2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

Size: px
Start display at page:

Download "2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes"

Transcription

1 2000 IEEE. Persoal use of this material is permitted. However, permissio to reprit/republish this material for advertisig or promotioal purposes or for creatig ew collective works for resale or redistributio to servers or lists, or to reuse ay copyrighted compoet of this work i other works must be obtaied from the IEEE.

2 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH [7] K. Iwata, M. Morii, ad T. Uyematsu, A efficiet uiversal codig algorithm for oiseless chael with symbols of uequal cost, IEICE Tras. Fudametals, vol. E80-A, o. 11, pp , Nov [8] R. M. Krause, Chaels which trasmit letters of uequal duratio, Iform. Cotrol, vol. 5, pp , [9] I. Csiszár ad J. Körer, Iformatio Theory, Codig Theorems for Discrete Memoryless Systems. New York: Academic, [10] T. S. Ha, Theorems o the variable-legth itrisic radomess, to be published. A New Recursive Uiversal Code of the Positive Itegers Hirosuke Yamamoto, Member, IEEE Abstract A ew recursive uiversal code of the positive itegers is proposed, i which ay give sequece ca be used as a delimiter of codeword while bit 0 is used as a delimiter i kow uiversal codes, e.g., Leveshtei code, Elias code, Eve Rodeh code, Stout code, Betley Yao code, etc. The codeword legth of the proposed code is shorter tha log i almost all of sufficietly large positive itegers although the kow codes are loger tha log for ay positive iteger. Idex Terms Elias code, log-star fuctio, uiversal code of positive itegers, uiversal codig. I. INTRODUCTION May researchers have treated the uiversal codig of the positive itegers that satisfy P () P ( +1); for ay 2N; (1) where P () is a probability distributio o the set of positive itegers N f1; 2; 3; 111g [1] [7]. These codes ca be used practically i various adaptive dictioary codes [8]. Besides the practical uses, it is a iterestig codig problem to cosider how efficietly we ca ecode the positive itegers uder the prefix coditio. Let log k 2 be the k-fold compositio of the fuctio ad let log 3 2 be log log logw () 2 (2) where w 3 () is the largest iteger w which satisfies log w 2 0. The, it is show theoretically that ay positive iteger ca be represeted with log w3 () bits if < e [2], [3]. O the other had, may researchers, e.g., Leveshtei [2], 1 Elias [4], Betley Yao [5], Eve Rodeh [6], Stout [7], etc., have proposed log 3 -type codes with a recursive structure to attai high performace i large. But, i their codes, codeword legth l() caot become shorter tha log2 3 although it satisfies l() log3 2 + w3 () +c where c is a costat. Mauscript received Jue 4, 1998; revised July 23, The material i this paper was preseted i part at the 1998 IEEE Iteratioal Symposium o Iformatio Theory, MIT, Cambridge, MA, August 16 21, The author is with the Departmet of Mathematical Egieerig ad Iformatio Physics, Uiversity of Tokyo, Hogo, Bukyo-Ku, Tokyo , Japa ( yamamoto@hy.t.u-tokyo.ac.jp). Commuicated by N. Merhav, Associate Editor for Source Codig. Publisher Item Idetifier S (00) I this correspodece, we propose a ew log 3 -type code with a recursive structure, which satisfies that l() log (1 0 20f )w 3 f () +c f eve i the worst cases ad l() log (1 + (1 0 20f ))w 3 f () +c f i the best cases. Here, f is a parameter of the code ad c f is a costat which depeds o f. wf 3 () is a similar fuctio to w3 (), which satisfies wf 3 () w 3 (). Sice the best ad worst cases occur at ifiitely may s, ad, roughly speakig, l() is distributed uiformly betwee two extreme cases, l() ca become shorter tha log2 3 i large parts of itegers. I Sectio II, we review Elias! code, which is a typical oe of the kow log 3 -type codes, ad we show the reaso why the codeword legth caot become shorter tha log2 3 i the kow codes. To overcome this defect, we devise a ew represetatio of biary umbers that ever has a give sequece as a prefix. I Sectio III, we propose a ew recursive uiversal code of the positive itegers based o the ew biary umber represetatio ad we evaluate the performace of the proposed code theoretically. It is show that the codeword legth of the proposed code is shorter tha log2 3 i almost all of sufficietly large positive itegers. The case of r-ary uiversal codes are treated i Sectio IV. We use the followig otatio i this correspodece. [] r is the ordiary r-ary umber of positive iteger such that the most sigificat digit of [] r is ozero. [] i r is the ordiary r-ary umber of with i digits. btc is the largest iteger ot exceedig t. Examples: [14] ; [14] ; [14] 3 112; [14] ; b 14c 3. II. NEW BINARY NUMBER REPRESENTATION EXCLUDING A FORBIDDEN PREFIX Elias! code C E () has the followig recursive structure [4]: C E( 0)[ K ] 2[ K01] [ 1] 2[ 0] 20 (3) where [] 2 is the ordiary biary umber of, the most sigificat bit (MSB) of which is always oe. Each k i (3) is determied recursively by k b k01 c. I other words, k +1represets the bit legth of [ k01 ] 2. The recursio i (3) stops whe the legth of [ K ] 2 is two. Fially, bit 0 is attached as a delimiter to idicate the ed of C E ( 0 ). 2 I the decodig, K is obtaied from the first two bits of C E ( 0 ), ad the legth of [ k01 ] 2 is recursively obtaied from k. Sice the MSB of every [ k ] 2 is 1, delimiter 0 ca stop the recursio ad [ 0 ] 2 ca easily be foud. Leveshtei W 2 code [2], Eve Rodeh code [6], ad Stout code [7] have similar structures ad their codes also use bit 0 as a delimiter i the same way as Elias! code. Leveshtei W 0 2 code [2] ad Betley Yao search-tree code [5] have a little differet structure. However, it is kow that their code ca be derived from Elias! like code by gatherig the MSB s of all [ k ] 2 ad delimiter 0 as a prefix. 1 Leveshtei code is the first log -type code although Elias! code is famous. 2 1 is the exceptio case, for which the codeword is defied as C (1) /00$ IEEE

