## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

**EE5120: Error Control Coding Oct 22, 2010
**

1. (Q) Let C1 be the 2-error-correcting primitive narrow-sense BCH code with blocklength n = 15. Let α ∈ F16 be primitive. The minimal polynomials of α and α3 are 1 + x + x4 and 1 + x + x2 + x3 + x4 , respectively. (a) Determine the dimension of C1 . Find the zeros of C1 . (b) Determine the exact minimum distance of C1 . 2. (Q) Let C1 be the 2-error-correcting primitive narrow-sense BCH code with blocklength n = 15 as in Question 2. Let C2 be the 2-error-correcting primitive narrowsense Reed-Solomon code over F16 (α ∈ F16 , primitive, α4 = 1 + α). (a) Find the block-length and dimension of the binary expansion of C2 . (b) Prove or disprove: C1 ⊂ C2 . (c) Using the answer to (b), determine the exact minimum distance of the binary expansion of C2 . 3. (F) (a) Consider narrow-sense BCH codes of length n = 63 with designed errorcorrecting capability t. Find the smallest t for which the dimension k = n−6t. (b) Consider narrow-sense BCH codes of length n = 255 with designed errorcorrecting capability t. Find the smallest t for which the dimension k = n−8t. 4. (F) Consider the narrow-sense 1-error-correcting RS code over GF(8). (a) Find a nonzero codeword c = [c1 c2 · · · c7 ] with c4 = c5 = c6 = c7 = 0.

The smallest positive integer j for which 2j = 1 mod n. β. y ∈ GF(32). determine if the following polynomials from GF(2)[x] are irreducible. Given that the polynomial n−1 1 + x + x2 + · · · + xn−2 + xn−1 = i=0 xi is irreducible over GF(2)[x]. ii. · · · . (d) Find all x such that Tr(x) = 1. What is the range of Tr? (b) Show that Tr(x + y) = Tr(x) + Tr(y) for x. y ∈ GF(16). 1. (a) Show that Tr(x)4 = Tr(x). (a) Let α ∈ GF(2m ) be a primitive n-th root of unity. α. β 2 = 1 + β). What is the range of Tr? (b) Show that the range of the operator Tr is isomorphic to GF(4) = {0. 1. ﬁnd integers i and j such that f (k i + k j ) = 0. where k ∈ GF(32) is a constant and x ∈ GF(32) is a variable. 5. (b) Using the above condition. (c) For the above i and j. α2 . (Q) Consider the quadratic equation f (x) = x2 + x + k = 0. . (c) Find all x such that Tr(x) = 0.(b) Find a nonzero codeword c = [c1 c2 · · · c7 ] with c2 = c4 = c5 = c6 = 0. Show that k has to satisfy k + k 2 + k 4 + k 8 + k 16 = 0. Find the other root of f (x) in GF(32). i. The minimal polynomial of α. (b) Using the above problem. determine the following: i. 8. (Q) Consider x ∈ GF(16) = {0. k i + k j ∈ GF(32) is one root of f (x). (Q) Consider x ∈ GF(32) and deﬁne an operator Tr as Tr(x) = x + x2 + x4 + x8 + x16 . (a) Suppose there exists x such that x2 + x + k = 0. α4 = 1 + α) and deﬁne an operator Tr as Tr(x) = x + x4 . (c) Show that Tr(x + y) = Tr(x) + Tr(y) for x. 1 + x + x2 + · · · + x9 + x10 = 2 10 i=0 xi . 6. (a) Show that Tr(x)2 = Tr(x). β 2 } (β 3 = 1. Give clear arguments for your conclusion. α14 } (α15 = 1. 7.

11. (a) Find all fi (α) ∈ GF(16) with minimal polynomial x4 + x3 + 1. (F) Consider GF(16)={f (α) ∈ GF(2)[α] : deg(f (α)) ≤ 3} with addition and multiplication modulo π(α) = α4 + α3 + α2 + α + 1. dimension (k). (b) Decode the received polynomial r(x) = 1 + x. Determine the generator polynomial. (F) Consider narrow-sense binary BCH codes with block-length n = 15. (a) Determine systematic parity-check and generator matrices for the code. 9. (b) Find all gi (α) ∈ GF(16) with minimal polynomial x4 + x + 1. 1 + x + x2 + · · · + x99 + x100 = 100 i=0 xi . 3 . 10. BCH bound on minimum distance (dBCH ) and the exact minimum distance (d) for designed error-correcting capability t = 1. 1-error-correcting RS code with block-length n = 7 symbols over GF(8).ii. Let α ∈ GF(8) be a primitive element with α3 = α + 1. (F) Consider a narrow-sense. 2. 3. 4.

- Some Properties of m Sequences Over Finite Field Fpuploaded byIAEME Publication
- GENETIC.pptxuploaded byManish Patil
- 42453412345.pdfuploaded byarsfdasf
- 2 Fault Types Modelinguploaded bykvinothscet
- Watermarking Electronic Text Documentsuploaded byDaniel Burlacu
- Resultuploaded bysepti_rito_tombe9983
- 10 Modelling Manufacturing Systems Lecture #10uploaded byfeliperaphaelli
- isuploaded byBoobalan R
- Murray 2003uploaded byEarl Layno
- Genetic Algorithms Introductionuploaded bymohammadjm2008
- Wandocka-eDailyFlow-2010uploaded byXiao Cui
- lec9(1)uploaded byAHMEDADELMA
- 05uploaded bymab800k
- Novel Interpolation and Polynomial Selection for Low-Complexity Chase Soft-Decision Reed-Solomon Decodinguploaded bypraba821
- Huawei WCDMA Power Planninguploaded byZeljko Vrankovic
- 07 Pg 15-29uploaded byeocv20
- Abstract Algebrauploaded byArianne Mae Balano
- 5171180uploaded byNiraj Bhansali
- Monetary Cash Credituploaded bypedrogares
- On Flux Vector Splitting for the Euler Equationuploaded byxiaoferr
- Final Report Mean Queue Time Study for the Lu_Kumar Network_Nyan Soe Lynnuploaded byjohnconnor
- midpoint circleuploaded byDilip Jha
- Unit 1 - La Place)uploaded byMartin Sudhan
- EC-509 (2)uploaded bySameer Sharma
- Mb0048uploaded byprakashsuvarna
- 7uploaded byDewi Anggraeni
- Palmprintuploaded byjssudheer
- Exact 2011 PDFuploaded byJacob
- 3.4 keyuploaded bymanishimo
- Medical diagnosis process using neural networksuploaded bySamantha Roop

Close Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Loading