select one: a. the operator c. the = operator d. the == operator

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd