subject

Error-correcting polynomials
(a) alice has a length 8 message to bob. there are 2 communication channels available. when n packets are fed through channel a, the channel will only deliver 5 packets (picked at random). similarly, channel b will only deliver 5 packets (picked at random), but it will also corrupt (change the value) of one of the delivered packets. each channel will only work if at least 10 packets are sent through it. using each of the 2 channels once, how can alice send the message to bob?
(b) alice wishes to send a message to bob as the coefficients of a degree 2 polynomial p. for a message [m1,m2,m3], she creates polynomial p = m1x^2 +m2x+m3 and sends 5 packets: (0,p(,p(,p(,p(,p( however, eve interferes and changes one of the values of a packet before it reaches bob. if bob receives(03), and knows alice’s encoding scheme and that eve changed one of the packets, can he still figure out what the original message was? if so find it as well as the x-value of the packet that eve changed, if not, explain why he can not. (work in mod 11.)
(c) alice decides that putting the message as the coefficients of a polynomial is too inefficient for long messages because the degree of the polynomial grows quite large. instead, she decides to encode the message as values in a degree 2 polynomial. for a 5 length message [m0,m1,m2,m3,m4], she creates a degree 2 polynomial p such that p(0) = m0,p(1) = m1,p(2) = m2,p(3) = m3,p(4) = m4. (alice makes sure to choose her message in such a way that it can be encoded in a polynomial of degree 2.) she then sends the length 5 message directly to bob as 5 packets: (0m4). eve again interfere and changes the value of a packet before it reaches bob. if bob receives(00) and knows alice’s encoding scheme and that eve changed one of the packets, can he still figure out what the original message was? if so find it as well as the x-value of the packet that eve changed, if not, explain why he can not. (work in mod 11.)
(d) after getting tired of decoding degree 2 polynomials, bob convinces alice to send messages using a degree 1 polynomial instead. to be on the safer side, alice decides to continue to send 5 points on the polynomial even though it is only degree 1. she encodes and sends a length 5 message in the same way as part (c) (except using a degree 1 polynomial). eve however, decides to change 2 of the packets. after eve interferes, bob receives (0,−,−, ,−,5). if alice sent (0,−,−,,3), (4,5), for what values of x will bob not be able to uniquely determine the alice’s message? (assume bob knows that eve changed 2 of the packets and work in mod 13.)

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:30
Use the keyword strategy to remember the meaning of the following word. the meaning for the word has been provided. write your keyword and describe the picture you would create in your mind. centurion: a commander in the army of ancient rome. keyword: picture:
Answers: 2
question
Computers and Technology, 22.06.2019 14:40
For this assignment you have to write a c program that will take an infix expression as input and display the postfix expression of the input. after converting to the postfix expression, the program should evaluate the expression from the postfix and display the result. what should you submit? write all the code in a single file and upload the .c file. compliance with rules: ucf golden rules apply towards this assignment and submission. assignment rules mentioned in syllabus, are also applied in this submission. the ta and instructor can call any students for explaining any part of the code in order to better assess your authorship and for further clarification if needed. problem: we as humans write math expression in infix notation, e.g. 5 + 2 (the operators are written in-between the operands). in computer's language, however, it is preferred to have the operators on the right side of the operands, ie. 5 2 +. for more complex expressions that include parenthesis and multiple operators, a compiler has to convert the expression into postfix first and then evaluate the resulting postfix write a program that takes an "infix" expression as input, uses stacks to convert it into postfix expression, and finally evaluates it. it must support the following operations: + - / * ^ % ( example infix expression: (7-3)/(2+2) postfix expression: 7 3 2 2 result: rubric: 1) if code does not compile in eustis server: 0. 2) checking the balance of the parenthesis: 2 points 3) incorrect postfix expression per test case: -2 points 4) correct postfix but incorrect evaluation per test case: -i points 5) handling single digit inputs: maximum 11 points 6) handling two-digit inputs: 100 percent (if pass all test cases)
Answers: 3
question
Computers and Technology, 22.06.2019 17:30
Working on this program in python 3.7: a year in the modern gregorian calendar consists of 365 days. in reality, the earth takes longer to rotate around the sun. to account for the difference in time, every 4 years, a leap year takes place. a leap year is when a year has 366 days: an extra day, february 29th. the requirements for a given year to be a leap year are: 1) the year must be divisible by 42) if the year is a century year (1700, 1800, the year must be evenly divisible by 400some example leap years are 1600, 1712, and 2016.write a program that takes in a year and determines whether that year is a leap year.ex: if the input is 1712, the output is: 1712 is a leap year. ex: if the input is 1913, the output is: 1913 is not a leap year. your program must define and call the function isleapyear(useryear). the function should return true if the input year is a leap year and false otherwise.
Answers: 1
question
Computers and Technology, 23.06.2019 18:20
What is wi-fi infrastructure? a metropolitan area network that uses radio signals to transmit and receive data a communications technology aimed at providing high-speed wireless data over metropolitan area networks a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves includes the inner workings of a wi-fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a wi-fi signal
Answers: 2
You know the right answer?
Error-correcting polynomials
(a) alice has a length 8 message to bob. there are 2 communicatio...
Questions
question
Mathematics, 15.05.2021 14:00
question
English, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
question
Biology, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
question
History, 15.05.2021 14:00
question
Mathematics, 15.05.2021 14:00
Questions on the website: 13722360