Application of the computer for real time encoding and decoding of cyclic block codes
MetadataShow full item record
This thesis is concerned with cyclic block codes which can "be used for the detection and correction of errors in a transmitted message which are produced "by various types of noise. Computer programs were developed and used for the actual encoding and decoding process. Advantages of using the computer as against using various types of dedicated hardware is demonstrated. Two different methods of decoding are presented: the minimum distance decoder and the syndrome method decoder. Pseudo random noise sequences were also generated by computer program and used to simulate noise disturbance of the encoded transmitted message. Codes of several rates and with varying degrees of simulated channel noise were studied and compared with respect to the probability of error. It is shown how the methods developed in this thesis can materially help in choosing the 'best' code for a given noisy channel, consonant with other specified parameters for message transmission.
Approved for public release; distribution unlimited
Showing items related by title, author, creator and subject.
MacLennan, Bruce J. (Monterey, California. Naval Postgraduate School, 1987-09); NPS52-87-040Most current AI technology has been based on propositionally represented theoretical knowledge. It is argued that if AI is to accomplish its goals, especially in the tasks of sensory interpretation and sensorimotor ...
McCay, M. Eric; Stanica, Pantelimon; Butler, Jon T. (2012-09);Algebraic immunity (Al) is a property of a Boolean function f that measures its susceptibility to an alebraic attack. If f has a low algebraic immunity and f is used in an encryption protocol, then there are ways to ...
Freund, Richard F.; Michael Gherrity; Stephen Ambrosius; Mark Campbell Y.; Mike Halderman; Hensgen, Debra Z.; Elaine Keith Y.; Taylor Kidd; Matt Kussow Y.; John D. Lima Y; Francesca Mirabile; Lantz Moore; Brad Rust Y.; H. J. Siegel (1998);It is increasingly common for computer users to have access to several computers on a network, and hence tobe able to execute many of their tasks on any of several computers. The choice of which computers execute which ...