THE development of efficient and simplified bounding

Size: px
Start display at page:

Download "THE development of efficient and simplified bounding"

Transcription

1 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 ist ermutation invariant linear codes: Theory and Alications Kostis Xenoulis Abstract The class of q-ary list ermutation invariant linear codes is introduced in the current work along with robabilistic arguments that validate their existence when certain conditions are met. The secific class of codes is characterized by an uer bound that is tighter than the generalized Shulman-Feder bound and relies on the distance of the codes weight distribution to the binomial multinomial resectively one. The bound alies to cases where a code from the roosed class is transmitted over a q-ary outut symmetric discrete memoryless channel and list decoding with fixed list size is erformed at the outut. In the binary case, the new uer bounding technique allows the discovery of list ermutation invariant codes whose uer bound coincides with shere-acking exonent. Furthermore, the roosed technique motivates the introduction of a new class of uer bounds for general q-ary linear codes whose members are at least as tight as the DS bound as well as all its variations for the discrete channels treated in the current work. Index Terms Discrete symmetric channels, double exonential function, list decoding, ermutation invariance, reliability function. I. ITRODUCTIO THE develoment of efficient and simlified bounding techniques which aly to structured families of codes constitutes a maor research area in the field of coded communications. Their imortance lies in their ability to designate characteristics under which the roosed codes achieve low error decoding robability with rates close to the caacity of the considered channels. A vast maority of bounding techniques have been constructed for structured ensembles of codes over discrete and continuous channels, as it is reorted in the literature []. Their usefulness relies among others on their ability to aly to secific families as well as to fully random ensembles of codes. A classical reresentative of the class of these techniques, which alies to both categories of codes, is the generalized second version of the Duman-Salehi bound DS [, Section II.B]. For secific codes, many reorted bounds such as Shulman-Feder bound SF [3] for discrete memoryless channels and Divsalar bound [4] for binary inut additive Gaussian channels, consist secial cases of the DS bound. The latter can be alied to the fully random ensemble of codes and rovide Gallager s random coding theorem [5]. An interesting class of bounding techniques for the error decoding robability of secific codes is the one which enoys random coding characteristics, such as the SF bound and its This research has been co-financed by the Euroean Union Euroean Social Fund-ESF and Greek national funds through the Oerational Program Education and ifelong earning of the ational Strategic Reference Framework SRF - Research Funding Program: Aristeia I-5. The author is with the Deartment of Informatics and Telecommunications, ational and Kaodistrian University of Athens, Athens, Greece 5784, e- mail: kxen@di.uoa.gr generalized version, reorted in [, Aendix A]. The latter relates the coding exonent of nonrandom codes to the exonent deduced from the random coding analysis of Gallager [5]. Secifically, through the construction of an artificial ensemble of codes from a single block code, the difference between the error exonent of the secific code and the exonent of the random coding ensemble under maximum likelihood M decoding is revealed to be equal to a constant term. This term deends only on the weight sectrum of the code and its relation to the binomial multinomial distribution and not on the channel s characteristics. The imortance of the resented bounds lies on their close similarity to the shere acking lower bound [6] on the error decoding robability and its tightest versions for finite blocklengths, resented in [7] and [8] resectively. The urose of the current work is to rovide new tight uer bounds for the fixed size list error decoding robability, both in the sirit of the SF bound and its generalized version, that are able to aroach the shere-acking lower bound. Exonential error bounds and random coding exonents for list error decoding with variable list size have been established in [9] for the class of randomly constructed codes. Similar results under fixed-size list decoding were resently recently in [] for the class of fixed-comosition codes. Regarding secific codes, error erformance bounds under fixed-size listdecoding are rovided in [] and []. In [] the bounds secialize to linear codes and continuous outut channels and rely on the distances between the codewords on the list. On the other hand, [] focuses on the derivation of Gallagertye bounds both under variable and fixed size list decoding. The resented bounds are message indeendent for generalsymmetric channels and aly to both random and structured linear block codes or code ensembles. Regarding the case of structured code ensembles, the bounds resented in the current work are deloyed by relacing weighted sums of likelihood ratios in the DS technique as well as in the roof of the random coding theorem by double exonential functionals. We erform so in order to exloit the concave behavior of the double exonential function in the error decoding region of a code under fixed size list decoding and combine it with the random coding technique. To roceed further, the class of -list ermutation invariant linear codes is introduced. It is revealed that every member of the class enoys the same list error decoding robability for the transmission of coded information over discrete memoryless symmetric channels. The secific aroach constitutes a new design aradigm where the need for bounding techniques, that lead to tight closed-form uer bounds, enables the definition of a new class of codes. For a list ermutation invariant linear

