A two dimensional non-overlapping code over a q-ary alphabet
|
|
- Bethany Benson
- 5 years ago
- Views:
Transcription
1 A two dimensional non-overlapping code over a q-ary alphabet Antonio Bernini Dipartimento di Matematica e Informatica, Università di Firenze Convegno GNCS Montecatini Terme, Febbraio 2018 Progetto di Ricerca 2017: Codici di stringhe e matrici non sovrapponibili Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
2 Background on strings Bifix-free strings: description The string has the bifix The string has not any bifix: it is said bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
3 Background on strings Bifix-free strings: description Bifix-free strings are collected in a set: Definition Denote BF q n the set of n-length bifix-free strings on a q-ary alphabet. Theorem (Nielsen, 1973) BF q 1 = q BF q 2n = q BF q 2n 1 BF n q BF q 2n+1 = q BF q 2n Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
4 Background on strings Cross-bifix-free strings: description The two strings in BF , admit a cross-bifix: The two strings in BF , are cross-bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
5 Background on strings Definition A set of strings is said cross-bifix-free if each string is bifix-free and if any two strings are cross-bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
6 Background on strings A cross-bifix-free set Definition Fixed 2 k n 2, denote S (k) n,q the set of strings s[1]s[2]... s[n] of length n on the alphabet Σ = {0, 1,..., q 1} of the form s[1] s[2] s[k] s[k + 1] }{{}}{{} = 1 k 1 s[k + 2] s[n 1] }{{} avoiding 1 k s[n] }{{} 1 Example: if n = 7, k = 2 and q = 2 we obtain: S (2) 7,2 = { , , , , } while S (3) 7,2 = { , , , } Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
7 Background on strings A cross-bifix-free set Theorem (Chee, Kiah, Purkayastha, Wang, 2013) S n,q (k) is a non-expandable cross-bifix-free set on BFn q. Moreover, S n,q (k) = (q 1) 2 f (k) n k 2,q, where f (k) n,q { u Σ n u avoids 1 k} = q n (q 1) k j=1 f (k) n j,q se 0 n < k se n k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
8 Extension to the bidimensional case: a first approach Bibifix-free square matrices: description The matrix ( ) 1 1 has the bibifix. It is a submatrix which appears at same time in two 1 0 opposite corners on the main diagonal. The matrix has not any bibifix: it is said bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
9 Extension to the bidimensional case: a first approach Bibifix-free square matrices: description Bibifix-free square matrices are collected in a set: Definition Denote BBF q n the set of bibifix-free matrices of dimension n n over a finite alphabet Σ = {0, 1,..., q 1} Theorem (Barcucci, Bernini, Bilotta, Pinzani, 2015) BBF q 0 = 1, BBFn q = q 2n 1 BBF q n 1, n 1, n odd, BBFn q = q 2n 1 BBF q n 1 q n2 2 BBF q n, n 1, n even. 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
10 Cross-bibifix-free square matrices Description The matrices of BBF , overlap (cross each other) along the direction of the main diagonal: Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
11 Cross-bibifix-free square matrices Description The matrices of BBF , do not overlap along the direction of the main diagonal: they are said cross-bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
12 Cross-bibifix-free square matrices Definition A set of square matrices is said cross-bibifix-free if each matrix is bibifix-free and if any two matrices are cross-bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
13 Cross-bibifix-free square matrices A set of cross-bibifix-free matrices Definition u[1] CBBFn q. = u[2] u[n] u Sn q, Σ The set Sn q is such that Sn q (k) = max S n,q k=2,...,n 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
14 Cross-bibifix-free square matrices A set of cross-bibifix-free matrices Definition u[1] CBBFn q. = u[2] u[n] u Sn q, Σ The set Sn q is such that Sn q (k) = max S n,q k=2,...,n 2 Proposition (Barcucci, Bernini, Bilotta, Pinzani, 2015) CBBF q n is a non-expandable cross-bibifix-free set on BBF q n. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
