Decoder Error Probability of MRD Codes

Size: px
Start display at page:

Download "Decoder Error Probability of MRD Codes"

Transcription

1 Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA USA Zhiyan Yan Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA USA Abstract In this paper, we first introdce the concept of elementary linear sbspace, which has similar properties to those of a set of coordinates Using this new concept, we derive properties of maximm rank distance (MRD) codes that parallel those of maximm distance separable (MDS) codes Using these properties, we show that the decoder error probability of MRD codes with error correction capability t decreases exponentially with t 2 based on the assmption that all errors with the same rank are eqally likely We arge that the channel based on this assmption is an approximation of a channel corrpted by crisscross errors I INTRODUCTION The Hamming metric has often been considered the most relevant metric for error-control codes so far Recently, the rank metric [1] has attracted some attention de to its relevance to space-time coding [2] and storage applications [3] In [4], space-time block codes with good rank properties have been proposed Rank metric codes are sed to correct crisscross errors that can be fond in memory chip arrays and magnetic tapes [3] Rank metric codes have been sed in pblic-key cryptosystems as well [5] In [1], a Singleton bond on the minimm rank distance of rank metric codes was established, and codes that attain this bond were called maximm rank distance (MRD) codes An explicit constrction of MRD codes (these codes are referred to as Gabidlin codes) was also given in [1], and this constrction was extended in [6] Also, a decoding algorithm that parallels the extended Eclidean algorithm (EEA) was proposed for MRD codes In [3], two-dimensional codes with the rank metric were stdied: a Singleton bond in a different form was established and a decoding algorithm that is analogos to the Berlekamp-Massey algorithm was proposed In this paper, we investigate the performance of MRD codes when sed to protect data from additive errors based on two assmptions First, we assme all errors with the same rank are eqally likely We arge that the channel based on this assmption is an approximation of a channel corrpted by crisscross errors (see Section IV for details) Second, we assme that a bonded distance decoder is sed That is, the decoder looks for a codeword within rank distance t of the received word, where t denotes the error correction capability of MRD codes If sch a codeword exists, the decoder finds it; otherwise, the decoder reports a decoding failre Clearly, if the error has rank no more than t, the decoder gives the correct codeword When the error has rank greater than t, the otpt of the decoder is either a decoding failre or a wrong codeword, which corresponds to a decoder error Note that the decoder error probability of maximm distance separable (MDS) codes was investigated in [7], where all errors with the same Hamming weight were assmed to be eqiprobable The main contribtions of this paper are: We introdce the concept of elementary linear sbspace (ELS) The properties of an ELS are similar to those of a set of coordinates Using elementary linear sbspaces, we derive sefl properties of MRD codes In particlar, we prove the combinatorial property of MRD codes, derive a bond on the rank distribtion of these codes, and show that the restriction of an MRD code on an ELS is also an MRD code These properties parallel those of MDS codes Using the properties of MRD codes, we derive a bond on the decoder error probability of MRD codes that decreases exponentially with t 2 Or simlation reslts are consistent with or bond The rest of the paper is organized as follows Section II gives a brief review of the rank metric, Singleton bond, and MRD codes In Section III, we first introdce the concept of elementary linear sbspace and stdy its properties, and then obtain some important properties of MRD codes Section IV derives the bond on the decoder error probability of MRD codes when all errors with the same rank are eqiprobable Finally, in Section V, or bond on the decoder error probability is confirmed by simlation reslts A Rank metric II PRELIMINARIES Consider an n-dimensional vector x (x 0, x 1,, x n 1 ) in GF(q m ) n Assme α 0, α 1,, α m 1 is a basis set of GF(q m ) over GF(q), then for j 0, 1,, n 1, x j can be written as x j m 1 i0 x i,jα i, where x i,j GF(q) for i 0, 1,, m 1 Hence, x j can be expanded to an m-dimensional colmn vector (x 0,j, x 1,j,, x m 1,j ) T with respect to the basis set α 0, α 1,, α m 1 Let X be the m n matrix obtained by expanding all the coordinates of x That