2 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 code, the roosed bounding technique leads to tight uer bounds in relation to SF bound and its generalized version while it still relies on the similarity of the code s weight distribution to the binomial one. The analytic construction of members belonging to the revious class of codes constitutes a heavy comutational rocess since it relies on the satisfaction of certain roerties of a code s distance distribution matrix. evertheless, the robabilistic method [3] and secifically ovasz s ocal emma allows the roof of existence of such a class of codes and renders them as a useful tool in the calculation of the reliability function of discrete memoryless channels for certain coding rates. The double exonential technique, as described in the revious aragrah, is relative new and has aeared in [4]. In general, double exonential bounds have aeared in the analysis of error exonents for channels with feedback, such as in [5] and references therein, but are not related to the resented technique. The latter can also be alied to general q-ary linear codes leading to a tighter version of the DS bound. evertheless, it violates the need for simlified bounds since it requires the knowledge of fine details of a code s characteristics, such as the full coset weight distribution. The revious obstacle is circumvented by noting that the key ingredient of the DS bound is a weighted average of the sum of likelihood ratios of the code s codewords with resect to the transmitted one, and that this sum can be relaced with resective sums of horizontally fli sigmoid functions. The latter manage to smooth the effect of the erroneous decoding region in the calculation of the list error decoding robability and thus achieve a tradeoff between the desirable characteristics of bounding techniques. amely, the resented bounds are tighter than the DS bound while their evaluation does not require any extra knowledge in comarison to the DS bound. The resent aer extends the work in [4] with the introduction of the class of q-ary -list ermutation invariant linear codes and the analysis of the error erformance of its members under list decoding for transmission over q- ary discrete symmetric memoryless channels. Towards the extension of list ermutation invariant codes from binary to q-ary fields and in comarison to [4], a new definition of - list ermutation invariant codes is rovided in order to address a broader class of candidate codes. Even though the extension to the general q-ary case is straightforward, the derivation of an analytic error bound exression is rather comlicated. In what follows, Section II secifies the roerties underinning the class of -list ermutation invariant linear codes and resents a relaxed condition under which such codes aear to exist. Under this condition, subsection II-A validates the existence of ermutation invariant codes and enables the analysis of their list-error decoding robability, leading to the uer bounds resented in Sections III and III-A resectively. The class of ermutation invariant codes is utilized in Section IV to rovide the reliability function of binary symmetric channels for certain coding rates. Finally, a new class of bounding techniques is resented in Section V for general q-ary linear codes, while Section VI concludes the analysis by numerically comaring the develoed bounds for the new class of codes. II. PERMUTATIO IVARIACE et the transmission of an arbitrary set of messages M, with cardinality M, over a discrete memoryless q-ary outut symmetric channel, with the use of an, R linear code C defined over the finite field F q,,..., q }. Secifically, each message m [, M ] with M = q R, is encoded onto an length codeword c m Fq of C, where c is the all-zero codeword, and is transmitted over the symmetric channel described by the transition robability Pry c m, where y Fq the length sequence at the outut of the channel. During the transmission, each symbol of a codeword remains the same with robability, while it is changed to another of the remaining q symbols with robability /q. In the analysis that follows, we denote by d min the minimum Hamming weight of the linear code C and by S l,...,l q the number of codewords of C having a fixed tye [6, Ch. ] with l i occurrences of symbol i. Furthermore, we denote the weight distribution of a linear code C over F q as the sequence S k } k=d min where S k S l,...,l q. l +...+l q =k The translate set y C y c, c C} is called a coset of the linear code C, while the vector with the smallest Hamming weight in the aforementioned set is called a coset leader. The weights of the vectors in the coset y C define the weight distribution of the considered coset, while the largest weight of a coset leader equals the covering radius of C, denoted by C. The relative radius of C is defined resectively as r C C/. Definition : The distance distribution matrix Γ of a linear code C is defined as the K + matrix having as rows all the ossible K different coset weight distributions. The first row of Γ defines the weight distribution of C, while all other rows are identified by the weight of the coset leader coset weight. If the weight distribution of the coset of the received vector y belongs to the i-th row of the matrix, then y has t k= Γ i,k codewords within Hamming distance t. Furthermore, the -th column of Γ, [, ], denotes the number of codewords a vector y of Hamming weight i can have at exact Hamming distance. Considering list decoding is erformed at the outut of the channel with list size, the conditional error decoding robability given the transmission of message is Pe,C = Pry c, C y Y,C where Y,C y Fq : l i } i= } with Pry c li, C Pry c, C, l i. 3 Since the channel is memoryless and outut symmetric, the error decoding region Y,C is equivalently exressed as Y,C = y Fq : l i } i= } with wty c li wty, l i 4

3 XEOUIS: IST PERMUTATIO IVARIAT IEAR CODES 3 where wty denotes the Hamming weight of a q-ary vector y, with the resective algebra defined over the finite field F q. Moreover, if for λ,, we define as in [4] Ωy, C, λ, then, for every y Y,C it holds Pry c λ m Pry c m λ 5 f de Ωy, C, λ,, f de x ex ex x 6 and the error decoding robability Pe,C in is uer bounded for any λ, as Pe,C Pry c, Cf de Ωy, C, λ,. 7 y Y,C It is noted that Ωy, C, λ, is exactly the inverse of the exression used to bound the indicator function φ m y in [5, Eqs. 4,5]. If we roceed by extending the above sum over the set Fq, then we cannot easily exloit the concavity of the double exonential function. Thus we cannot average over the random ensemble of codes and emloy Jensen s inequality to roduce a random coding exonent. This is due to the fact that f de Ωy, C, λ, is concave with resect to Ωy, C, λ, only for y Y,C. To surass the revious obstacle and take advantage of the secial form of 7, we seek for a family of linear codes where each code has the same error decoding region Y,C. This motivates us to define the class of -list ermutation invariant linear codes. Definition : An, R linear code C with distance distribution matrix Γ is called -list ermutation invariant if both the following roerties are satisfied: : there exists a ositive integer w ot [ d min /, / such that and min w ot κ [,K] w= Γ κ,wot + 8 max w ot Γ k,w. 9 κ [,K] w= : For all κ [, K] there exists a wκ > w ot such that Γ κ,wot+ =... = Γ κ,w κ = and Γ κ,w κ +. In case =, we call the secific code M ermutation invariant. Examle : As an examle, we consider the ternary [3, 7, 5] quadratic-residue code of [7] with distance distribution matrix deicted in Table I. If we select w ot = d min / = 3, then for =, roerty is satisfied, since the sum of the columns before the 3-rd one is lower than or equal to. Furthermore, roerty is also satisfied since for every row, in columns 4 and 5 there is an element greater than. Consequently, the secific code is M ermutation invariant. With similar arguments, selecting w ot = 4 let us deduce that the secific code is also 6-list or 7-list or 8-list or 9-list or -list ermutation invariant. Relation max κ [,K],w<wot Γ k,w was used in [4, Def. ] instead of 9. TABE I DISTACE DISTRIBUTIO MATRIX Γ OF THE TERARY [3, 7, 5] QUADRATIC-RESIDUE CODE OF [7, TABE I] Remark : Proerty in fact guarantees that if a vector y of Hamming weight w ot d min /, which causes an -list decoding error, is ermuted then the ermuted vector still causes an -list decoding error. amely, consider a vector y of weight w ot that has Γ κ,wot codewords at exact Hamming distance w ot. Then, y will have w ot w= Γ κ,w codewords within distance w ot. Consider now a ermuted vector y of y and suose that it has Γ κ,w ot codewords at exact distance w ot where κ κ. Then according to 8, the ermuted vector of y will still have w ot w= Γ κ,w + codewords within Hamming distance. Furthermore, the secific roerty in 9 guarantees that all vectors of Hamming weight lower than w ot do not cause an -list decoding error. Regarding roerty, the latter ensures that all vectors y of Hamming weight greater than w ot do cause an error. Indeed, under the validity of 8, in every row of the matrix Γ, every sum of the elements of the resective row u to w for every w > w ot will be greater than +. As in [4], from an -list ermutation invariant linear code C we create an ensemble of linear codes E by considering all ossible osition ermutation codes PC. A PC code is constructed by multilying every codeword of C with a osition ermutation matrix P which has a single in every row and column and is orthogonal, PP T = P T P = I, where I is the identity matrix and P T the transose matrix of P. The ermutation ensemble E is utilized in order to rove the following roerty for an -list ermutation invariant linear code. emma : For an, R linear code C that is -list ermutation invariant, all codes in the osition ermutation ensemble E have the same error decoding region Y. Proof: The roof of the lemma follows the same line as in the roof of [4, emma ]. In articular, suose that in the original -list ermutation invariant code C the received vector is y Y,C where the weight distribution of the unique coset y C is Γ ν,w } w=. Due to the restriction imosed by condition, it must be wty w ot. Indeed, if wty < w ot, then according to 9 y will have at most codewords, not including the all zeros codeword c, within Hamming distance wty. Thus this y will not cause a list decoding error.

4 4 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 et such a received vector y Y,C with wty = w ot. Then y has w ot k= Γ ν,k codewords, different from c, within Hamming distance w ot. et, for any ermutation matrix P, the corresonding ermuted vector P T y of y Y,C. Vector PT y is also of weight w ot while the weight distribution of coset P T y C is denoted by Γ ξ,w } w=, where ξ does not necessarily equal ν. Since is selected as the minimum sum over all rows of Γ u to the w ot -th column minus and w ot w= Γ κ,w for all κ [, K] roerty, vector P T y also has codewords c li } i= of C, aart from the all-zeros codeword c, within distance wty = w ot, i.e. wt P T y c li wty, i [, ]. Thus P T y Y,C. Moreover, according to the revious inequality it is noted wty wt P T y c li = wt P P T y c li = wt y Pc li. The inequality resented in indicates that y also has codewords c li } i=, aart from c, of the ermuted code PC within distance wty. Hence, y Y,C causes a list decoding error in PC. Suose now that y Y,C with weight wty = w ν w ot, wκ ], for some ν [, K], and consider the weight distribution of the corresonding coset y C, Γ ν,w } w=. For any ermutation matrix P, the weight distribution of coset P T y C is denoted by Γ ξ,w } w=, where again ξ is not necessarily equal to ν. Then, due to roerty, vector P T y has Γ ξ,w ξ codewords of C, aart from c, at Hamming distance wξ w ν. Equality holds in the latter relation in case cosets y C and P T y C have the same weight distribution. Consequently, P T y Y,C, while the weight transformation guarantees that vector y also causes a list decoding error in the ermuted code PC. Finally, in all other cases where y Y,C and wty > w κ for all κ [, K], vector P T y w κ always has min κ [,K] w= Γ κ,w codewords of C within distance wty and thus P T y Y,C. The secific roerty stated in emma constitutes the main reason for defining the class of -list ermutation invariant codes. In articular, taking the average of both sides of 7 over the ermutation ensemble E we manage to change the order of summation with resect to Y,C and E. Since the double exonential function is concave over the subset Y,C, we are able to rovide an analytic tight bound for the secific codes, as shown in Section III. An easy to track set of necessary conditions for the definition of -list ermutation invariant linear codes is rovided next according to the following lemma. emma : et for a non-negative integer t < / d min / and a ositive integer s all of the following conditions be valid for a linear code C: i every vector y Fq of weight d min / + t has at least + codewords of C within distance d min / + t. ii every vector y Fq of weight w < d min / + t has at most codewords of C within distance w. iii each vector y Fq of weight at most C has at least + codewords of C within distance d min / + t + s. Then C is -list ermutation invariant. Proof: If according to Definition we select w ot = d min / + t, then due to the first statement of the current lemma, according to which every vector y has at least + codewords within distance d min / + t, roerty of Definition will be satisfied. This is due to the fact that the minimum of the elements of the d min / + t-th column of the distance distribution matrix Γ will be at least +. Moreover, according to the second statement, the sum of all rows of Γ u to the d min / + t-th column, will be at most. Furthermore, if the third statement of the lemma is satisfied, then for every row coset weight distribution of Γ there exists a column s ositions right to the d min / + t-th one, such that each vector y with weight u to the covering radius C has at least + codewords within distance d min / +t+s. Consequently, roerty of Definition is also satisfied. Remark : For t = the second statement of emma is trivial, since all vectors y with weight w < d min / have only the zero codeword within distance w. This is the case emloyed in the analysis next. Secifically, if for t = the fixed list size satisfies > S, S C+ d min/ +s k=d min S k where terms S k are rovided by, then C is -list ermutation invariant. Indeed, according to the first statement of emma, a codeword c, aart from the all-zeros one c, which is at Hamming distance at most d min / from a vector y of Hamming weight wty = d min /, should satisfy wtc d min /. The revious statement follows due to the revious assumtions and the Hamming distance inequality according to which Therefore, if we set wtc wty d min /. S d min/ k=d min S k then every vector y of weight d min / enoys at most S codewords within distance d min /. With similar arguments, one can deduce that the Hamming weight of each codeword c satisfying the third statement of emma is constrained to wtc C + d min / + s. Thus the maximum number of codewords a vector y of weight C has within distance d min / + s is S. Since C d min / [8], it holds S < S and consequently the validity of confirms the -list ermutation invariance roerty of the linear code C. A. Existence of -list ermutation invariant linear codes The construction of general -list ermutation invariant linear codes aears to be a rather difficult rocess, since it requires the analytic calculation of the distance distribution matrix Γ of the code. In what follows, with the aid of emma