15 Non-overlapping matrices The matrices , can overlap in several ways: Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
16 Non-overlapping matrices The matrices , do not overlap along any direction of the plane: they are said non-overlapping. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
17 A set of non-overlapping binary matrices: definition Fixed 3 k n (k) 2, define S m n the set of matrices m n of the form M = (M i,j ) = 1 2 k 1 k k + 1 n k n k + 1 n k + 2 n 1 n such that the strings: 0M 1,k+1... M 1,n k 1 (red substring in the first row); M j,1... M j,n 1 0 for j = 2,..., m 1 (red strings in the row from the second to the second to last one); M m,k+1... M m,n k (red substring in the last row), avoid 0 k and 1 k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
18 A set of non-overlapping binary matrices Definition A set of matrices is called non-overlapping if each matrix is self non-overlapping and for any two matrices in the set they are non-overlapping matrices. It is easily seen that each matrix of S (k) m n is self non-overlapping. Theorem (Barcucci, Bernini, Bilotta, Pinzani) The set S (k) m n is non-overlapping, for each k with 3 k n 2, m 2 and n 2k. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
19 A set of non-overlapping binary matrices Sketch of proof: If a matrix B could be overlapped on a matrix A, then a central row of A should contain a forbidden pattern: A = = B If the movement of B on A involved a fixed entry on the frame, some problem would appear in that entry: A = = B Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
20 A set of non-overlapping binary matrices: enumeration 1 2 k 1 k k + 1 n k n k + 1 n k + 2 n 1 n Denote B (k) n = { u {0, 1} n u avoids 0 k and 1 k} : first row: enumerated by r (k) (k) n 2k+2 where r n { } R n (k) = u B n (k) u 1 = 0, u n = 1 ; central { rows: enumerated } by z n (k) Z n (k) = u B n (k) u n = 0 ; where z (k) n = R n (k) and = Z n (k) and last row: enumerated by b (k) n 2k where b(k) n = B n (k). ( S m n (k) = r (k) n 2k+2 z (k) n ) m 2 b (k) n 2k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
21 Strings in B (k), Z (k) and R (k) n n Recurrences for b n (k), z n (k) and r n (k) b (k) n = z n (k) = 2 n if 0 n k 1 k 1 j=1 b (k) n j if n k 1 if n = 0 b (k) n / 2 if n 1 1 if n = 0 n r (k) n = 0 if n = 1 2 n 2 if 2 n k k 1 ( ) z (k) n j r (k) n j j=1 if n k + 1 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
22 Relation with k-generalized Fibonacci numbers f (k) n Revised recurrences f (k) n = 2 n if 0 n k 1 k j=1 b n (k) = z n (k) = r n (k) = f (k) n j if n k 1 if n = 0 2f (k 1) n 1 if n 1 1 if n = 0 f (k 1) n 1 if n 1 1 if n = 0 f (k 1) n 1 +d (k) n 2 if n 1 k-generalized Fibonacci numbers with d n (k) = 1 if (n mod k) = 0 1 if (n mod k) = 1 0 if (n mod k) 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
23 Relation with k-generalized Fibonacci numbers Generating functions b (k) (x) = n 0 b n (k) x n = 1 + 2xf (k 1) (x) z (k) (x) = n 0 z n (k) x n = 1 + xf (k 1) (x) r (k) (x) = n 0 r (k) n x n = xf (k 1) (x) + d (k) (x) 1 2 where d (k) (x) = n 0 d (k) n x n = 1 k i=1 x i and f (k) (x) = f n (k) x n = n 0 k i=1 k i=1 x i x i Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
24 Relation with k-generalized Fibonacci numbers Cardinality The number S (k) (k) m n can now be expressed in term of f n : S (k) m n = ( f (k 1) 2k 1 ) m 2 if n = 2k ( ) ( f (k 1) n 2k 1 f (k 1) n 2k+1 + d (k) n 2k+2 f (k 1) n 1 ) m 2 if n > 2k ( ( In particular, if k = 3, using f n (2) = possible to obtain a closed formula for S (3) m n 2 ) n+2 ( 1 ) ) n for n 0, it is Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
