Chapters 16 & 17 Sarah Cameron 18 March 2010.  Review of Modular Arithmetic  Identification Numbers ZIP Codes Bar Codes  Binary Codes  Encryption.

Slides:



Advertisements
Similar presentations
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Advertisements

Digital Fundamentals Floyd Chapter 2 Tenth Edition
Number Systems Decimal (Base 10) Binary (Base 2) Hexadecimal (Base 16)
Chapter 2 Error-Detecting Codes. Outline 2.1 Why Error-Detecting Codes? 2.2 Simple Parity Checks 2.3 Error-Detecting Codes 2.4 Independent Errors: White.
Chapter 2 Parity checks Simple codes Modular arithmetic.
MAT 1000 Mathematics in Today's World Winter 2015.
VIT UNIVERSITY1 ECE 103 DIGITAL LOGIC DESIGN CHAPTER I NUMBER SYSTEMS AND CODES Reference: M. Morris Mano & Michael D. Ciletti, "Digital Design", Fourth.
Identification Numbers
Error Detection and Correction
The Mathematics of Star Trek Data Transmission Michael A. Karls Ball State University.
Spring 2015 Mathematics in Management Science Binary Linear Codes Two Examples.
MAT 1000 Mathematics in Today's World Winter 2015.
Mathematics in Management Science
Chapter 16: Identification Numbers Lesson Plan
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
Chapter 17: Information Science Lesson Plan Binary Codes Encoding with Parity-Check Sums Cryptography Web Searches and Mathematical Logic 1 Mathematical.
Section 3.6: An Introduction to Cryptography
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Fundamentals Tenth Edition Floyd.
Identification Numbers and Error Detection Meredith Wachs.
What is it? It is an applications driven course that is based upon the study of events that occur in small, or discrete, chunks. Discrete concepts are.
Computers Organization & Assembly Language
Chapter 17: Information Science Lesson Plan
Wong Wai Ling, Lam Pui Ki Identification number  clearly identify a person or a thing Check digit  an extra digit for the purpose of error.
MAT 1000 Mathematics in Today's World Winter 2015.
Part.7.1 Copyright 2007 Koren & Krishna, Morgan-Kaufman FAULT TOLERANT SYSTEMS Part 7 - Coding.
The Mathematics of Star Trek
Lec 3: Data Representation Computer Organization & Assembly Language Programming.
Number Systems Decimal (Base 10) –10 digits (0,1,2,3,4,5,6,7,8,9) Binary (Base 2) –2 digits (0,1) Digits are often called bits (binary digits) Hexadecimal.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Math for Liberal Studies.  A binary code is a system for encoding data made up of 0’s and 1’s  Examples  Postnet (tall = 1, short = 0)  UPC (dark.
Number Systems Decimal (Base 10) –10 digits (0,1,2,3,4,5,6,7,8,9) Binary (Base 2) –2 digits (0,1) Digits are often called bits (binary digits) Hexadecimal.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture Delete all occurrences of h and w. 2. Assign numbers to the remaining letters as follows: a) Vowels, including y, have value 0. b) B, f,
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Error Detection and Correction
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
MAT 1000 Mathematics in Today's World Winter 2015.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Fundamentals Tenth Edition Floyd Chapter 2 © 2008 Pearson Education.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Cryptography and Coding Theory
Coding Seven’s and Nine’s Sol: DM.11 Classwork: Students will take turns reading the “Coding Introduction” Worksheet aloud Homework (day 46): Worksheet.
Ways to Check for Divisibility Dividing by 2 All even numbers are divisible by 2 Even numbers are numbers that end with either 2, 4, 6, 8, or 0.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Hamming (4,7) Code Binary Linear Codes Hamming Distance Weight of BLC
Warm UP: Review of Inequalities What do each of the symbols represent: 1. > 2. < Greater Than 2. Less than 3. Less than or equal to 4. Greater.
Number Systems. The position of each digit in a weighted number system is assigned a weight based on the base or radix of the system. The radix of decimal.
Number Systems Decimal (Base 10) –10 digits (0,1,2,3,4,5,6,7,8,9) Binary (Base 2) –2 digits (0,1) Digits are often called bits (binary digits) Hexadecimal.
Dr. Clincy Professor of CS
2.8 Error Detection and Correction
The Mathematics of Star Trek Workshop
Lec 3: Data Representation
Dr. Clincy Professor of CS
CIS 321 Data Communications & Networking
Chapter 16: Identification Numbers Lesson Plan
Error Detection and Correction
2 Number Systems and Codes Edited by Jerry Bernardini.
MAT 105 Spring 2008 Chapter 17: Binary Codes.
The Digital Revolution
UPC, Bar codes, Zip + 4 (Post Net) Sol: DM.11
Fundamentals of Data Representation
Error Detection and Correction
Chapter 16: Identification Numbers Lesson Plan
Lecture 17 Making New Codes from Old Codes (Section 4.6)
2.8 Error Detection and Correction
Chapter 17: Information Science Lesson Plan
Presentation transcript:

