Verified Document

Application Of The Discrete Mathematics Term Paper

¶ … Coding Theory for Discrete Mathematics In the contemporary IT (information technology) environment, increasing number of organizations are using large computer to transmit data over a long distance and some of these data are transmitted across billions of kilometers. During data transmission, some data can be degraded; the coding theory is an effective strategy to recover degraded data in order to guarantee reliable data transmission. Coding theory also assists in recovering and detecting errors, which assists in enhancing efficient data storage and data communications.

Objective of this paper is to discuss the coding theory and its real world application. The paper discusses the errors detecting codes and its application in the next section.

Error Detecting Codes

A simple strategy to detect errors is to add parity in order to check bit. To detect errors, a bit strong will be transmitted in order to add a parity bit. Typically, when a bit string has an even number of 1s, then we put 0 when reaching the end of the string. However, when a bit string has an odd number of 1s, then we put 1 when reaching the end of the string. When the parity check bit has been summed up with bit string and errors are detected with odd number, however errors are also detected with even numbers. For example, when receiving the following strings 1110011 and 10111101 as messages, the strings...

However, when the string of 10111101 has even numbers of 1s, the system will detect errors.
The errors can also be detected by repeating a bit within a message twice. For example, when the bit string of 011001 is repeated twice, the codeword of 001111000011 is repeated twice.

Error Correcting Codes

Some powerful codes are difficult to be detected, thus, the error correcting codes are used.

In the error correcting codes, it is easy to correct errors by including redundancy. It is also possible to correct errors by including redundancy. For example, the paper uses the triple code and repeat message three times. When the message is x1x2x3, the message is presented as x1x2x3 x4x5x6 x7x8x9

"Where x1 = x4 = x7, x2 = x5 = x8, and x3 = x6 = x9."

"The valid code words are 000000000, 001001001, 010010010, 011011011, 100100100, 101101101, 110110110, and 111111111." (Rosen 2012 p 75).

Hamming Distance

Hamming distance is the strategy to measure distance between two sets of bit strings. Hamming distance also reveals the number of positions where the bit strings differ. In essence, the hamming distance uses the coding theory to derive the fundamental work. For example, when there is Hamming distance between 11011 and 01110, the bit strings and…

Sources used in this document:
Reference

Key, J.D. (2000). Some error-correcting codes and their applications. College of Engineering and Science Clemson University.

Moon, T.K. (2005). Error Correction Coding. New Jersey: John Wiley & Sons.

Pless, V. (1998), Introduction to the Theory of Error-Correcting Codes (3rd ed.), Wiley Interscience.

Rosen, K.H.(2012). Discrete Mathematics and Its Applications. (Seventh Edition).New York. McGraw-Hill Companies, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Mathematics of Digital Photography
Words: 925 Length: 3 Document Type: Research Paper

Mathematics in Digital Photography The advances in both digital photography and computing have allowed more detailed and complex images to be shown on more realistic media than was ever previously possible. Through the use of more specialized equipment and digital imaging techniques the resulting photos of even the most novice user today can rival those of professionals from years before. This level of photographic precision could never have been achieved were

Theory and Application of Food Webs
Words: 958 Length: 3 Document Type: Case Study

Theoretical Application of Food Webs A food webs is a type of graphical illustration that depicts a relationship between prey and predator in an ecological community. The relation is also called a food chain or food web. A food chain can also be explained as a connection or relationships within a community. In other word, the food chain is the relationships among species within a community. The graph illustrates the relationships

Bioinformatics Machine Learning Snp Mutation
Words: 1659 Length: 5 Document Type: Dissertation

Machine Learning Method in Bioinformatics Bioinformatics involves an integrated approach involving the use of information technology, computer science to biology and medicine as professional and knowledge fields. It encompasses the knowledge associated with information systems, artificial intelligence, databases, and algorithms, soft computing, software engineering, image processing, modeling and simulation, data mining, signal processing, computation theory and information, system an d control theory, discrete mathematics, statistics and circuit theory. On the other

Gamblers Ruin Add Gambler's Ruin
Words: 1076 Length: 4 Document Type: Research Paper

He stops gambling only when he has either lost all of his money or reached his goal of B." (p. 182) Here, there is a stop-loss only applies on individual bets. Across the longer sample, the better demonstrates a willingness to be departed from his seed in its entirety. The human element which inclines the individual to anxiously pursue the single goal of B. has interceded with a rational protection

Database What Is a Database
Words: 1421 Length: 5 Document Type: Term Paper

These factors further accelerate the value and TCO of databases over time. Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL? SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks

Divisor Theorem
Words: 2274 Length: 8 Document Type: Essay

Essay Topic Examples 1. Exploring the Fundamentals: An Overview of the Divisor Theorem:      Dive into the basic concepts and proofs of the divisor theorem, including its formulation, significance, and implications in number theory. This essay would serve as an introductory exploration for readers new to the subject, emphasizing the theorem�s foundational place in mathematical theory. 2. Real-world Applications of the Divisor Theorem:      Analyze various practical applications where the divisor theorem plays a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now