25 A possible extension to a q-ary alphabet Let Σ = {0, 1, 2,..., q 1}, P Σ, {P 1, P 2 } a partition of P. W.l.o.g assume P = {0, 1, 2,..., p 1}, with 2 p q and P 1 = {0, 1,..., j 1}, P 2 = {j, j + 1,..., p 1}. Definition For each (α, β) P 1 P 2, we construct the set S (k,p) m n,q (α, β) of matrices A = (a i,j ) satisfying the following conditions: A 1 = α k 1 βw 1 αβ k 1, where v 1 = βw 1 α is a q-ary string of length n 2k + 2 avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k ; for i = 2,..., m 1, A i = w i β = v i, where v i is a q-ary string of length n avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k ; A m = α k v m β k, where v m is a q-ary string of length n 2k avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
26 Example: S (3,4) 4 9,6 (α, β) q = 6 (Σ = {0, 1, 2, 3, 4, 5}) alphabet p = 4 (P = {0, 1, 2, 3}) number of forbidden patterns P 1 = {0, 1}, P 2 = {2, 3} partition k = 3 length of forbidden patterns P 1 P 2 = {(0, 2), (0, 3), (1, 2), (1, 3)} (α, β) red (sub)strings avoid the pattern 000, 111, 222 and 333. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
27 Let S (k,p) m n,q = (α,β) S (k,p) m n,q (α, β) Proposition (Barcucci, Bernini, Bilotta, Pinzani, 2017) The set S (k,p) m n,q M m n,q is non-overlapping, for each k, p, m, n with 2 k n 2, 2 p q and m 2. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
28 Enumeration S (k,p) m n,q = (α,β) S (k,p) m n,q(α, β) Referring to the above definition: S (k,p) = r (k,p) where m n,q(α, β) r (k,p) n 2k+2,q counts the strings v 1; n 2k+2,q = j(p j) ( z (k,p) n,q z (k,p) n,q counts the strings v i, i = 2, 3,..., m; b (k,p) S m n,q(α, (k,p) β) ) m 2 b (k,p) n 2k,q n 2k,q counts the strings v m S (3,3) 4 9,q (1, 3) = Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
29 Recursive relations: not so useful b (k,p) n,q = q n if 0 n k 1 k 1 (q 1) i=1 b (k,p) n i,q + (q p)b(k,p) n k,q if n k. 0 if n = 0 z (k,p) n,q = q n 1 if 1 n k 1 k 1 ( ) b (k,p) n i,q z (k,p) n i,q i=1 if n k. 0 if n = 0, 1 r (k,p) n,q = q n 2 k 1 ( ) z (k,p) n i,q r (k,p) n i,q i=1 if 2 n k if n k + 1. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
30 Asymptotic behaviour (as n tends to + ) (Rational) Generating functions: b q (k,p) (x) = h(x)/g(x) z q (k,p) (x) = (h(x) 1)/g(x) r q (k,p) (x) = (h(x) 1) 2 /h(x)g(x) where g(x) = 1 (q 1)(x + x x j 1 ) (q p)x k and h(x) = (1 + x + x x k 1 ). It is possible to prove that the three denominators have the same unique zero x 0 (k, p, q) with smallest modulo (it is x 0 (k, p, q) < 1 for q 3) and multiplicity d 0 = 1. Therefore,... Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
31 Asymptotic behaviour... there exist three constants L 0, M 0, and N 0 such that (Expansion of rational functions) b (k,p) n,q L 0 z(k,p) n,q M 0 r n,q (k,p) N 0 Then, considering j = p 2, we have S (k,p) m n,q p p = 2 2 and, as n tends to +, ( ( r (k,p) n 2k+2,q ( 1 x 0 (k, p, q) z (k,p) n,q ) n ) m 2 b (k,p) Proposition S (k,p) p p ( m n,q L 0 M m N x 0 (k, p, q) n 2k,q ) ) nm 4k+2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
32 On the maximal size: S (k,p) m n,q = p p 2 2 ( ( r (k,p) n 2k+2,q z (k,p) n,q ) m 2 b (k,p) n 2k,q We are interested in the values of k and p giving the maximal value of the set when n is sufficiently large, once q is fixed. It is q qp(q 1) q(q k 1) p(q 1)(k 1) < 1 x 0 (k, p, q) < q p(q 1)k 1 (q 2) q k 1 (q 1) k q k 1 Recall that, for n sufficiently large, z (k,p) n,q M 0 ( 1 x 0 ) n ) 1. If k increases, the value 1/x 0 is expected to increase. So, z n has maximal size for k = n/2. 2. If p decreases, the value 1/x 0 is expected to increase. So, z n has maximal size for p = 2. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
33 On the maximal size: S (k,p) m n,q = p p 2 2 ( ( r (k,p) n 2k+2,q z (k,p) n,q ) m 2 b (k,p) n 2k,q ) Recall that ( ) n 2k+2 ( ) n 2k r (k,p) 1 n 2k+2,q N 0 and b (k,p) 1 n 2k,q x L 0 0 x 0 3. Different behaviour (unimodal behaviour) of b n 2k and r n 2k+2 with respect to z n depending on k (which appears in the exponent). 4. Same behaviour with respect to z n depending on p: maximal size for p = The coefficient p 2 p 2 is maximum if p = q. Summarizing: it is not easy the find the maximal size depending on p and k... Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
