Send Close Add comments: (status displays here)
Got it!  This site "creationpie.com" uses cookies. You consent to this by clicking on "Got it!" or by continuing to use this website.  Note: This appears on each machine/browser from which this site is accessed.
Error correcting codes
by RS  admin@creationpie.com : 1024 x 640


1. Error correcting codes
Fault tolerance is important in distributed systems and in organizations.

Redundancy can be used to detect and correct errors (discrepancies).
An understanding of FTC (Fault Tolerant Computing) techniques and that of an ECC (Error Correcting Code) are important in understanding the differences in various Bible texts.

The key to fault tolerance is redundancy. The simplest model is to use redundancy and take a majority vote of the various ways. There are many more advanced methods not discussed here.


2. Related topics


Information sign More: Logical implications of inerrency
Information sign More: An errant look at Biblical inerrancy and infallibility

3. Error correcting codes
Any fault tolerant system needs to account for parts of the system (e.g., members) not operating properly or operating with motives against the organization or organizational goals (which might or might not be the same thing).

A code is a way to encode a language and is concerned not directly with meaning but with preserving the integrity of a message from source or sender to target or recipient.

An ECC is a code that contains redundancy in some form such that that redundancy can be used to detect and/or correct errors in the message from source to target.

The key idea is that controlled redundancy is added to detect and/or correct transmission errors.

[check digits, parity codes, Hamming codes, etc.]
[bar codes, credit card numbers]
[RAID (Redundant Array of Independent Disks)]

4. Fault tolerance detection using even parity

 1   2   3   +   -   ▶ 
Error detection and correction requires controlled redundancy.
Discuss: How does Hebrew use redundancy to allow error detection and correction? For example, in Psalms, Proverbs, etc. [sound bites]
Discuss: How does Jesus use redundancy to allow error detection and correction? For example, Matthew 15, Matthew 18, etc.

[TR (Textus Receptus), model breaking]

Information sign More: Matthew 15:1-21 Blind leading the blind
Information sign More: Matthew 17-18 The greatest little discourse

5. Fault tolerance correction using even parity

 1   2   3   4   5   +   -   ▶ 
If the bit in error is known, a single-bit error can be corrected.

Fault tolerance detection and correction at the bit level can be extended to a collection of drives each with a huge number bits.
Even parity will detect a one bit error and allow correction if the bit in error can be identified (e.g., a RAID).

6. Acronyms
Here are some acronyms and other terms. [copy-update problem, human-checked redundancy, computer-checked redundancy]

7. Error correcting codes
An ECC is customized for the physical reality in which it will be used. Discuss: Why does the Bible text need to be viewed as a logical system that needs to be accurate or invariant in every aspect of the text in order for the underlying message to be clear?

[spell checker, backup system]
[teachers saying the same thing in different ways]

8. Error correcting code examples
DNA has limited copy error correction at the lowest level (i.e., via other molecular copying engines). There are other error correction systems at higher levels (e.g., healing from a non-fatal injury).

9. Being right
One usually wants to be correct or right.

There are times when this may not be clear.

Information sign More: Matthew 18:15-17 Conflicting and faulty resolutions

10. Matthew 11:15 Hearing test
Verse routeMatthew 11:15 He that hath ears to hear, let him hear. [kjv]
Verse routeο εχων ωτα ακουετω [gnt]

Eye cutout 3Gather the facts and get them right. This may not be easy. If you pluck out your "eyes", would you be able to "see"? If, by extension, you pluck out your "ears", would you be able to "hear"? This is an example of a many-to-one relationship or association.


Information sign More: Song: Open my eyes that I may see
Story:

11. Matthew 11:15

 All 
KJV: He that hath ears to hear, let him hear.
Greek: ο εχων ωτα ακουειν ακουετω
Latin: qui habet aures audiendi audiat
Wessex: se þe earan haebbe to geherene ge-hyre.
Wycliffe: He that hath eris of heryng, here he.
Tyndale: He yt hathe eares to heare let him heare.
Luther: Wer Ohren hat zu hören, der höre!

12. The hearing test
Coming home, I quietly opened the door. She was working quietly in the kitchen two rooms away. Just inside the door, I said softly, "Dear, can you hear me?".

No response. Just as I thought. A hearing issue.

13. The hearing test
I went to the next room and did the same thing again, softly. "Dear, can you hear me?".

No response. This is worse than I suspected. Now I had proof.

14. The hearing test
Finally, I got right outside the room she was in and said softly. "Dear, can you hear me?".

Finally, a response, as I heard her say, "For the third time, yes!".

15. Human activities and God
Verse routeRomans 8:31 What shall we then say to these things? If God be for us, who can be against us? [kjv]
Verse routeτι ουν ερουμεν προς ταυτα ει ο θεος υπερ ημων τις καθ ημων [gnt]

Many use this verse as a "battle cry" or puffed-up-in-pride "badge of honor". Some pastors (and others) promote this misconception.
Sir, my concern is not whether God is on our side; my greatest concern is to be on God's side, for God is always right. Abraham Lincoln (16th U.S. President)

If God is the primary customer, then the customer is always right.

16. Inside security threats
It is often said that 80% of security problems come from inside and not outside the organization.

A malicious insider is someone inside the company who is a non-cooperating user. This type of user is very dangerous because the entire system depends on cooperating users inside the system.

Information sign More: Inside security threats

17. Incomplete information
There have been solutions found to various problems that involve ideas of fault tolerant computing or distributed decisions in the presence of incomplete information.

18. Expected value: biased coin flips
Suppose that two individuals want to use a coin flip to settle a dispute, but neither person trusts the other.

How would you use a (possibly biased) coin to perform the coin flip so that neither individual has an advantage?

John Von Neumann provided in interesting solution to this problem.

Information sign More: Sample space for a coin flip

19. Ethernet resolution
Ethernet network symbol Antenna symbolThe Ethernet network protocol was originally designed in the following way. This helps resolve talking conflicts in a distributed and local manner without a global level of control - as long as all sides agree to the rules.

Ethernet is a CSMA/CD, for CSMA (Carrier sense multiple access) , CD (Collision detect) system.

20. Redundancy for fault tolerance
An example of redundancy for fault tolerance can be found in Revelation.

... more to be added ...

21. End of page

by RS  admin@creationpie.com : 1024 x 640