5 XEOUIS: IST PERMUTATIO IVARIAT IEAR CODES 5 and for t =, we investigate the conditions under which such codes aear to exist. Theorem : et an, R linear code C satisfy for some ositive integer s min S q Hqδ H q rc, S q δ q Hqδ} e < 3 as PrA S S y F q wty= d min dmin VolBy, d min / q q d min q Hqδ q S q δ q Hqδ 6 where δ = d min / /, δ = d min / + s/ and S defined in. If [, S ] and / > max r C, δ }, then with ositive robability C is -list ermutation invariant. Proof: Consider an, R random linear code C over the field F q constructed by choosing R linearly indeendent vectors of length over F q. et By, r denote the Hamming ball with center y and radius r, i.e. By, r = y F q : wty y r} with volume VolBy, r. If H q denotes the entroy function H q log q log q, then the volume of the considered Hamming ball is uer bounded as VolBy, d min / q Hqδ. 4 et the following arametrized events, where the all-zeros codeword c is excluded: A l = B l = y F q, c i } l i= \ c : c i } l i= fall in a Hamming } ball By, d min / with wty = d min / y F q, c i } l i= \ c : c i } l i= fall in a Hamming } ball By, d min / + s where wty C. We are interested in uer bounding the following series of robabilities PrA l, B l for every l [, ], where events A l, B l are not necessarily disoint. It is easily deduced that PrA l, B l is a decreasing function with resect to l so that we concentrate on uer bounding PrA, B. Due to inequality PrA, B min PrA, PrB } 5 we examine searately the robabilities on the right hand side of the revious inequality. In what follows, we make use of the following argument stated in [9] and in the roof of [, Theorem 5.6]. amely, every set of distinct non-zero messages in Fq k contains a subset of at least l = log q messages which are linearly indeendent over F q. It is easily verified that such linearly indeendent l-tules are maed to l mutually indeendent codewords by a random linear code. For the event A, the resective robability is uer bounded by the robability there exists a y Fq with Hamming weight wty = d min / having l = log q = codeword c out of at most S codewords within Hamming distance d min /, according to Remark. The latter robability is uer bounded according to 4 and the union bound where we have made use of the following relation n q nhq n k. k In a similar manner, the investigated robability of the event B is uer bounded as PrB S q wty qhqδ wty q y:wty C S q Hqδ H q rc 7 where the above sum with resect to wty equals the volume of a Hamming ball with center the all-zero codeword c and radius C. It is reminded that r C is the relative covering radius of the C. Combing 5-7 we have PrA, B min S q Hqδ H q rc, S q δ q Hqδ}. 8 It is noted that each event A l B l, l [, ] deends on at most others, while the robability of each event is uer bounded by the right hand side of 8. Then according to the symmetric case of ovasz ocal emma [3, Corollary 5..], if 3 is satisfied, then with ositive robability, none of the events A l B l, l [, ] are valid, and thus the statements of emma when t = are satisfied. The range of linear codes which satisfy 3 is mainly constrained by the emloyment of 5 and the use of emma for t =. The latter rovide only sufficient conditions for a linear code to be ermutation invariant. Moreover, the roof of non-trivial existence results for t > requires the develoment of new bounds in the sirit of [9]. The latter relate the number of codewords of a linear code that fall in a Hamming ball with regard to the ball s radius. Remark 3: If a linear code C is -list ermutation invariant, then it is also M ermutation invariant according to Definition. Thus, one can rove the existence of an M ermutation invariant code ust by validating 3 for a code C with =. Remark 4: The ositive integer constant s incororated in 3 through δ affects the rate of the code C for which the latter is -list ermutation invariant. Indeed, since S, S < M = q R, the sufficient condition 3 of Theorem can be relaced by the most stringent inequality min q δ q Hqδ R, q Hqδ H q rc R } e <. 9

6 6 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 Furthermore, if C is binary q =, then 9 reduces to Hδ R e < since / > min r C, δ } δ under the assumtion of Theorem. It is worth mentioning that for large is aroximated for finite by R < R H δ. Rate R is comared next with the caacity of the binary symmetric channel C = H, where denotes the error transition robability of the channel. One can easily rove by simle differentiation that H λx λh x, λ < /x, is an increasing function with resect to x when λ < and a decreasing one when λ >. If H < H δ or < δ then R < C since H δ < H δ. Remark 5: For finite list size and infinite blocklength, one can still aly ovasz ocal emma since the latter alies to a finite number of events A l B l, l. This is not the case when list size, and thus the number M of messages is infinite, since one has to emloy arguments different from this of comactness, to rove the existence of an -list ermutation invariant linear code. evertheless, the revious case deserves further investigation since according to the discussion in [9, Subsection II.B] and the references therein, transmission rates very close to the caacity H q of discrete memoryless symmetric channels can be treated, in case is very large. III. ERROR PROBABIITY AAYSIS Due to the channel symmetry, the average error list decoding robability Pe with constant list size of any linear code C, over the set of messages M equals Pe [, Aendix A]. Furthermore, for each code in the constructed ermutation ensemble E, message is encoded onto the all zero-codeword c so that Pry c, C = Pry c is valid for all C E. Taking the mean value over the ensemble E on both sides of 7 and utilizing the error decoding invariance rincile of emma we have min Pry c E [f de Ω y, C, λ, ]. P e λ, y Y Due to the concavity of the double exonential function f de over y Y where Ωy, C, λ,, alication of Jensen s inequality leads to min Pry c f de E [Ω y, C, λ, ]. P e λ, y Y Alying again Jensen s inequality to the convex function /x, of Ω y, C, λ, in 5 gives the following uer bound for Pe : min Pry c P e λ, y Fq f de Pry c λ m [Pry c E m, C λ]. 3 The comactness argument is utilized successfully in the roof of [3, Theorem 5..] The mean value aearing in the denominator of the double exonent in 3 is with resect to all ossible ermutations of the original code C. We extend here the bound of [4] to the case where an, R -list ermutation invariant linear code C defined on the field F q is transmitted over a discrete memoryless q-ary outut symmetric channel. emma 3: The mean value in the denominator of f de x in 3 is uer bounded for all as: E [ Pr y c m, C λ] M P l +...+l q =l q x F q vl,...,l q Q P Q Pr y x + 4 after setting λ = / + P and = P, where l,...,l q q, li =, i [, q ] v l,...,l q otherwise P, Q, S l,...,l q M P + =. 5 Q The roof of the lemma above is rovided in Aendix A. The numerator in is the multinomial coefficient. We next aly emma 3 to the right hand side of 3 in order to obtain the following analytic exression for the uer bound of an -list ermutation invariant code. The roof of the theorem is given in Aendix B. Theorem : Consider the transmission of an arbitrary set of messages M over a q-ary symmetric channel with the use of an, R -list ermutation invariant linear code C with M = q R, defined over the finite field F q. Then the average -list error decoding robability, over all messages in M, Pe of C is uer bounded as Pe min l l,p l P α,q l,, f de 6 M F C P β,q, where [ α,q l,, l q [ β,q, + + q q q and F C P l +...+l q =l l ] + vl,...,l q ] + 7 q P P P. 8