34 p = 2 p = 3 p = 4 k = S (k,p) 3 8,4 k = k = k = S (k,p) 8 8,4 k = k = k = S (k,p) 20 8,4 k = k = S (k,p) 60 8,4 k = k = Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
35 On the non-expandability The set S (k,p) m n,q can be expanded: fixed (α, β), let Consider the matrix B S (k+1,p) m n,q α α β α β β S m n,q(α, (k,p) β) A = β β α α α β β β S (k+1,p) m n,q (α, β) B = α α α β α β β β β β α α α α β β β β The last row of A can be overlapped with the first row of B. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
36 Grazie per l attenzione. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35
Grand Dyck consecutive patterns avoiding binary words
Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini
More informationSome statistics on permutations avoiding generalized patterns
PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,
More informationOn q-ary optimal equitable symbol weight codes
On q-ary optimal equitable symbol weight codes 1/20 On q-ary optimal equitable symbol weight codes L. A. Bassalygo, V.A. Zinoviev A.A. Kharkevich Institute for Problems of Information Transmission, Moscow,
More informationA generating function for bit strings with no Grand Dyck pattern matching
PU. M. A. Vol. 25 (205), No., pp. 30 44 A generating function for bit strings with no Grand Dyck pattern matching Antonio Bernini Dipartimento di Matematica e Informatica U. Dini Università degli Studi
More informationPaths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns
Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola
More informationEnumerating Binary Strings
International Mathematical Forum, Vol. 7, 2012, no. 38, 1865-1876 Enumerating Binary Strings without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University Melbourne,
More informationCounting Palindromic Binary Strings Without r-runs of Ones
1 3 47 6 3 11 Journal of Integer Sequences, Vol. 16 (013), Article 13.8.7 Counting Palindromic Binary Strings Without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University
More informationA fast algorithm to generate necklaces with xed content
Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,
More informationPROBLEMS ON CONGRUENCES AND DIVISIBILITY
PROBLEMS ON CONGRUENCES AND DIVISIBILITY 1. Do there exist 1,000,000 consecutive integers each of which contains a repeated prime factor? 2. A positive integer n is powerful if for every prime p dividing
More informationBinomial coefficients and k-regular sequences
Binomial coefficients and k-regular sequences Eric Rowland Hofstra University New York Combinatorics Seminar CUNY Graduate Center, 2017 12 22 Eric Rowland Binomial coefficients and k-regular sequences
More informationMatrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano
Matrix compositions Emanuele Munarini Dipartimento di Matematica Politecnico di Milano emanuelemunarini@polimiit Joint work with Maddalena Poneti and Simone Rinaldi FPSAC 26 San Diego Motivation: L-convex
More informationA Recursive Relation for Weighted Motzkin Sequences
1 3 47 6 3 11 Journal of Integer Sequences, Vol. 8 (005), Article 05.1.6 A Recursive Relation for Weighted Motzkin Sequences Wen-jin Woan Department of Mathematics Howard University Washington, D.C. 0059
More informationCountable and uncountable sets. Matrices.
Lecture 11 Countable and uncountable sets. Matrices. Instructor: Kangil Kim (CSE) E-mail: kikim01@konkuk.ac.kr Tel. : 02-450-3493 Room : New Milenium Bldg. 1103 Lab : New Engineering Bldg. 1202 Next topic:
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationParity Dominating Sets in Grid Graphs
Parity Dominating Sets in Grid Graphs John L. Goldwasser and William F. Klostermeyer Dept. of Mathematics West Virginia University Morgantown, WV 26506 Dept. of Computer and Information Sciences University
More informationSOLUTIONS, what is the value of f(4)?