2 is, x 0,0 x 0,1 x 0,n 1 x 1,0 x 1,1 x 1,n 1 X, x m 1,0 x m 1,1 x m 1,n 1 where x j m 1 i0 x i,jα i The rank norm of the vector x (over GF(q)), denoted as rk(x GF(q)), is defined to be the rank of the matrix X over GF(q), ie, rk(x GF(q)) def rank(x) [1] The rank norm of x can also be viewed as the smallest nmber of rank 1 matrices B i sch that X i B i [8] All the ranks are over the base field GF(q) nless otherwise specified in this paper To simplify notations, we denote the rank norm of x as rk(x) henceforth Accordingly, x, y GF(q m ) n, d(x, y) def rk(x y) is shown to be a metric over GF(q m ) n, referred to as the rank metric henceforth [1] Hence, the minimm rank distance d of a code of length n is simply the minimm rank distance over all possible pairs of distinct codewords A code with a minimm rank distance d can correct errors with rank p to t (d 1)/2 B The Singleton bond and MRD codes The minimm rank distance of a code can be specifically bonded First, the minimm rank distance d of a code over GF(q m ) is obviosly bonded by m Codes that satisfy d m are referred to as fll rank distance codes and are stdied in [9] Also, it can be shown that d d H [1], where d H is the minimm Hamming distance of the same code De to the Singleton bond on the minimm Hamming distance of linear block codes, the minimm rank distance of an (n, k) linear block code over GF(q m ) ths satisfies d n k + 1 (1) In general, for a block code over GF(q m ) with length n and cardinality M, a more general Singleton bond is given by d n log q m M + 1 (2) In this paper, we refer to the bond in (2) as the Singleton bond for rank metric codes and codes that attain the bond as MRD codes Note that (2) implies that the cardinality of any nonlinear MRD codes is a power of q m III PROPERTIES OF MRD CODES In order to derive the bond on decoder error probability, we need some important properties of MRD codes, which will be established next sing the concept of elementary linear sbspace A Elementary linear sbspaces Many properties of MDS codes are established by stdying sets of coordinates These sets of coordinates may be viewed as linear sbspaces which have a basis of vectors with Hamming weight 1 We first define elementary linear sbspaces, which are the conterparts of sets of coordinates Definition 1 (Elementary linear sbspace (ELS)): A linear sbspace V of GF(q m ) n is said to be elementary if it has a basis B consisting of row vectors in GF(q) n B is called an elementary basis of V We remark that V is an ELS if and only if it has a basis consisting of vectors of rank 1 We also remark that not all linear sbspaces are elementary For example, the span of a vector of rank > 1 has dimension 1, bt reqires vectors of rank 1 to span it Next, we show that the properties of elementary linear sbspaces are similar to those of sets of coordinates Definition 2 (Rank of a linear sbspace): The rank of a linear sbspace L of GF(q m ) n is defined to be the maximm rank among the vectors in L rk(l) def max {rk(x)} x L Proposition 1: If V is an ELS of GF(q m ) n with dim(v ) m, then rk(v ) dim(v ) Proof: Let s first denote dim(v ) as v Any vector x V can be expressed as the sm of at most v vectors of rank 1, hence its rank is pper bonded by v Ths, rk(v ) v and it sffices to find a vector in V with rank eqal to v Let B {b j } v 1 j0 be an elementary basis of V, and consider y v 1 i0 α ib i, where {α i } v 1 i0 all belong to a basis set of GF(q m ) over GF(q) If we expand the coordinates of y with respect to the basis {α i } v 1 i0, we get b 0 Y b v Since the row vectors b 0, b 1,, b v 1 are linearly independent over GF(q), Y has rank v and rk(y) v Lemma 1: Any vector x GF(q m ) n with rank belongs to an ELS A of dimension Also, x is not contained in any ELS of dimension less than Proof: The vector x can be expressed as a linear combination x 1 i0 x ia i, where x i GF(q m ) and a i GF(q) n for 0 i 1 Let A be the ELS of GF(q m ) n spanned by a i s, then dim(a) and x A Also, sppose x B, where B is an ELS with dimension t < Then by Proposition 1, rk(x) t <, which is a contradiction Lemma 2: Let V be the set of all ELS s of GF(q m ) n with dimension v and V be the set of all linear sbspaces of GF(q) n with dimension v Then there exists a bijection between V and V Proof: Let V be an ELS of GF(q m ) n with B as an elementary basis For any positive integer a, define } B q a def { v 1 x i b i x i GF(q a ), b i B i0