7 XEOUIS: IST PERMUTATIO IVARIAT IEAR CODES 7 Remark 6: Parameter P in Theorem is noted to control the effect of the distance between the code s weight distribution and this of a fully random block code. Each term of the weight distribution of the latter code equals the multinomial coefficient. For q = the bound of Theorem reduces to the bound [4, Theorem, eq.3]. Remark 7: The analysis rovided in the roofs of emma 3 and Theorem can be used in order to exand the generalization of the Shulman-Feder bound rovided in [, Aendix A] to the non-binary case. Remark 8: If the fixed list size is selected so that S l,l,...,l q, l, l,..., lq } v l,...,l arg max q. 9 l,...,l q then the otimum value of P in the bound 6 of Theorem, as well as in the analysis of [, Aendix A] which leads to the generalized form of Shulman-Feder bound, is P ot =. Then, we have F C lim F v l,...,l CP = max q. 3 P + l,...,l q In the sequel, we consider the limiting case P +, since it simlifies the analysis. Remark 9: Suose that for very large, there exists an, R binary linear code C that is -list ermutation invariant. Then, C cannot be fully random, i.e. the distance sectrum equals the binomial distribution. Otherwise we could aly inequality ex exx /x to the right hand side of 6 of Theorem for transmission over a binary symmetric channel and get an uer bound over the list error decoding robability that is tighter than the lower bound on the resective error robability rovided in [6]. A. Refinement of the bound of Theorem The effectiveness of the bound in 6 for an -list ermutation invariant linear code C is mainly affected by its weight distribution and the relation of the latter to the multinomial distribution. Indeed, the larger term F C in the denominator of the double exonent of 6 is, the looser the secific bound of Theorem becomes for the outut symmetric discrete memoryless channels. At least numerically, the roosed bound is noted to be loose for binary linear codes which contain the all codeword there exists a codeword in which exactly one symbol from F q \ } is reeated times. This also aears to be the reason Shulman-Feder bound is loose for some codes. A linear code C will not contain a codeword in which exactly one symbol from F q \ } is reeated times if and only if there does not exist a row in the arity check matrix of C which sums u to zero modulo q, where F q = q. In case C is binary, the revious statement is equivalent to the nonexistence of a row in the corresonding arity check matrix with an even number of ones. In what follows, we utilize Gallager s first bounding technique in order to rovide a tight bound for the resented class of codes, which enoy at least one codeword of Hamming weight. We consider an -list ermutation invariant linear code C that satisfies the conditions of emma for a non-negative integer t < / d min / and a ositive constant s such that s + t < / d min /. If we set C b c C : k F q \ }, c i = k i [, ]} 3 the error decoding region Y,C defined in 3 is equivalently exressed as the union of the following set Y,C b = y F q : l i } i=, with some c li C b such that Pry c li, C Pry c, C, l i } 3 and its comlement Ŷ,C b, where every c / C b. Consider a y Y,C b so that there exists a c C b with c i = k, i [, ] satisfying according to 4 If we define wty c wty. 33 t k y i : y i = k} 34 then for the considered y Y,C b and the secific codeword c where c i = k it holds according to 33 q q t l y t k y t l y t y t k y 35 where it is noted q t l y =, l= q t l y = wty. 36 l= In the secial case of F =, }, it holds and 35 gets the form t y = wty, t y = wty wty. Under the revious analysis and notations, the subset defined in 3 is equivalently exressed as Y,C b = y F q : l i } i= Pry c li, C Pry c, C, l i and t y t k y for some k F q \ }}. 37 Then the error robability P e P e Pry Ŷ,C b c + Pr is uer bounded as t y t k y} c 38 q k= where for y Ŷ,C b, t y > t k y, k F q \}. Due to the memoryless nature of the treated channels, the second term of the sum in the right hand side of 38 satisfies Pr = q q t y t k y} c = Pr t y t k y c k= q / k= l = q i= li= l l k l k= l,..., l q q Pri li 39 i=