005 Georgia Tech High School Mathematics Competition Junior-Varsity Multiple-Choice Examination Version A Problem : If f(x) = x4 x +x x SOLUTIONS, what is the value of f(4)? (A) 6 (B) 70 (C) 78 (D) 8 (E)
More informationExhaustive generation for ballot sequences in lexicographic and Gray code order
Exhaustive generation for ballot sequences in lexicographic and Gray code order Ahmad Sabri Department of Informatics Gunadarma University, Depok, Indonesia sabri@staff.gunadarma.ac.id Vincent Vajnovszki
More informationq-counting hypercubes in Lucas cubes
Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI
More informationGenerating Functions
Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X
More informationCross-Bifix-Free Codes Within a Constant Factor of Optimality
4668 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 7, JULY 2013 Cross-Bifix-Free Codes Within a Constant Factor of Optimality Yeow Meng Chee, Senior Member, IEEE, Han Mao Kiah, Punarbasu Purkayastha,
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationACM106a - Homework 2 Solutions
ACM06a - Homework 2 Solutions prepared by Svitlana Vyetrenko October 7, 2006. Chapter 2, problem 2.2 (solution adapted from Golub, Van Loan, pp.52-54): For the proof we will use the fact that if A C m
More informationDynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction.
Microsoft Research Asia September 5, 2005 1 2 3 4 Section I What is? Definition is a technique for efficiently recurrence computing by storing partial results. In this slides, I will NOT use too many formal
More informationDiscrete Structures: Sample Questions, Exam 2, SOLUTIONS
Discrete Structures: Sample Questions, Exam 2, SOLUTIONS (This is longer than the actual test.) 1. Show that any postage of 8 cents or more can be achieved by using only -cent and 5-cent stamps. We proceed
More informationVisual cryptography schemes with optimal pixel expansion
Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di
More informationLEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS
Applicable Analysis and Discrete Mathematics, (008), 69 9 Available electronically at http://pefmathetfbgacyu LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS D Baccherini, D Merlini, R Sprugnoli We introduce
More informationCountable and uncountable sets. Matrices.
CS 441 Discrete Mathematics for CS Lecture 11 Countable and uncountable sets. Matrices. Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Arithmetic series Definition: The sum of the terms of the
More informationDiscrete Mathematics. Benny George K. September 22, 2011
Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and
More informationANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3
ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ISSUED 24 FEBRUARY 2018 1 Gaussian elimination Let A be an (m n)-matrix Consider the following row operations on A (1) Swap the positions any
More informationRings. EE 387, Notes 7, Handout #10
Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationThe Kth M-ary Partition Function
Indiana University of Pennsylvania Knowledge Repository @ IUP Theses and Dissertations (All) Fall 12-2016 The Kth M-ary Partition Function Laura E. Rucci Follow this and additional works at: http://knowledge.library.iup.edu/etd
More informationFast reversion of formal power series
Fast reversion of formal power series Fredrik Johansson LFANT, INRIA Bordeaux RAIM, 2016-06-29, Banyuls-sur-mer 1 / 30 Reversion of power series F = exp(x) 1 = x + x 2 2! + x 3 3! + x 4 G = log(1 + x)
More informationGENERALIZATION OF AN IDENTITY OF ANDREWS
GENERALIZATION OF AN IDENTITY OF ANDREWS arxiv:math/060480v1 [math.co 1 Apr 006 Eduardo H. M. Brietze Instituto de Matemática UFRGS Caixa Postal 15080 91509 900 Porto Alegre, RS, Brazil email: brietze@mat.ufrgs.br
More informationMULTI-RESTRAINED STIRLING NUMBERS
MULTI-RESTRAINED STIRLING NUMBERS JI YOUNG CHOI DEPARTMENT OF MATHEMATICS SHIPPENSBURG UNIVERSITY SHIPPENSBURG, PA 17257, U.S.A. Abstract. Given positive integers n, k, and m, the (n, k)-th m- restrained
More informationEFFICIENT COMPUTATION OF TERMS OF LINEAR RECURRENCE SEQUENCES OF ANY ORDER
#A39 INTEGERS 8 (28) EFFIIENT OMPUTATION OF TERMS OF LINEAR REURRENE SEQUENES OF ANY ORDER Dmitry I. Khomovsky Lomonosov Moscow State University, Moscow, Russia khomovskij@physics.msu.ru Received: /2/6,
More informationHMMT February 2018 February 10, 2018
HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationMATH 402 : 2017 page 1 of 6
ADMINISTRATION What? Math 40: Enumerative Combinatorics Who? Me: Professor Greg Smith You: students interested in combinatorics When and Where? lectures: slot 00 office hours: Tuesdays at :30 6:30 and
More informationExpected Number of Distinct Subsequences in Randomly Generated Binary Strings