3 and a mapping f : V V given by V B q m V B q This mapping takes V to a niqe V, which is the set of all linear combinations over GF(q) of the vectors in B Note that dim(v ) dim(v ) f is injective becase if V and W are distinct, then V and W are also distinct f is also srjective since for all V V, there exists V V sch that f(v ) V For 0 v n, let [ n be the nmber of linear sbspaces of GF(q) n with dimension v [10] For v 0, [ n 0] 1, and for 1 v n: [ ] n v 1 v q n q i i0 q v q Lemma 2 implies that i Corollary 1: There are [ n ELS s in GF(q m ) n with dimension v Proposition 2: Let V be an ELS of GF(q m ) n with dimension v, then there exists an ELS W complementary to V, ie, V W GF(q m ) n Proof: Let V f(v ), and let B a basis of V, then there exists W, with basis B, sch that V W GF(q) n Denote W f 1 (W ) We now want to show that W V GF(q m ) n First, dim(w ) is n v, hence we only need to show that V W {0} Let y 0 V W, then there is a non-trivial linear relationship over GF(q m ) among the elements of B and those of B This may be expressed as y i b i 0 (3) b i B B Applying the trace fnction to each coordinate on both sides of (3), we obtain b i B B Tr(y i)b i 0, which implies a linear dependence over GF(q) of the vectors in B and B This contradicts the fact that B B is a basis Therefore, W V GF(q m ) n Definition 3 (Restriction of a vector): Let L be a linear sbspace of GF(q m ) n and let L be complementary to L, ie, L L GF(q m ) n Any vector x GF(q m ) n can then be represented as x x L x L, where x L L and x L L We will call x L and x L the restrictions of x on L and L, respectively Note that for any given linear sbspace L, its complementary linear sbspace L is not niqe Frthermore, the restriction of x on L, x L, depends on not only L bt also L Ths, x L is well defined only when both L and L are given All the restrictions in this paper are with respect to a fixed pair of linear sbspaces complementary to each other Definition 4: Let x GF(q m ) n and V be an ELS If there exists an ELS V complementary to V sch that x x V 0, we say that x vanishes on V Lemma 3: Given a vector x GF(q m ) n of rank, there exists an ELS with dimension n on which x vanishes Also, x does not vanish on any ELS with dimension greater than n Proof: By Lemma 1, x A, where A is an ELS with dimension Let Ā be an ELS with dimension n that is complementary to A Ths, x may be expressed as x x A x Ā x A 0 That is, x vanishes on Ā Also, sppose x vanishes on an ELS B with dimension greater than n Then there exists an ELS B with dimension < sch that x B, which contradicts Lemma 1 B Properties of MRD codes We now derive some sefl properties for MRD codes, which will be sed in or derivation of the decoder error probability In this sbsection, let C be an MRD code over GF(q m ) with length n (n m) and cardinality q mk Note that C may be linear or nonlinear First, we derive the basic combinatorial property of MRD codes Lemma 4 (Basic combinatorial property): Let K be an ELS of GF(q m ) n with dimension k, and fix K, an ELS complementary to K Then, for any vector k K, there exists a niqe codeword c C sch that its restriction on K satisfies c K k Proof: Let c d C sch that c K d K Their difference c d is in K, and hence has rank at most n k by Proposition 1, which contradicts that C is MRD Then all q mk codewords lead to different restrictions on K The niqeness is de to C K q mk This property allows s to obtain a bond on the rank distribtion of MRD codes Lemma 5 (Bond on the rank distribtion): Let A be the nmber of codewords of C with rank Then, for the redndancy r n k and d, A (q m 1) r (4) Proof: From Lemma 3, any codeword c with rank d vanishes on an ELS with dimension v n Ths (4) can be established by first determining the nmber of codewords vanishing on a given ELS, and then mltiplying by the nmber of sch ELS s, [ n Let V be an arbitrary ELS with dimension v First, since v k 1, V is properly contained in an ELS K with dimension k According to the combinatorial property, c is completely determined by c K Hence, if we specify that a codeword vanishes on V, we may specify k v other nonzero components arbitrarily There are at most (q m 1) k v (q m 1) r ways to do so, implying that there are at most (q m 1) r vectors that vanish on V Note that the exact formla for the rank distribtion of linear MRD codes was derived in [1] However, the bond in (4) is more convenient for the present application It is well known that a pnctred MDS code is an MDS code [11] We will show that the restriction of an MRD code to an ELS is also MRD Let V be an ELS with dimension v k, an elementary basis {b 0, b 1,, b v 1 }, and an complementary ELS V For any codeword c, sppose c V v 1 i0 a ib i, where a i GF(q m ) Let s define a mapping r : GF(q m ) n GF(q m ) v given by c r(c) (a 0,, a v 1 ) Then C V {r(c) c C} is called the restriction of C on V Lemma 6 (Restriction of an MRD code): For an ELS with dimension v k, C V is an MRD code Proof: Clearly, C V is a code over GF(q m ) with length v (v m) and cardinality q mk Assme c d C, and consider x c d Then we have rk(r(c) r(d)) rk(x V ) rk(x) rk(x V ) n k + 1 (n v) v k + 1 The Singleton bond on C V completes the proof

