How To Exam?

a knowledge trading engine...


West Bengal Institute of Technology (WBIT) 2009-7th Sem B.Tech Electronics and Communications Engineering Electronics & Comm ( - ) Coding & Information Theory - Question Paper

Wednesday, 17 July 2013 09:20Web



%

v

:4 \ ,

V

*

0 \

31

fV > % #

..v

s? /

Name .................................................. .

Roll No. : .................................................. *

Invigilator's Signature:..............................................

CS/B.Tcch(ECE-NEW)/SEM-7/EC-703/2009-10

2009 CODING AND INFORMATION THEORY

Time Allotted : 3 Hours    Full Marks : 70

The figures in the margin indicate full marks.

Candidates are required to give their answers in their own words

as far as practicable.

GROUP - A ( Multiple Choice Type Questions )

1. Choose the correct alternatives for any ten of the following :

10 x 1 * 10

i)    A code with minimum distance d min = 5. How many errors it can correct ?

aj 3    b) 2

c) 4    '    d) 1.

ii)    A ( 7, 4 ) cyclic code is generated by a generator polynomial of degree





ill) The generator polynomial of a cyclic code is a factor of

a) Xn+ 1    b) X(n+1) + 1

c) xln + 2) + 1    d) none of these.

iv)    The entropy of information source is maximum when symbol occurrences are

a) equiprobable    b) different probability

c) both (a) and (b)    d) none of these.

v)    Measure of information ( mk) of a message m k with probability p k is given by

a) logb(l/pfc)    b) logb(pfc)

c) logb(l-pfc)    d) log b ( 1/1 ~ P if )

vi)    The ideal communication channel is defined for a system which has

a) - Finite C    b) BW = 0

c) S/N =0    d) Infinite C.

vii)    Which of the following technique is used for Viterbi algorithm for decoding ?

a) Code tree    b) Trellis

c) State diagram    d) Parity generator.

viii)    A message that is sent in ciytography is known as

a) plain text    b) cipher text

c) cracking    d) deciyption.

CS/B.Tech(ECE-NEW)/SEM-7/EC-703/2009-10 Ix) The Hamming distance between v = 1001011 and w = 0100010 is

a) 3    b) 4

c) 2    d) 1.

x) If a telephone channel has a bandwidth of 3000 Hz and the SNR = 20 dB, then the channel capacity is

a) 3 kbps    b) 1-19 kbps

c) 2-19 kbps    d) 1-19 bps.

xl) The number of undetectable, errors for a ( n, k ) linear code is

a) 2n~k    b) 2"

c) 2n - 2k    d) 2k.

xii)    A polynomial is called Monic if its leading coefficient is

a) 0    b) 1

c) odd    d) even.

xiii)    A ( 8, 4 ) linear code has a code rate of -

a) 8    b) 4

c) 2    d) 0-5.

CS/B.Tech(ECE-NEW?/SEM-7/EC-703/2009-10 1001011

xiv)    Ifff= 0101110

, then the code rate corresponding


- 0010111 J to the message u = 1011 is

a) 0001101    b) 1001011

c) 1001101    d) 0001011.

xv)    An encoder for a { 4, 3,    2 ) convolution code has a memory order of

a) 4    b) 3

c) 2    d) 1.

GROUP -B ( Short Answer Type Questions)

Answer any three of the following. 3x5= 15

2. a) What Eire the drawbacks of Prefix coding that lead to the discovery of Arithmetic coding ?    2

b) Let the alphabet consists of only three symbols A, B and C with probabilities of occurrence P (A ) = 0-5, P { B ) = 0-25 and P ( C ) = 0-25. Suppose the input

symbol stream is BACA, determine the arithmetic

' ' / . '

code for the steam.    3

3.    a} Prove that the syndrome polynomial In a cycle code

solely depends on the error polynomials.    2

b)    Say g(x) = tx3+jc + 1 ) for a ( 7, 4 ) cycle code. Determine the parity check polynomial ft ( x).    2

c)    Determine the generator matrix for

g(x) = (x. 3 + x+l).    1

4.    a) What is Entropy ?    2

b) Consider a source X which produces five symbols with probabilities 1/2, 1/4, 1/8, 1/16 and 1/16. Find the source entropy.    3

5.    Draw the block diagram of a typical data transmission system and explian the function of each block.    5

6.    Describe RSA algorithm.    5

GROUP -C ,    ( Long Answer Type Questions )

Answer any three of the following. 3 x 15 = 45

7.    For a BSC shown below find the channel capacity of p = 0-9. Derive the formula that you have used. 5+10

P

8.    The parity check bits of a ( 8, 4 ) block code are generated by

C5 = dI'd2 d4, C6 = dj d 2 d 3 C7 = dj d3 d4, C8 = d2 d3 d4

a)    Find the generator matrix and the parity check matrix for this code.

b)    Find the minimum weight of this code.

c)    Find the error detecting and the error correcting capability of this code.

d)    Show through an example that this code can detect i three errors/code word.    6 + 4 + 4 + 1

9.    a) What are the problems of symmetric key cryptography.

b)    State the differences between symmetric key & asymmetric key cryptography.

c)    Explain the main concepts in DES ( Data Encryption Standard).    2 + 5 + 8

10.    a) What are the functions of P - box and S - box in case

of DES algorithm.

b)    What are the shortcomings of DES ?

c)    Name and explain the advance version of DES/

5 + 5 + I

a)    Shanon - Fano algorithm

b)    Golay codes

c)    Quantum ciytography

d)    Triple error correcting codes.

504    7







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER West Bengal Institute of Technology (WBIT) 2009-7th Sem B.Tech Electronics and Communications Engineering Electronics & Comm ( - ) Coding & Information Theory - Question Paper