Expected Number of Distinct Subsequences in Randomly Generated Binary Strings arxiv:704.0866v [math.co] 4 Mar 08 Yonah Biers-Ariel, Anant Godbole, Elizabeth Kelley March 6, 08 Abstract When considering
More informationThe part-frequency matrices of a partition
The part-frequency matrices of a partition William J. Keith, Michigan Tech Michigan Technological University Kliakhandler Conference 2015 August 28, 2015 A partition of an integer n is a sequence λ = (λ
More informationThe 4-periodic spiral determinant
The 4-periodic spiral determinant Darij Grinberg rough draft, October 3, 2018 Contents 001 Acknowledgments 1 1 The determinant 1 2 The proof 4 *** The purpose of this note is to generalize the determinant
More informationResearch Statement. Janine E. Janoski
Research Statement Janine E. Janoski 1 Introduction My research is in discrete mathematics and combinatorics. I have worked on a wide variety of research topics including, enumeration problems, eigenvalue
More informationInvolutions by Descents/Ascents and Symmetric Integral Matrices. Alan Hoffman Fest - my hero Rutgers University September 2014
by Descents/Ascents and Symmetric Integral Matrices Richard A. Brualdi University of Wisconsin-Madison Joint work with Shi-Mei Ma: European J. Combins. (to appear) Alan Hoffman Fest - my hero Rutgers University
More informationExam 2 Solutions. In class questions
Math 5330 Spring 2018 Exam 2 Solutions In class questions 1. (15 points) Solve the following congruences. Put your answer in the form of a congruence. I usually find it easier to go from largest to smallest
More informationCookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!
Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Steven J. Miller (MC 96) http://www.williams.edu/mathematics/sjmiller/public_html Yale University, April 14, 2014 Introduction Goals of the
More informationDefinitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch
Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary
More information1 Sequences and Summation
1 Sequences and Summation A sequence is a function whose domain is either all the integers between two given integers or all the integers greater than or equal to a given integer. For example, a m, a m+1,...,
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationConnections and Determinants
Connections and Determinants Mark Blunk Sam Coskey June 25, 2003 Abstract The relationship between connections and determinants in conductivity networks is discussed We paraphrase Lemma 312, by Curtis
More informationInteresting Examples on Maximal Irreducible Goppa Codes
Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical
More informationRanks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices
Operator Theory: Advances and Applications, Vol 1, 1 13 c 27 Birkhäuser Verlag Basel/Switzerland Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices Tom Bella, Vadim
More information7 Asymptotics for Meromorphic Functions
Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential
More information= = = = = =
PARTITION THEORY (notes by M. Hlynka, University of Windsor) Definition: A partition of a positive integer n is an expression of n as a sum of positive integers. Partitions are considered the same if the
More informationGenerating Functions of Partitions
CHAPTER B Generating Functions of Partitions For a complex sequence {α n n 0,, 2, }, its generating function with a complex variable q is defined by A(q) : α n q n α n [q n ] A(q). When the sequence has
More informationLimits at Infinity. Horizontal Asymptotes. Definition (Limits at Infinity) Horizontal Asymptotes
Limits at Infinity If a function f has a domain that is unbounded, that is, one of the endpoints of its domain is ±, we can determine the long term behavior of the function using a it at infinity. Definition
More informationArithmetic properties of lacunary sums of binomial coefficients
Arithmetic properties of lacunary sums of binomial coefficients Tamás Mathematics Department Occidental College 29th Journées Arithmétiques JA2015, July 6-10, 2015 Arithmetic properties of lacunary sums
More informationVisual Cryptography Schemes with Optimal Pixel Expansion
Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi
More informationELE/MCE 503 Linear Algebra Facts Fall 2018
ELE/MCE 503 Linear Algebra Facts Fall 2018 Fact N.1 A set of vectors is linearly independent if and only if none of the vectors in the set can be written as a linear combination of the others. Fact N.2
More informationIdentifying an m-ary Partition Identity through an m-ary Tree
Bridgewater State University Virtual Commons - Bridgewater State University Mathematics Faculty Publications Mathematics Department 06 Identifying an m-ary Partition Identity through an m-ary Tree Timothy