8 8 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 where l i stands for the number of times symbol i aears in sequence y. Under the assumtion that the discrete memoryless channels are symmetric, the innermost sum in the right hand side of 39 equals l q l q i= li= l l k l. l,..., l k,..., l q Due to counting arguments it holds for every k Prt y t k y = Prt y t y. Thus 39 gets the form Pr q t y t k y} c = q k= or equivalently Pr q / l = q l q i= li= l l l t y t k y} c = q k= / l = l, where q l Û l, q = l l l,l q l l, q > l l,..., l q Û l l. 4 Regarding the first term of the sum in the right hand side of 38, the event y Ŷ,C b is equivalent to the statement that none of the codewords, that cause a list decoding error when y is the received sequence at the outut of the channel, belong to the set C b, defined in 3. Excluding set C b from the codewords that may cause a list decoding error does not alter the -list ermutation invariance roerty of the considered code C. Thus one can directly aly emma and the bounding technique that leads to Theorem to the first term of the sum in the right hand side of 38. Indeed, consider a vector y of Hamming weight w [w ot, / and let all codewords c such that wty c = wty = w i.e. we examine the articular column w of the code s distance distribution matrix Γ. Suose also there exists a c C b such that wty c = wty or equivalently there exists a k F q \ } where according to 34 and 36 it holds t y = t k y with t y = wty, q t k y = wty t l y or equivalently wty = + q t l y. l= l k l= l k Under our initial assumtion wty < /, the relation above and the set definition of Y,C b in 37 we deduce that there cannot exist a codeword c C b such that y Y,C b. Thus the exclusion of the set C b from the error decoding region Y does not alter the first / columns of the distance distribution matrix Γ. Consequently, C is still an - list ermutation invariant code. Indeed the first two conditions of emma 4 are satisfied, and this is also the case with the third one, since we have assumed s < / d min /. In accordance with Theorem the following lemma holds true. emma 4: Under the same assumtions of Theorem, the average -list error decoding robability, over all messages in M, Pe of an -list ermutation invariant linear code C, that satisfies conditions of emma for a non-negative integer t < / d min / and a ositive constant s such that s+t < / d min /, is uer bounded as P e min l l l f de M / l = Û l l α,q l,, ˆF C β +,q, l 4 q where functions α,q, β,q are defined in 7, Û l is defined in 4 and ˆF C v l,...,l max q. 4 l,...,l q l i<, i [,q ] Remark : The symmetric channel behavior encountered in the bounds of the current section is catured by the generic notions of symmetry in [] and []. In order to aly the double exonential technique to such symmetric channels, code structures different from the Hamming distance distribution matrix of Definition have to be considered, while artificial ensembles, ossibly different from the ermutation one, must be constructed. On the other hand the new bounds cannot be directly alied to non-symmetric channels. The lack of channel symmetry, as defined in the current work, revents from treating only the transmission of the all-zeros codeword c in the calculation of the error decoding robability. Furthermore, the ermutation invariance roerty as described in emma, is not necessarily reserved. Thus for the transmission of each message, we have to consider the largest error decoding region within the class of ermuted codes for the secific message, in order to aly the double exonential technique. The latter method is exected to lead to a loss of erformance in the deduced error bounds. IV. O THE REIABIITY FUCTIO OF BIARY MEMORYESS SYMMETRIC CHAES Through the alication of inequality f de x /x to the right hand side of 6, the list error decoding robability of an -list ermutation invariant linear code C satisfies for any

9 XEOUIS: IST PERMUTATIO IVARIAT IEAR CODES 9 where P e ex max Eo, q E o, q = ln q + ln R ln [ q + ln F } C q ] The domain of arameter in 43 motivates the quest for secific cases under which the revious bound aroaches from above and for very large block length the shere acking lower bound [6] on list decoding error robability for discrete memoryless symmetric channels. The latter bound is exressed as [ ex E o, q P e R ln O ]} + O 45 where is the otimum that maximizes the exonent in the right hand side of 45 and O = ln 8 + q ln 8, O = ln e + ln 8 min. Term min exresses the minimum transmission robability of a symbol. For the q-ary symmetric channel it holds min = /q. Under the scoe of 43 and 45 and the restriction that the fixed list size remains finite according to Remark 5, we are interested in investigating the existence of, R - list ermutation invariant linear codes for which F C in 3 is ln F C = o, where o/ aroaches as becomes large. In this way, we are able to rovide the reliability function of discrete memoryless symmetric channels for these rates under which Theorem is valid. In the current work, we restrict 3 to binary codes. Mimicking the arguments of [, Section II], we construct a random ensemble of, R binary linear codes by selecting indeendently, with the same robability each of the bits of the R lines of the generator matrix. In what follows, we denote by Dξ ξ the Kullback- eibler distance Dξ ξ ξ log ξ ξ + ξ log ξ ξ 46 while a. = b is used to denote the asymtotic exonential equivalence of terms a, b with resect to, as this is defined in [, Section II.A]. The weight distribution S ξ of an, R tyical binary linear block code from the 3 The main reason for not addressing non-binary codes in the current section is the fact that for very large blocklengths, one can only show code existence results with characteristics similar to these stated in 47. Thus a non-binary -list ermutation invariant linear code does not necessarily ossess a normal-like weight distribution for very large. linear code ensemble satisfies for very large and for every ɛ >.= R D ξ S, ξ ξ ξ R ɛ 47 =, ξ ξ R + ɛ where ξ R is the minimum distance of the code 4 rovided by the solution of Dξ R = 48 with resect to ξ. onbinary linear codes with weight distribution characteristics similar to these of 47 also aear in [3, Section 4]. Furthermore, the robability of an, R random linear code C over F with F being exonential large of order O is uer bounded as Pr F C e O Pr ξ : S ξ R D ξ +O. 49 The above relation is easily deduced with the aid of definitions in 5 and 3 resectively, if we emloy the following relations for very large Pr F C e O = and Pr Pr max <l ξ : S ξ S l R e O l R+O ξ Hξ o, D ξ = H ξ. ξ Combining 47 with 49, it is concluded that for very large the robability in the right hand side of 49 aroaches and thus a tyical linear code C from the random linear code. ensemble has ln F C = o. With the aid of 47 and Theorem, we examine the existence of codes from the linear code ensemble that are -list ermutation invariant. In articular, in the asymtotic blocklength regime, arameters S and S defined in and resectively satisfy in accordance with 47 for finite values of arameter s >, S. = ξ R R D + rc, S =. 5 Relacing 5 in Theorem, the sufficient condition 3 for the -list ermutation invariance roerty of a linear code satisfies equivalently min [ H ξ R ξ R H rc+d + rc ] R, [ ξ ]} R H < e. 5 4 In the asymtotic blocklength regime, linear codes C with rate R and relative minimum distance ξ R < / for which 48 is not valid do not exist.