4 IV DECODER ERROR PROBABILITY OF MRD CODES IN CASE OF CRISSCROSS ERRORS Let C be a linear (n, k) MRD code over GF(q m ) (n m) with minimm rank distance d n k + 1 and error correction capability t (d 1)/2 We assme that C is sed to protect data from additive errors with rank That is, the received word corresponding to a codeword c of C is c + e We arge that the additive error with rank is an approximation of crisscross errors Let s assme q 2 and a codeword can be represented by an m n array of bits Sppose some of the bits are recorded erroneosly, and the error patterns are sch that all corrpted bits are confined to a nmber of rows or colmns or both Sch an error model, referred to as crisscross errors, occrs in memory chip arrays or magnetic tapes [3] Sppose the errors are confined to a row (or colmn), then sch an error pattern can be viewed as the addition of an error array which has non-zero coordinates on only one row (or colmn) and hence has rank 1 We may reasonably assme each row is corrpted eqally likely and so is each colmn Ths, all the errors that are restricted to > 1 rows (or colmns) are eqally likely Finally, if we assme the probability of a corrpted row is the same as that of a corrpted colmn, then all crisscross errors with weight [3] are eqally likely The weight of the crisscross error is no less than the rank of the error [3] However, in many cases the weight eqals the rank Hence, assming all errors with the same rank are eqiprobable is an approximation of crisscross errors A bonded distance decoder, which looks for a codeword within rank distance t of the received word, is sed to correct the error Clearly, if e has rank no more than t, the decoder gives the correct codeword When the error has rank greater than t, the otpt of the decoder is either a decoding failre or a decoder error We denote the probabilities of error and failre for error correction capability t and a given error rank as (t; ) and P F (t; ) respectively If t, then P F (t; ) (t; ) 0 When > t, (t; ) + P F (t; ) 1 In particlar, if t < < d t, then (t; ) 0 and P F (t; ) 1; Ths we only need to investigate the case where d t Since C is linear and hence geometrically niform, we assme withot loss of generality that the all-zero codeword is sent Ths, the received word can be any vector with rank with eqal probability We call a vector decodable if it lies within rank distance t of some codeword If D denotes the nmber of decodable vectors of rank, then for t + 1 we have (t; ) D N D [ n A(m, ), (5) where N denotes the nmber of vectors of rank and A(m, ) def 1 i0 (qm q i ) Hence the main challenge is to derive pper bonds on D We have to distingish two cases: d and < d The approach we se to bond D is similar to that in [7] Proposition 3: For d, then D (q m 1) r V t, (6) where V t t i0 N i is the volme of a ball of rank radis t Proof: Each decodable vector can be written niqely as c + e, where c C and rk(e) t For a fixed e, C + e is an MRD code, so it satisfies Eqation (4) Therefore, the nmber of decodable words of rank is at most [ n (q m 1) r mltiplied by the nmber of possible error vectors, V t Proposition 4: For d t < d, we have [ ] v [ ] D (q m 1) w r A(m, s w) w s w wd sw Proof: The approach sed here is similar to that in the proof of Lemma 5 Recall that a decodable vector of rank can be expressed as c + e, where c C and rk(e) t This vector vanishes on an ELS V with dimension v n by Lemma 3 Fix V, an ELS complementary to V We have w def rk(c V ) t C V is an MRD code by Lemma 6, hence w d By (4), the nmber of codewords with rank w on V is at most [ v w] (q m 1) w r, where r r For each codeword c with rank w on V, we mst cont the nmber of error vectors e sch that c + e vanishes on V Sppose that e has rank s w On V, e V c V, bt e V is an arbitrary vector of rank s w Ths the total nmber of error vectors, for a given codeword of rank w on V, is t [ sw s w] A(m, s w) The total nmber D V of decodable vectors vanishing on V is at most [ ] v [ ] D V (q m 1) w r A(m, s w) w s w wd sw s [ ][ ] v (q m 1) r w s w sd wd A(m, s w)(q m 1) w (7) Mltiplying the bond on D V by [ n, the nmber of possible ELS s of dimension v, we get the reslt By relaxing the reslt in Proposition 4, the bond for D in (6) also applies to the case d t < d Corollary 2: For d t, then D [ n (q m 1) r V t Proof: The reslt has already been proved for d To prove it for < d, we shall se Eqation (7) First, we remark that A(m, s w)(q m 1) w A(m, s)q w( s+w) Replacing this bond on A(m, s w) in (7), and sing the following combinatorial relation [10]: s [ v ] w0 w][ s w q w( s+w) [ ] v+ s, we obtain D V (q m 1) r V t Mltiplying this bond by the nmber of choices for V, we get the desired reslt Before deriving an pper bond for (t; ), we need to establish two lemmas, whose proofs are omitted de to limited space Lemma 7: For 0 m, A(m, ) q m σ(q), where σ(q) 1 ln(q) k1 σ(2) k(q k 1) is a decreasing fnction of q with