More informationNumeration Systems. S. E. Payne General Numeration Systems 2. 3 Combinatorial Numeration Numeration with forbidden substrings 14
Numeration Systems S. E. Payne 2010 Contents 1 General Numeration Systems 2 2 Greedy Representations 3 3 Combinatorial Numeration 13 4 Numeration with forbidden substrings 14 5 The dominant root of the
More informationCounting permutations by cyclic peaks and valleys
Annales Mathematicae et Informaticae 43 (2014) pp. 43 54 http://ami.ektf.hu Counting permutations by cyclic peaks and valleys Chak-On Chow a, Shi-Mei Ma b, Toufik Mansour c Mark Shattuck d a Division of
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University
More informationAlgebraic aspects of some Riordan arrays related to binary words avoiding a pattern
Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern D. Merlini and R. Sprugnoli Dipartimento di Sistemi e Informatica viale Morgagni 65, 5034, Firenze, Italia merlini@dsi.unifi.it,
More informationTC08 / 6. Hadamard codes SX
TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose
More informationMapping the Discrete Logarithm: Talk 2
Mapping the Discrete Logarithm: Talk 2 Joshua Holden Joint work with Daniel Cloutier, Nathan Lindle (Senior Theses), Max Brugger, Christina Frederick, Andrew Hoffman, and Marcus Mace (RHIT REU) Rose-Hulman
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationStochastic Realization of Binary Exchangeable Processes
Stochastic Realization of Binary Exchangeable Processes Lorenzo Finesso and Cecilia Prosdocimi Abstract A discrete time stochastic process is called exchangeable if its n-dimensional distributions are,
More informationOnline Computation of Abelian Runs
Online Computation of Abelian Runs Gabriele Fici 1, Thierry Lecroq 2, Arnaud Lefebvre 2, and Élise Prieur-Gaston2 1 Dipartimento di Matematica e Informatica, Università di Palermo, Italy Gabriele.Fici@unipa.it
More informationMATH4250 Game Theory 1. THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory
MATH4250 Game Theory 1 THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory Contents 1 Combinatorial games 2 1.1 Combinatorial games....................... 2 1.2 P-positions
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationMath/CS 466/666: Homework Solutions for Chapter 3
Math/CS 466/666: Homework Solutions for Chapter 3 31 Can all matrices A R n n be factored A LU? Why or why not? Consider the matrix A ] 0 1 1 0 Claim that this matrix can not be factored A LU For contradiction,
More informationAlgorithms: Background
Algorithms: Background Amotz Bar-Noy CUNY Amotz Bar-Noy (CUNY) Algorithms: Background 1 / 66 What is a Proof? Definition I: The cogency of evidence that compels acceptance by the mind of a truth or a fact.
More informationTo get horizontal and slant asymptotes algebraically we need to know about end behaviour for rational functions.
Concepts: Horizontal Asymptotes, Vertical Asymptotes, Slant (Oblique) Asymptotes, Transforming Reciprocal Function, Sketching Rational Functions, Solving Inequalities using Sign Charts. Rational Function
More informationThe distribution of run lengths in integer compositions
The distribution of run lengths in integer compositions Herbert S Wilf University of Pennsylvania Philadelphia PA 19104-6395, USA wilf@mathupennedu Submitted: Mar 7, 2010; Accepted: Oct 9, 2011; Published:
More informationBinomial Coefficient Identities/Complements
Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology
More informationChapter 2 Notes: Polynomials and Polynomial Functions
39 Algebra 2 Honors Chapter 2 Notes: Polynomials and Polynomial Functions Section 2.1: Use Properties of Exponents Evaluate each expression (3 4 ) 2 ( 5 8 ) 3 ( 2) 3 ( 2) 9 ( a2 3 ( y 2 ) 5 y 2 y 12 rs
More informationGeneralization of real interval matrices to other fields arxiv: v1 [math.ra] 15 Dec 2018
Generalization of real interval matrices to other fields arxiv:1812.07386v1 [math.ra] 15 Dec 2018 Elena Rubei Dipartimento di Matematica e Informatica U. Dini, viale Morgagni 67/A, 50134 Firenze, Italia
More informationApplications. More Counting Problems. Complexity of Algorithms
Recurrences Applications More Counting Problems Complexity of Algorithms Part I Recurrences and Binomial Coefficients Paths in a Triangle P(0, 0) P(1, 0) P(1,1) P(2, 0) P(2,1) P(2, 2) P(3, 0) P(3,1) P(3,
More informationChapter 2 Formulas and Definitions:
Chapter 2 Formulas and Definitions: (from 2.1) Definition of Polynomial Function: Let n be a nonnegative integer and let a n,a n 1,...,a 2,a 1,a 0 be real numbers with a n 0. The function given by f (x)
More informationRelations. We have seen several types of abstract, mathematical objects, including propositions, predicates, sets, and ordered pairs and tuples.