10 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 It is noted that the necessary condition < S of Theorem, which enables the alication of ovasz ocal emma to the finite case, is satisfied since we consider finite list sizes, while S is exonentially large according to 5. Consequently, 5 is exressed with the aid of relation Dx / = H x as max D ξ R + D ξ R H r C R, H ξ R + r C } >. 5 Proosition : For all code rates R and relative covering radius r C under which 5 is valid, the reliability function of binary memoryless symmetric channels is rovided by shere-acking exonent ER su E o, R where E o, is given by 44. The calculation of the relative covering radius r C of a linear code C in the asymtotic blocklength regime is difficult and thus we resort to bounds that rovide sufficient conditions under which 5 is valid. As an examle, we consider the redundancy bound of [4, Proosition ] for a binary linear code C according to which r C R. The Kullback- eibler distance Dξ in 46 as well as Hξ are decreasing with resect to ξ. Thus, in case ξ R + R or R + ξ R 53 we have ξ R + r C and consequently 5 holds true for code rates R for which the following function 5 fr max D ξ R + D R ξ R } H R R, H ξ R 54 is strictly ositive. The secific function is illustrated in Fig. for those code rates R which satisfy 53. amely, for R.5475, fr is strictly ositive and monotonically increasing. Therefore, for all code rates R.5475 there exists a resective -list ermutation invariant binary linear code, whose error decoding robability coincides with shereacking lower bound. The revious rate region does not necessarily coincide with the critical region [5, eq ] for which the reliability function of the binary symmetric channel is known. For examle, let the binary symmetric channel with error transition robability =.5. Then, the reliability function of the channel equals su [,] E o, R for all rates R [R c 5 3, H 5 3 ], where R c is the critical rate of the channel given as R c log + + log + log In the binary case, Dx / and H x are symmetric around /. Thus D x / = Dx / and H x = H x. fr code rate R Fig.. Examination of the ositiveness of fr in 54 for code rates R which satisfy 53. Proosition extends the revious region to [.5475, H 5 3 ] since R c 5 3 = The roof of existence of -list ermutation invariant linear codes of finite blocklength with error decoding robability close to imroved shere acking bounds of [7] and [8] deserves further investigation as it requires an analytic construction rocess. In general, the roosed bound 43 is able to aroach the shere-acking bound 45 since the otimization arameter, that controls the magnitude of the sum of likelihood ratios /Ωy, C, λ, for a vector y, is not constrained to [, ]. To achieve this, secial structure is imosed on the examined codes as well as the artificially constructed ensembles, so that emma becomes valid and arameter ln F C in 8 is of order o. One can argue that the double exonential function substitutes in mitigating the effect of large values in E[/Ωy, C, λ, ] and thus can be greater than. V. COMPARISOS WITH PREVIOUS BOUDS: A EW CASS OF BOUDIG TECHIQUES The bounding technique which is resented in Section II and leads to bound 7 can be alied to general linear codes with no articular restrictions, such as list ermutation invariance. The resulting bound aears to be tighter than the DS bound for list decoding, but its comutability comes at the extra cost of requiring in-deth knowledge of the code s characteristics. Indeed, if we extend the sum in 7 over the set Fq, the average list error decoding robability of the linear code C over the set of messages M is uer bounded as P e min λ, y Fq f de Pry c Pry c λ. 56 m Pry c m λ

11 XEOUIS: IST PERMUTATIO IVARIAT IEAR CODES P e min λ, [,] g y:,} R g + g d r= d r g d=d min S d d g + g d r r λr d g fde. 63 Since the treated channels are memoryless and symmetric, we have in line to the roof of Theorem Pry c λ m Pry c m λ = q m λwty cm wty. 57 Furthermore, for a fixed y Fq, sequence wty c m } M m= equals the weight distribution of the coset that y belongs to, and is given by the iy-th row of matrix Γ according to Definition. Thus the right hand side of 57 equals λl wty Γ iy,l. 58 q If for each row i of the coset weight distribution matrix Γ we grou together those vectors y Fq of the same weight w and denote their number by Γ w i,l, the uer bound of 56 on Pe is exressed due to and the reasoning that leads to 88 in Aendix B as K w Pe min Γ w i,l λ, w q i= w= f de λl w Γ i,l. 59 q The DS bounding technique for discrete memoryless channels can be alied to the right hand side of 56 and thus lead to a bound similar to 59, which is tighter than the classical DS bound for list decoding. evertheless, its calculation requires details sequences Γ i,l and Γ w i,l about the structure of the linear code C, which are finer than these required for the exact calculation of error decoding robability. The above discussion identifies the difficulties in the exloration of new efficient bounding techniques, which rovide bounds tighter than the ones mentioned in the literature []. Identifying the order of summation in 56 with resect to y Fq and m [, M ] as the main reason that leads to the extremely comlicated bound 59, we are able to circumvent the revious difficulties and rovide a new tight bound. Thus, instead of following the analysis of 3-6, we note from 3 that for λ, if y Y,C, m λ Pry c f de. 6 Pry c m If we combine 6 with, we get the following bound on the error decoding robability for the secific linear code C Pe min Pry c λ, y Fq m λ Pry c f de Pry c m 6 where the sum with resect to y is exanded from Y,C to Fq. It is noted here that a direct comarison between 6 and the bound of 7 with the sum extended over Fq is not straightforward. Alying the DS bounding technique [, Sec. II.B] to the right hand side of 6 under the assumtion, we get for a non-negative un-normalized tilting measure G y Pe min λ G y Pry c [,] y Fq m y Fq Pry c G y fde Pry c Pry c m λ. 6 Due to inequality f de x /x, it follows that the right hand side of 6 is tighter than the classical DS bound and all its modifications related to Shulman-Feder bound, as reorted in [6] and []. In what follows we rovide an exression for the tight bound of 6 in the case of binary memoryless outut symmetric channels with F =, }, and G y = i= g y i for a ositive function g y :, } R. The general alhabet case is more comlicated and is rovided in Aendix C. The analysis for binary inut ternary outut has recently aeared in [7]. Theorem 3: Consider the transmission of a set of messages M with cardinality M with the use of an, R binary linear block code C over a binary symmetric channel with error transition robability. If the weight distribution of C is rovided by the sequence S d } d=d min where d min is the minimum distance of the code, then the average list decoding error robability over M is uer bounded as shown by 63 at the to of the current age. Proof: The base of the first term of the roduct in the right hand side of 6, which is raised to the ower, deends only on the transmitted codeword c and equals according to the assumtions of the theorem y F q G y Pry c = i= y i F q i= g y i Pry i =