5 Lemma 8: For m 1 and t m/2, V t q t(n+m t)+σ(q) Proposition 5: For d t, the decoder error probability satisfies (t; ) q t2 +2σ(q) (8) Proof: From Corollary 2, we have for d t: (t;16) vs t, mn16 Bond Simlation reslts (t; ) (qm 1) r V t A(m, ) The bonds in Lemmas 7 and 8 lead to (t; ) q mr+t(m+n t)+2σ(q) Since n m and 2t r, it follows that (t; ) q m(2t r) t2 +2σ(q) q t2 +2σ(q) (t;16) V SIMULATION RESULTS In this section, we se nmerical simlations to verify or bond given in Proposition 5 In or simlations, we sed a special family of MRD codes called Gabidlin codes [1] with the following parameters: q 2, m n 16, and d 2t + 1 n k + 1 The simlations were based on the following process: first a random message word in GF(q m ) k is encoded sing the generator matrix of the Gabidlin code, then a random error vector with rank > t is added to the codeword, and finally the EEA [1] is sed to decode the received word Since > t, the decoding reslts in either a failre or an error Similarly to the decoding of Reed- Solomon codes, decoder failre is declared based on the otpt of the EEA Different vales for t and are sed in or simlations to verify or bond Each decoder error probability is compted after at least 15 occrrences of decoder errors to ensre reliability of simlation reslts Note that or bond given in Proposition 5 does not depend on, and decreases exponentially with t 2 In Figre 1, the decoder error probability is viewed as a fnction of t as t varies from 1 to 4 and is set to n 16 Note that when t 1, the bond in Proposition 5 is trivial We observe that both the bond and the simlated decoder error probability decrease exponentially with t 2 In Figre 2, the decoder error probability is viewed as a fnction of as t is set to either 2 or 3 and varies from t + 1 to n 16 Clearly, the decoder error probability varies with somewhat, bt the bond in Proposition 5 is applicable to all vales of REFERENCES [1] E M Gabidlin, Theory of codes with maximm rank distance, Problems on Information Transmission, vol 21, no 1, pp 1 12, Jan 1985 [2] V Tarokh, N Seshadri, and A R Calderbank, Space-time codes for high data rate wireless commnication: Performance criterion and code constrction, IEEE Trans Info Theory, vol 44, pp , March 1998 [3] R M Roth, Maximm-rank array codes and their application to crisscross error correction, IEEE Trans Info Theory, vol 37, no 2, pp , March 1991 [4] P Lsina, E M Gabidlin, and M Bossert, Maximm Rank Distance codes as space-time codes, IEEE Trans Info Theory, vol 49, pp , Oct 2003 [5] E M Gabidlin, A V Paramonov, and O V Tretjakov, Ideals over a non-commtative ring and their application in cryptology, LNCS, vol 573, pp , 1991 [6] A Kshevetskiy and E M Gabidlin, The new constrction of rank codes, Proc IEEE Int Symp on Information Theory, pp , Sept t Fig 1 Decoder error probability of an MRD code as a fnction of t, with q 2, m n 16, and 16 (t;) (t;) vs, mn16, t2 or 3 t2, bond t2, simlation t3, bond t3, simlation Fig 2 Decoder error probability of an MRD code as a fnction of, with q 2, m n 16, and t eqal to 2 or 3 [7] R J McEliece and L Swanson, On the decoder error probability for Reed-Solomon codes, IEEE Trans Info Theory, vol 32, no 5, pp , Sept 1986 [8] E M Gabidlin and V A Obernikhin, Codes in the Vandermonde F-metric and their application, Problems of Information Transmission, vol 39, no 2, pp , 2003 [9] K N Manoj and B Sndar Rajan, Fll Rank Distance codes, Technical Report, IISc Bangalore, Oct 2002 [10] G E Andrews, The Theory of Partitions, G-C Rota, Ed Addison- Wesley, 1976, vol 2 [11] R Blaht, Theory and Practice of Error Control Codes Addison- Wesley, 1983

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Error Performance Analysis of Maximum Rank Distance Codes

Error Performance Analysis of Maximum Rank Distance Codes Error Performance Analysis of Maximum Rank Distance Codes arxiv:cs/0612051v1 [cs.it] 8 Dec 2006 Maximilien Gadouleau and Zhiyuan Yan Department of Electrical and Computer Engineering Lehigh University,

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal

More information

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

9. Tensor product and Hom

9. Tensor product and Hom 9. Tensor prodct and Hom Starting from two R-modles we can define two other R-modles, namely M R N and Hom R (M, N), that are very mch related. The defining properties of these modles are simple, bt those

More information

1 The space of linear transformations from R n to R m :

1 The space of linear transformations from R n to R m : Math 540 Spring 20 Notes #4 Higher deriaties, Taylor s theorem The space of linear transformations from R n to R m We hae discssed linear transformations mapping R n to R m We can add sch linear transformations

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

Figure 1 Probability density function of Wedge copula for c = (best fit to Nominal skew of DRAM case study).