Relations We have seen several types of abstract, mathematical objects, including propositions, predicates, sets, and ordered pairs and tuples. Relations use ordered tuples to represent relationships among
More informationZero-sum square matrices
Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the
More informationNORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION
NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION 011-1 DISCRETE MATHEMATICS (EOE 038) 1. UNIT I (SET, RELATION,
More informationON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES. 1. Introduction
ON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES R. EULER and L. H. GALLARDO Abstract. We notice that some recent explicit results about linear recurrent sequences over a ring R with 1 were already
More informationRANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA
Discussiones Mathematicae General Algebra and Applications 23 (2003 ) 125 137 RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Seok-Zun Song and Kyung-Tae Kang Department of Mathematics,
More information3 Polynomial and Rational Functions
3 Polynomial and Rational Functions 3.1 Polynomial Functions and their Graphs So far, we have learned how to graph polynomials of degree 0, 1, and. Degree 0 polynomial functions are things like f(x) =,
More informationDefinition: Let S and T be sets. A binary relation on SxT is any subset of SxT. A binary relation on S is any subset of SxS.
4 Functions Before studying functions we will first quickly define a more general idea, namely the notion of a relation. A function turns out to be a special type of relation. Definition: Let S and T be
More informationA characterization of the set of lines either external to or secant to an ovoid in PG(3,q)
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 49 (011), Pages 159 163 A characterization of the set of lines either external to or secant to an ovoid in PG(3,q) Stefano Innamorati Dipartimento di Ingegneria
More informationExplicit formulas using partitions of integers for numbers defined by recursion
Explicit formulas using partitions of integers for numbers defined by recursion Giuseppe Fera, Vittorino Talamini, arxiv:2.440v2 [math.nt] 27 Feb 203 DCFA, Sezione di Fisica e Matematica, Università di
More informationOn the Decision Tree Complexity of String Matching. December 29, 2017
On the Decision Tree Complexity of String Matching Xiaoyu He 1 Neng Huang 1 Xiaoming Sun 2 December 29, 2017 arxiv:1712.09738v1 [cs.cc] 28 Dec 2017 Abstract String matching is one of the most fundamental
More information(k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2
#A20 INTEGERS 18 (2018) (k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2 Lerna Pehlivan Department of Mathematics and Statistics, Acadia University, Wolfville, Nova Scotia, Canada lerna.pehlivan@acadiau.ca
More informationMultiple coverings of the farthest-off points and multiple saturating sets in projective spaces
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in
More informationIntrinsic products and factorizations of matrices
Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences
More informationSymmetric configurations for bipartite-graph codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 63-69 Symmetric configurations for bipartite-graph codes Alexander Davydov adav@iitp.ru
More informationSection Summary. Sequences. Recurrence Relations. Summations. Examples: Geometric Progression, Arithmetic Progression. Example: Fibonacci Sequence
Section 2.4 1 Section Summary Sequences. Examples: Geometric Progression, Arithmetic Progression Recurrence Relations Example: Fibonacci Sequence Summations 2 Introduction Sequences are ordered lists of
More informationMath Circle: Recursion and Induction
Math Circle: Recursion and Induction Prof. Wickerhauser 1 Recursion What can we compute, using only simple formulas and rules that everyone can understand? 1. Let us use N to denote the set of counting
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract
More informationCombinatorial properties of the numbers of tableaux of bounded height
Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where
More informationON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,
More information