Preview

Coding Theory Paper

Better Essays
Open Document
Open Document
1294 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Coding Theory Paper
Coding Theory
Patrick C Davis
MTH/221
24 Nov 2014
Gerald Weyand
University of Phoenix
Coding Theory Case Study
When representing, manipulating, and transmitting information, it is crucial to use the sequence of zeros and ones. However, it is often impossible and difficult to prevent errors especially in retrieving, operating, transmitting and storing any form of data. Errors occur from different sources, for instance, human beings, equipment, and communication and electrical interference. In most cases, errors occur into data that has been stored for a long period mostly on magnetic tapes when the tape deteriorates. It is significant to make sure that there is reliable transmission especially when large computer files are hastily transmitted (Rosen, 2012). In addition, reliable transmission should be prioritized when sending data over long distances, for instance, from probes billions of millions away. This essay discusses both error correcting and error detecting codes. Further, it will introduce a significant family of codes useful in correcting errors. The essay will also cover the current applications of coding theory as well as the latest technical developments.
It is always important to recover data that has degraded due to long storage in a tape. There are several techniques from the coding theory that guarantees reliable transmission of data and recovery of the degraded data. Messages that occur in the form of bit strings can be encoded through translating them into code word’s or rather bits strings that are a bit longer. A code is a set of code words (Rosen, 2012). It is possible to detect errors using definite codes. Moreover, as long as not too many errors have been made, it is simple to determine whether at least one or many errors have been introduced after transmitting a bit string. Further, it is simple to correct errors that occur due to the use of codes with redundancy.
The study of codes also known as the coding theory involves error



References: Huffman, W. C., & Pless, V. (2003). Fundamentals of error-correcting codes. Cambridge, U.K: Cambridge University Press. MacWilliams, F. J., & Sloane, N. J. A. (1978). The theory of error-correcting codes. Amsterdam: North-Holland Pub. Co. Roman, S. (1996). An introduction to coding and information theory. New York: Springer. Rosen K. (2012). Coding theory. Retrieved from http://www.mhhe.com/math/advmath/rosen/r5/instructor/applications/ch

You May Also Find These Documents Helpful

  • Good Essays

    Code Talker

    • 520 Words
    • 3 Pages

    III. a. The Marines decided it was best to test the code out before they entrust their lives with the Code Talkers. A lieutenant tested the Code Talkers’ skills by giving a test message that they had to translate and then retranslate. They did so within two and a half minutes. But many observers believed that the Code Talkers were “cheating”. Chester Nez mentions, “Some observers even thought that the code was so accurate-word for word and punctuation mark for punctuation mark-that we must be cheating somehow” (Pg. 113). Chester Nez mentions how this insulted him that the officers wouldn’t trust them. He believes there is no point in cheating, as the Code Talkers wanted this code to work just as much as the Marines wanted it to, even maybe more. To test if they really were cheating or not, the officers “separated the men transmitting from the ones receiving so they could not see each other, then also had guards posted up by each…” (Pg. 113). They still translated accurately and quickly, which left the officers no choice but to trust them.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hansen, R., Harris, A., Phenix, A., Thornton, D. (2003). STATIC 99 Coding Rules – Revised 2003. Retrieved June 18, 2009 from http://ww2.ps-sp.gc.ca/publications/corrections/pdf/Static-99-coding-Rules_e.pdf…

    • 2465 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    2) Yes. The four least significant digits of the ASCII code match the four bits of BCD.…

    • 1112 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    level 5 unit 10

    • 1326 Words
    • 6 Pages

    Communication is a process through which information is passed from an encoder to a decoder through and agreed channel, which has a feed back loop. Given that all enabling conditions that eliminates barriers to effective information or date transition and feedback are in place.…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    CS 220 – Programming w/ Data Structures: You have missed one assignment and one quiz. Your instructor has extended your assignment due date to this Sunday, April 10. Your instructor has also let you to take your Quiz # 2 during his office hours during this week. Let me know if you need additional support to study for this quiz. Your grade to date in this class is 30.2/37 81.62% B.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Error detection – It is useful to have some error detection capability built into the physical signaling encoding scheme. This allows to be detected more quickly.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Coding Theory Case Study

    • 1093 Words
    • 3 Pages

    What is Coding Theory? “Coding theory is the study of the properties of codes and their fitness for a specific application. Codes are used for data compression, cryptography, error-correction and more recently also for network coding. Codes are studied by various scientific disciplines – such as information theory, electrical engineering, mathematics, and computer science – for the purpose of designing efficient and reliable data transmission methods. This typically involves the removal of redundancy and the correction (or detection) of errors in the transmitted data.” (Coding Theory, 2010) There are many aspects that go into the composition of coding theory such as error detecting, error correcting, hamming distance, perfect codes, generator matrices, parity check matrices and hamming codes all of which will be discussed here.…

    • 1093 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ect114

    • 1514 Words
    • 7 Pages

    Encoding is used to generate a coded output (such as BCD or binary) from a singular active numeric input line.…

    • 1514 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    The general idea behind Space–Time Block Codes construction is based on finding coding matrices X that can satisfy the following condition,…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In short, a Coder is someone who has a thorough understanding of the ICD-9 codes, Modifiers, and CPT codes and uses this knowledge to ensure the proper application. Coders most often review the work of the physician, apply modifiers, and check for errors in CPT code bundling or ICD-9(Diagnosis Code) appendage.…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    2.3 The process that takes advantage of redundancy to reduce the number of bits sent for a given…

    • 2555 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Diversity scheme, a method for improving reliability of a message signal by using multiple communications channels…

    • 647 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    H. 264/Avr Analysis

    • 826 Words
    • 4 Pages

    In the techniques discussed thus far, the encoder operates independent of the decoder in order to combat the effects of transmission error in the video bitstream. In a situation where both the encoder and decoder are required to interactively combat transmission losses, then a feedback channel can be designed between the decoder and the encoder. The decoder can relay information about which part of the transmitted video data is corrupted by errors, and the encoder can strategize its operation to mitigate the effect of such errors [186]. A simple approach is to retransmit the lost packet especially in an underlying network that supports ARQ or to intra code the data. However, as previously explained, this will incur delays and losses that can…

    • 826 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The message authentication code is calculated by the sender and the receiver of a data transmission.…

    • 3404 Words
    • 14 Pages
    Better Essays