Figure 1 Probability density function of Wedge copula for c = (best fit to Nominal skew of DRAM case study). Wedge Copla This docment explains the constrction and properties o a particlar geometrical copla sed to it dependency data rom the edram case stdy done at Portland State University. The probability density

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE. Jingbo Xia

CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE. Jingbo Xia CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE Jingbo Xia Abstract. Let H 2 (S) be the Hardy space on the nit sphere S in C n. We show that a set of inner fnctions Λ is sfficient for the prpose of determining

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator Performance analysis of the MAP eqalizer within an iterative receiver inclding a channel estimator Nora Sellami ISECS Rote Menzel Chaer m 0.5 B.P 868, 308 Sfax, Tnisia Aline Romy IRISA-INRIA Camps de Bealie

More information

The Heat Equation and the Li-Yau Harnack Inequality

The Heat Equation and the Li-Yau Harnack Inequality The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with

More information

On Multiobjective Duality For Variational Problems

On Multiobjective Duality For Variational Problems The Open Operational Research Jornal, 202, 6, -8 On Mltiobjective Dality For Variational Problems. Hsain *,, Bilal Ahmad 2 and Z. Jabeen 3 Open Access Department of Mathematics, Jaypee University of Engineering

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

Effects Of Symmetry On The Structural Controllability Of Neural Networks: A Perspective

Effects Of Symmetry On The Structural Controllability Of Neural Networks: A Perspective 16 American Control Conference (ACC) Boston Marriott Copley Place Jly 6-8, 16. Boston, MA, USA Effects Of Symmetry On The Strctral Controllability Of Neral Networks: A Perspective Andrew J. Whalen 1, Sean

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

1. INTRODUCTION. A solution for the dark matter mystery based on Euclidean relativity. Frédéric LASSIAILLE 2009 Page 1 14/05/2010. Frédéric LASSIAILLE

1. INTRODUCTION. A solution for the dark matter mystery based on Euclidean relativity. Frédéric LASSIAILLE 2009 Page 1 14/05/2010. Frédéric LASSIAILLE Frédéric LASSIAILLE 2009 Page 1 14/05/2010 Frédéric LASSIAILLE email: lmimi2003@hotmail.com http://lmi.chez-alice.fr/anglais A soltion for the dark matter mystery based on Eclidean relativity The stdy

More information

Control Systems

Control Systems 6.5 Control Systems Last Time: Introdction Motivation Corse Overview Project Math. Descriptions of Systems ~ Review Classification of Systems Linear Systems LTI Systems The notion of state and state variables

More information

A Note on Irreducible Polynomials and Identity Testing

A Note on Irreducible Polynomials and Identity Testing A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion rocedre (demonstrated with a -D bar element problem) MAE - inite Element Analysis Many slides from this set are originally from B.S. Altan, Michigan Technological U. EA rocedre for Static Analysis.

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

Affine Invariant Total Variation Models

Affine Invariant Total Variation Models Affine Invariant Total Variation Models Helen Balinsky, Alexander Balinsky Media Technologies aboratory HP aboratories Bristol HP-7-94 Jne 6, 7* Total Variation, affine restoration, Sobolev ineqality,

More information

LINEAR COMBINATIONS AND SUBSPACES

LINEAR COMBINATIONS AND SUBSPACES CS131 Part II, Linear Algebra and Matrices CS131 Mathematics for Compter Scientists II Note 5 LINEAR COMBINATIONS AND SUBSPACES Linear combinations. In R 2 the vector (5, 3) can be written in the form

More information

Lecture: Corporate Income Tax - Unlevered firms

Lecture: Corporate Income Tax - Unlevered firms Lectre: Corporate Income Tax - Unlevered firms Ltz Krschwitz & Andreas Löffler Disconted Cash Flow, Section 2.1, Otline 2.1 Unlevered firms Similar companies Notation 2.1.1 Valation eqation 2.1.2 Weak

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

Solving ECDLP via List Decoding

Solving ECDLP via List Decoding Solving ECDLP via List Decoding Fanggo Zhang 1,2 and Shengli Li 3 1 School of Data and Compter Science, Sn Yat-sen University, Gangzho 510006, China 2 Gangdong Key Laboratory of Information Secrity, Gangzho

