jagomart
digital resources
picture1_Binary Codes Pdf 192133 | 33363962


 130x       Filetype PDF       File size 2.58 MB       Source: core.ac.uk


File: Binary Codes Pdf 192133 | 33363962
a study of binary codes by virendra k manaktala b e electrical university of delhi india 196l a master s report submitted in partial fulfillment of the requirements for the ...

icon picture PDF Filetype PDF | Posted on 05 Feb 2023 | 2 years ago
Partial capture of text on file.
                             A STUDY OF BINARY CODES
                                        by
                              VIRENDRA K. MANAKTALA
                               B. E. (Electrical),
                         University of Delhi, India, 196l
                                 A MASTER'S REPORT
                     submitted in partial fulfillment of the
                           requirements for the degree
                                MASTER OP SCIENCE
                       Department of Electrical Engineering
                             KANSAS STATE UNIVERSITY
                                Manhattan, Kansas
                                       1965
                                                Approved by:
                                                Major/Professor
                                                                                              11
                                         TABLE CONTENTS
           INTRODUCTION                                                                      1
                  Shannon-Fano Encoding                                                      5
                  Shannon Binary Encoding                                                    6
                  Gilbert-Moore Encoding                                                     7
                  Huffman's Minimum Redundancy Codes                                         8
           CODING FOR NOISY CHANNEL                                                         10
                  Hamming Codes                                                             11
                  Slepian Group Codes                                                       16
                  Bose-Chaudhuri Codes                                                      22
                  Reed-Muller Codes                                                         2$
                  Fire Codes                                                                26
                  Reed-Solomon Codes                                                        28
                  Summary                                                                   29
           BIT LOSS AND GAIN CORRECTION CODE                                                29
           APPENDIX                                                                         \2
           BIBLIOGRAPHY                                                                     lj.9
                                   INTRODUCTION
                A typical communication system, as shown in Fig. 1, employs
           an encoder to improve the efficiency of channel because an en-
           coded message is less susceptible to noise in the channel.   A
           decoder is employed at the receiving end to recover the
           original message from the encoded message.
              SOURCE       ENCODER      CHANNEL     DECODER      RECEIVER
                                         NOISE
                     Fig. 1.  A typical communication system.
                The encoding procedures discussed herein are restricted to
           binary codes only wherein symbols    and 1 form the code alpha-
           bet.  A letter, symbol, or character is defined as an individ-
           ual member of an alphabet set, whereas a message or word is a
           finite sequence of its letters.   The length of a word is the
           number of letters in it.
                Encoding or enciphering is a procedure for constructing
           words using a finite alphabet to represent a given word of the
           original language on a one-to-one basis.   The inverse operation
           of assigning original words to the encoded words is called de-
           coding or deciphering.
                The communication channels may be classified as either
           noiseless or deterministic.   Noiseless channels are characterized
                      by one and only one nonzero element in each column of their
                      channel matrix.                              A noisy channel is shown in Fig. 2.
                                                                                         b.
                                                                                                                            !/        Va                   °         °        o
                                                                                                                             4                  Vz
                                                                                                               =            o          o o i/                                 o
                                                                                                         P                                                   2      y2
                                                                                                                            o          o o o o [
                                                 Pig. 2.                 A noisy channel and its matrix.
                                   A channel matrix with one and only one nonzero element in
                      each row characterizes a deterministic channel.                                                                                    A determinis-
                      tic channel is shown in Fig. 3»
                                                                                                                                                            I    O O
                                                                                                                                                            |    o o
                                                                                                                                      P =                   !
                                                                                                                                                                  I
                                                                                                                                                                  1
                                                                                                                                                                         I
                                         Fig. 3'                 Deterministic channel and its matrix.
                                   Binary symmetric and binary erasure are two widely dis-
                      cussed channels, and are shown in Figs. l\. and $, respectively.
The words contained in this file might help you see if this file matches what you are looking for:

...A study of binary codes by virendra k manaktala b e electrical university delhi india l master s report submitted in partial fulfillment the requirements for degree op science department engineering kansas state manhattan approved major professor table contents introduction shannon fano encoding gilbert moore huffman minimum redundancy coding noisy channel hamming slepian group bose chaudhuri reed muller fire solomon summary bit loss and gain correction code appendix bibliography lj typical communication system as shown fig employs an encoder to improve efficiency because en coded message is less susceptible noise decoder employed at receiving end recover original from encoded source receiver procedures discussed herein are restricted only wherein symbols form alpha bet letter symbol or character defined individ ual member alphabet set whereas word finite sequence its letters length number it enciphering procedure constructing words using represent given language on one basis inverse o...

no reviews yet
Please Login to review.