Chapters 16 & 17 Sarah Cameron 18 March 2010

 Review of Modular Arithmetic  Identification Numbers ZIP Codes Bar Codes  Binary Codes  Encryption

 a mod n = the remainder when a is divided by n  Examples: 3 mod 2 = 1 37 mod 10 = 7

 Identification Numbers: Unambiguously identify the person or thing with which it is associated Should be “self-checking”

 Five Digits: ABCDE  A: Represents one of 10 geographic areas in the US, normally a grouping of states  BC: These two digits in combination with the first, identify a central mail-distribution point known as a sectional center.  DE: The last two digits indicate the town or local post office, the order is often alphabetical for towns within a delivery area

 4 code: FGHJ  FG: Represent a delivery sector.  HJ: Narrow the area further based on the needs of the delivery sector. Bonus Trivia: Using the ZIP + 4 code makes you eligible for cheaper bulk rates.

 Binary Code: any system for representing data with only two symbols  Bar Code: a series of dark and light spaces that represent characters

 Has been used since  12 Digit number: KLMNOPQRSTUV  K: This digit identifies the kind of product.  LMNOP: These digits identify the manufacturer.  QRSTU: These digits are assigned by the manufacturer to identify the product.  V: The final digit is the check digit.

 Check Digits Used for error detection and correction Can be the last digit in an ID number or a binary code. Often for ID numbers:  Sum the individuals digits and mod by the check digit

 Take binary string a 1 a 2 a 3 a 4 and append three check digits c 1 c 2 c 3 so that any single error in any of the seven positions can be corrected  Choose 3 different sums: c 1 : a 1 + a 2 + a 3 c 2 : a 1 + a 3 + a 4 c 3 : a 2 + a 3 + a 4  If the value of the check is even, the check digit should be zero.  If the value of the check sum is odd, the check digit should be one.  Using this method you are able to produce a list of all possible a 1 a 2 a 3 a 4 c 1 c 2 c 3 combinations.

 Nearest-Neighbor Decoding This method decodes a received message as the code word that agrees with the message in the most positions  Distance Between Two Strings (of equal length) The number of positions in which the strings differ.  Example: Real Message: Received as: The distance between the real message and the received message is one.  If there are two possible translations for an erroneous message, it is not decoded.

 Binary Linear Code Consists of words composed of 0’s and 1’s obtained from all possible messages of a given length by using parity-check sums to append check digits to the messages. These words are called code words.  Weight of a Binary Code Is the minimum number of 1’s that occur among all nonzero words of that code.  Accuracy: If the weight of a binary code is odd, the code will correct any (t-1)/2 or fewer errors. If the weight of a binary code is even, the code will correct any (t-2)/2 or fewer errors. If you simply want to detect errors, the code will detect t-1 errors

 Encryption The process of disguising data  Cryptology The study of methods to make and break secret codes  Data Compression The process of encoding data so that the most frequently occurring data are represented by the fewest symbols

1. Delete all occurrences of h and w. 2. Assign numbers to the remaining letters as follows: 0: A, E, I, O, U 1: B, F, P, V 2: C, G, J, K, Q, S, X, Z 3: D, T 4: L 5: M, N 6: R 3. If two or more letters with the same numeric value are adjacent, omit all but the first. 4. Delete the first character of the original name, if still present. 5. Delete all occurrences of A, E, I, O, U, and Y. 6. Retain only the first three digits corresponding to the remaining letters. 7. Append trailing 0’s if fewer than three letters remain. 8. Precede the digits with the first letter of the name.

ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC Used by Julius Caesar to send messages to his troops. Decode “DWWDFN DW GDZQ” The encoded message: “ATTACK AT DAWN”

ATTACK AT DAWN MATHMA TH MATH MTMHOK ?? ???? Choose a key word, which can be anything. Add the digit position of the original letter to the digit position of the key word letter. Mod that number by 26 = digit position of the coded letter. Repeat the key word for as many characters as you need. Answer: TA PAPU;19, 0, 15, 0, 15, 20

 Questions?  Applications?  Homework: (7 th Edition) Chapter 16: #74 Chapter 17: #11