More information

Garret Sobczyk s 2x2 Matrix Derivation

Garret Sobczyk s 2x2 Matrix Derivation Garret Sobczyk s x Matrix Derivation Krt Nalty May, 05 Abstract Using matrices to represent geometric algebras is known, bt not necessarily the best practice. While I have sed small compter programs to

More information

FRÉCHET KERNELS AND THE ADJOINT METHOD

FRÉCHET KERNELS AND THE ADJOINT METHOD PART II FRÉCHET KERNES AND THE ADJOINT METHOD 1. Setp of the tomographic problem: Why gradients? 2. The adjoint method 3. Practical 4. Special topics (sorce imaging and time reversal) Setp of the tomographic

More information

INPUT-OUTPUT APPROACH NUMERICAL EXAMPLES

INPUT-OUTPUT APPROACH NUMERICAL EXAMPLES INPUT-OUTPUT APPROACH NUMERICAL EXAMPLES EXERCISE s consider the linear dnamical sstem of order 2 with transfer fnction with Determine the gain 2 (H) of the inpt-otpt operator H associated with this sstem.

More information

An Investigation into Estimating Type B Degrees of Freedom

An Investigation into Estimating Type B Degrees of Freedom An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH BEIFANG CHEN, JUE WANG, AND THOMAS ZASLAVSKY Abstract. It is well-known that each nonnegative integral flow of a directed graph can be decomposed

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE

EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE A.N. Jadhav Department of Electronics, Yeshwant Mahavidyalaya, Ned. Affiliated to

More information

Lecture: Corporate Income Tax

Lecture: Corporate Income Tax Lectre: Corporate Income Tax Ltz Krschwitz & Andreas Löffler Disconted Cash Flow, Section 2.1, Otline 2.1 Unlevered firms Similar companies Notation 2.1.1 Valation eqation 2.1.2 Weak atoregressive cash

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

ON THE PERFORMANCE OF LOW

ON THE PERFORMANCE OF LOW Monografías Matemáticas García de Galdeano, 77 86 (6) ON THE PERFORMANCE OF LOW STORAGE ADDITIVE RUNGE-KUTTA METHODS Inmaclada Higeras and Teo Roldán Abstract. Gien a differential system that inoles terms

More information

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates

More information

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables Concepts Introdced Digital Electronics trth tables, logic eqations, and gates combinational logic seqential logic Digital electronics operate at either high or low voltage. Compters se a binary representation

More information

Linear System Theory (Fall 2011): Homework 1. Solutions

Linear System Theory (Fall 2011): Homework 1. Solutions Linear System Theory (Fall 20): Homework Soltions De Sep. 29, 20 Exercise (C.T. Chen: Ex.3-8). Consider a linear system with inpt and otpt y. Three experiments are performed on this system sing the inpts

More information

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007 1833-3 Workshop on Understanding and Evalating Radioanalytical Measrement Uncertainty 5-16 November 007 Applied Statistics: Basic statistical terms and concepts Sabrina BARBIZZI APAT - Agenzia per la Protezione

More information

Ideals over a Non-Commutative Ring and their Application in Cryptology

Ideals over a Non-Commutative Ring and their Application in Cryptology Ideals over a Non-Commutative Ring and their Application in Cryptology E. M. Gabidulin, A. V. Paramonov and 0. V. Tretjakov Moscow Institute of Physics and Technology 141700 Dolgoprudnii Moscow Region,

More information

Prandl established a universal velocity profile for flow parallel to the bed given by

Prandl established a universal velocity profile for flow parallel to the bed given by EM 0--00 (Part VI) (g) The nderlayers shold be at least three thicknesses of the W 50 stone, bt never less than 0.3 m (Ahrens 98b). The thickness can be calclated sing Eqation VI-5-9 with a coefficient

More information

Graphs and Their. Applications (6) K.M. Koh* F.M. Dong and E.G. Tay. 17 The Number of Spanning Trees

Graphs and Their. Applications (6) K.M. Koh* F.M. Dong and E.G. Tay. 17 The Number of Spanning Trees Graphs and Their Applications (6) by K.M. Koh* Department of Mathematics National University of Singapore, Singapore 1 ~ 7543 F.M. Dong and E.G. Tay Mathematics and Mathematics EdOOation National Institte

More information

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms Spanning Trees ith Many Leaes in Graphs ithot Diamonds and Blossoms Pal Bonsma Florian Zickfeld Technische Uniersität Berlin, Fachbereich Mathematik Str. des 7. Jni 36, 0623 Berlin, Germany {bonsma,zickfeld}@math.t-berlin.de

More information

V. Hadron quantum numbers

V. Hadron quantum numbers V. Hadron qantm nmbers Characteristics of a hadron: 1) Mass 2) Qantm nmbers arising from space-time symmetries : total spin J, parity P, charge conjgation C. Common notation: 1 -- + 2 J P (e.g. for proton:

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

3.4-Miscellaneous Equations

3.4-Miscellaneous Equations .-Miscellaneos Eqations Factoring Higher Degree Polynomials: Many higher degree polynomials can be solved by factoring. Of particlar vale is the method of factoring by groping, however all types of factoring

More information

Weight Distributions of a Class of Cyclic Codes with Arbitrary Number of Zeros II

Weight Distributions of a Class of Cyclic Codes with Arbitrary Number of Zeros II 1 Weight Distribtions of a Class of Cyclic Codes with Arbitrary Nmber of Zeros II Jing Yang, Lingli Xia, Maosheng Xiong arxiv:1405.656v1 [math.nt] 4 May 014 Abstract Cyclic codes are an important class

More information

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2 MATH 307 Vectors in Rn Dr. Neal, WKU Matrices of dimension 1 n can be thoght of as coordinates, or ectors, in n- dimensional space R n. We can perform special calclations on these ectors. In particlar,

More information

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u.

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u. 2005-Ojda International Conference on Nonlinear Analysis. Electronic Jornal of Differential Eqations, Conference 14, 2006, pp. 95 107. ISSN: 1072-6691. URL: http://ejde.math.txstate.ed or http://ejde.math.nt.ed

More information

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields.

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields. Kraskopf, B, Lee,, & Osinga, H (28) odimension-one tangency bifrcations of global Poincaré maps of for-dimensional vector fields Early version, also known as pre-print Link to pblication record in Explore

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Quantum Key Distribution Using Decoy State Protocol

Quantum Key Distribution Using Decoy State Protocol American J. of Engineering and Applied Sciences 2 (4): 694-698, 2009 ISSN 94-7020 2009 Science Pblications Qantm Key Distribtion sing Decoy State Protocol,2 Sellami Ali, 2 Shhairi Sahardin and,2 M.R.B.

More information

When are Two Numerical Polynomials Relatively Prime?

When are Two Numerical Polynomials Relatively Prime? J Symbolic Comptation (1998) 26, 677 689 Article No sy980234 When are Two Nmerical Polynomials Relatively Prime? BERNHARD BECKERMANN AND GEORGE LABAHN Laboratoire d Analyse Nmériqe et d Optimisation, Université

More information

SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR

SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR italian jornal of pre and applied mathematics n. 34 215 375 388) 375 SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR Adnan G. Alamosh Maslina

More information

The Dual of the Maximum Likelihood Method

The Dual of the Maximum Likelihood Method Department of Agricltral and Resorce Economics University of California, Davis The Dal of the Maximm Likelihood Method by Qirino Paris Working Paper No. 12-002 2012 Copyright @ 2012 by Qirino Paris All

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

The Cross Product of Two Vectors in Space DEFINITION. Cross Product. u * v = s ƒ u ƒƒv ƒ sin ud n

The Cross Product of Two Vectors in Space DEFINITION. Cross Product. u * v = s ƒ u ƒƒv ƒ sin ud n 12.4 The Cross Prodct 873 12.4 The Cross Prodct In stdying lines in the plane, when we needed to describe how a line was tilting, we sed the notions of slope and angle of inclination. In space, we want

More information

Full Duplex in Massive MIMO Systems: Analysis and Feasibility

Full Duplex in Massive MIMO Systems: Analysis and Feasibility Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical

More information

Cryptographic applications of codes in rank metric

Cryptographic applications of codes in rank metric Cryptographic applications of codes in rank metric Pierre Loidreau CELAr and Université de Rennes Pierre.Loidreau@m4x.org June 16th, 2009 Introduction Rank metric and cryptography Gabidulin codes and linearized

More information

An upper bound for the size of the largest antichain. in the poset of partitions of an integer. University of Georgia.

An upper bound for the size of the largest antichain. in the poset of partitions of an integer. University of Georgia. An pper bond for the size of the largest antichain in the poset of partitions of an integer E. Rodney Caneld Department of Compter Science University of Georgia Athens, GA 3060, USA erc@cs.ga.ed Konrad

More information

System identification of buildings equipped with closed-loop control devices

System identification of buildings equipped with closed-loop control devices System identification of bildings eqipped with closed-loop control devices Akira Mita a, Masako Kamibayashi b a Keio University, 3-14-1 Hiyoshi, Kohok-k, Yokohama 223-8522, Japan b East Japan Railway Company

More information

1 Differential Equations for Solid Mechanics

1 Differential Equations for Solid Mechanics 1 Differential Eqations for Solid Mechanics Simple problems involving homogeneos stress states have been considered so far, wherein the stress is the same throghot the component nder std. An eception to

More information