12 IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 g y i Pry i = g y Pry y i F q y F q i= = g + g. 64 For the second term of the roduct in the right hand side of 6, we treat each term of the sum with resect to m searately. Secifically, consider a secific codeword c m of C with Hamming weight d and let the subsets I m and I m consist of the ositions in the sequence c m where symbols and aear resectively, so that I m = d and I m = d. Then, the double exonent in the right hand side of 6 satisfies λ Pry c = Pry c m i I m λ Pryi 65 Pry i and is indeendent of the ositions i I m. Thus, we have λ Pry c G y Pry c fde = Pry c m y Fq Pry i g y i i I m y i F q i I m Pry i g y i fde i I m Pryi Pry i i I m y i F q i I m λ. 66 The first roduct in the right hand side of 66 satisfies d = y F q Pry g y g + g d. 67 For the second term of the roduct in the right hand side of 66 consider a secific value of the subsequence y i } i I m which consists of r symbols and d r symbols. For this value, the resective summand in the examined term of the roduct amounts to d r r Pr g Pr g Pr λd r Pr f de Pr Pr λr d r g fde q = λr λd g r. 68 Since the right hand side of 68 is noted to deend only the Hamming weight r of the subsequence y i } i I m, d r subsequences contribute in the manner of 68 in the sum of the second term of the roduct in 66 and thus the latter sum equals d r= d r g d r r g λr λd f de.69 q The roof of the theorem is now comlete if in 6 we substitute 64 as well as the result of the combination of 69 with 67 along with the note that the roduct of these two terms is related to the codeword c m only through it s Hamming weight d. Remark : If we aly inequality f de x /x to the right hand side of 63, then one gets the DS bound for the binary symmetric channel. Indeed, if we set γ C g + g γ C, d g + g then we have P e γc d=d min S d γ C, d λd λd d d r= d r d r r λ g λ g = γ S d γ C, d λd λd d=d min d λ g + λ g = γ C S d γ C, d d=d min d λ λ g + λ λ g. Remark : Due to concavity of x, [, ], the bound of Theorem 3 can be alied to random ensembles of codes, where the average weight distribution is easier to calculate than in the stand-alone case. Remark 3: Comaring the double exonential function f de x with f x /x for x >, as illustrated in Fig., f de x is noted to mitigate the effect of codewords c m in the sum 6 for which the likelihood ratio Pry c / Pry c m < wty c wty < resectively for a given y Fq. The question whether a horizontally fli sigmoid function different from the double exonential function and strictly lower than or equal to f x can be emloyed in the DS bounding technique naturally arises. Sigmoid functions interreted as cumulative distribution functions of continuous robability functions aear to be good candidates. In the sequel we consider the normalized horizontally fli sigmoid f x erfc.5e x 7 erfc.5 deicted in Fig., where erfcx = π x e z dz. The scaling factor.5 is selected so that f x is as close as ossible to f x in the region close to. We refer to the uer bound 63 where f de x is relaced by f x as 63-erfc. It is noted that f x is slightly larger than f x in the region

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Dedicated to Luis Caffarelli for his ucoming 60 th birthday Matteo Bonforte a, b and Juan Luis Vázquez a, c Abstract

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

HAUSDORFF MEASURE OF p-cantor SETS

HAUSDORFF MEASURE OF p-cantor SETS Real Analysis Exchange Vol. 302), 2004/2005,. 20 C. Cabrelli, U. Molter, Deartamento de Matemática, Facultad de Cs. Exactas y Naturales, Universidad de Buenos Aires and CONICET, Pabellón I - Ciudad Universitaria,

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

A construction of bent functions from plateaued functions

A construction of bent functions from plateaued functions A construction of bent functions from lateaued functions Ayça Çeşmelioğlu, Wilfried Meidl Sabancı University, MDBF, Orhanlı, 34956 Tuzla, İstanbul, Turkey. Abstract In this resentation, a technique for

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Location of solutions for quasi-linear elliptic equations with general gradient dependence

Location of solutions for quasi-linear elliptic equations with general gradient dependence Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO ANDREW GRANVILLE, DANIEL M. KANE, DIMITRIS KOUKOULOPOULOS, AND ROBERT J. LEMKE OLIVER Abstract. We determine for what

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s,

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s, MATH 50: THE DISTRIBUTION OF PRIMES ROBERT J. LEMKE OLIVER For s R, define the function ζs) by. Euler s work on rimes ζs) = which converges if s > and diverges if s. In fact, though we will not exloit

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

On Z p -norms of random vectors

On Z p -norms of random vectors On Z -norms of random vectors Rafa l Lata la Abstract To any n-dimensional random vector X we may associate its L -centroid body Z X and the corresonding norm. We formulate a conjecture concerning the

More information

A note on the random greedy triangle-packing algorithm

A note on the random greedy triangle-packing algorithm A note on the random greedy triangle-acking algorithm Tom Bohman Alan Frieze Eyal Lubetzky Abstract The random greedy algorithm for constructing a large artial Steiner-Trile-System is defined as follows.

More information

Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs

Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Conversions among Several Classes of Predicate Encrytion and Alications to ABE with Various Comactness Tradeoffs Nuttaong Attraadung, Goichiro Hanaoka, and Shota Yamada National Institute of Advanced Industrial

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at A Scaling Result for Exlosive Processes M. Mitzenmacher Λ J. Sencer We consider the following balls and bins model, as described in [, 4]. Balls are sequentially thrown into bins so that the robability

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

1 Extremum Estimators

1 Extremum Estimators FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT ZANE LI Let e(z) := e 2πiz and for g : [0, ] C and J [0, ], define the extension oerator E J g(x) := g(t)e(tx + t 2 x 2 ) dt. J For a ositive weight ν

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

arxiv: v1 [quant-ph] 3 Feb 2015

arxiv: v1 [quant-ph] 3 Feb 2015 From reversible comutation to quantum comutation by Lagrange interolation Alexis De Vos and Stin De Baerdemacker 2 arxiv:502.0089v [quant-h] 3 Feb 205 Cmst, Imec v.z.w., vakgroe elektronica en informatiesystemen,

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

SCHUR S LEMMA AND BEST CONSTANTS IN WEIGHTED NORM INEQUALITIES. Gord Sinnamon The University of Western Ontario. December 27, 2003

SCHUR S LEMMA AND BEST CONSTANTS IN WEIGHTED NORM INEQUALITIES. Gord Sinnamon The University of Western Ontario. December 27, 2003 SCHUR S LEMMA AND BEST CONSTANTS IN WEIGHTED NORM INEQUALITIES Gord Sinnamon The University of Western Ontario December 27, 23 Abstract. Strong forms of Schur s Lemma and its converse are roved for mas

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information