3 718 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 We ote that the MSB of each [ k ] 2 is always 1. This meas that the MSB has o iformatio, or it is a redudat bit. But this redudat bit caot be omitted because the MSB is used to distiguish the delimiter 0. Sice each legth of [ k ] 2 is give by b k c +1 that is larger tha k, the codeword legth caot become shorter tha log 3 2 i the kow recursive codes of the positive itegers. The above ote suggests that if we use some sequece with legth f > 1, istead of 0, as a delimiter, the some of the redudat bits may be saved from a codeword. Whe 0 is used as a delimiter, the prefix, i.e., the MSB 1, of each [ k ] 2 does ot coicide with the delimiter 0. Hece, if we use a sequece [a] f 2, which is the ordiary biary umber of iteger a with f bits, as a delimiter, the we must devise a ew biary umber represetatio of the itegers, say B a; f (), such that the prefix of B a; f () does ot coicide with delimiter [a] f 2. Cosider biary sequeces whose legth is less tha j bits. The, the total umber of such biary sequeces is give by j01 2 j 0 2 while the umber of the biary sequeces with prefix [a] f 2 is give by j010f 2 j0f 0 1 if j 0 1 f or 0 if j f. This meas that the umber of biary sequeces ot havig prefix [a] f 2 is give by 2 j 0 2 (j0f) 0 1 for ay j 1 ad f 1, where (t) + is defied as TABLE I EXAMPLES OF B () AND ~B () (t) + maxft; 0g: (4) Hece, B a; f () ca be represeted by the followig formula: B a; f () where [ 0 M 2(j; f)] j 2 ; if M 2 (j; f) <M 2 (j; f) +N 2 (j; f; a); [ 0 M 2 (j; f 0 1)] j 2 ; if M 2(j; f) +N 2(j; f; a) <M 2(j +1;f) (5) M 2(j; f) 2 j 0 2 (j0f) (6) N 2 (j; f; a) b2 j0f ca 2j0f a; if j f 0; if j<f: Especially, if a 0, i.e., [a] f , the (5) ca be simplified as follows: B 0;f () [ 0 M 2 (j; f 0 1)] j 2 ; if M 2 (j; f) <M 2 (j +1;f): (8) We ote that lettig f () be the legth of B a; f (), the f () is give by f () j; if M 2 (j; f) <M 2 (j +1;f): (9) (7) where If [a] f 2 L(j; f) (f 0 1) 0 (f 0 j) + ; (11) ~N 2 (j; f; a) b2 j0f ac: (12) , the B ~ a; f () becomes ~B 0;f () [ 0 M 2(j; f 0 1) + L(j +1;f)] j 2 ; Some examples of B a; f () are show i Table I. Ay B a; f () does ot have [a] f 2 as a prefix. But, [a] f 2 may appear as a prefix whe B a; f () with legth f () <fis cocateated by aother B a; f (). For istace, whe f 3 ad [a] f 2 100, B a; f (5) 10 ad B a; f (7) 000 makes B a; f (5) B a; f (7) I order to prevet such cases, we remove the sequeces that coicide with a prefix of [a] f 2 from fb a; f ()g. Sice oe sequece is removed for each legth j if j<f, the obtaied biary umber B ~ a; f () is give by if M 2 (j; f) 0 L(j; f) <M 2(j +1;f) 0 L(j +1;f): (13) The legth ~ f () of B ~ a; f () is give by ~ f () j; if M 2 (j; f) 0 L(j; f) <M 2 (j +1;f) 0 L(j +1;f): (14) Some examples of B ~ a; f () are also show i Table I. ~B a; f () [ 0 M 2(j; f) +L(j; f)] j 2 ; if M 2 (j; f) 0 L(j; f) <M 2 (j; f) 0L(j; f) + N ~ 2 (j; f; a) [ 0 M 2(j; f 0 1) + L(j +1;f)] j 2 ; if M 2(j; f) 0 L(j; f) + N ~ 2(j; f; a) <M 2 (j +1;f) 0 L(j +1;f) (10) III. NEW RECURSIVE UNIVERSAL CODE OF POSITIVE INTEGERS Usig B ~ a; f () defied by (10), a ew recursive uiversal code of the positive itegers ca be defied similarly to (3) as follows: C a; f ( 0) B ~ a; f ( K ) B ~ a; f ( K01 ) 111 B ~ a; f ( 1 ) B ~ a; f ( 0 )[a] f 2 (15)

4 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH where each k is give by k ~ f ( k01) 0 1 (16) TABLE II EXAMPLES OF C () ad K is the iteger k that satisfies k represeted recursively as follows: 1. C a; f () ca also be C a; f () ~ C a; f ()[a] f 2 (17) ~C a; f () ~B a; f (); if 1 ~C a; f ( ~ f () 0 1) B ~ a; f (); if >2. (18) We ote that sice B ~ a; f (1) is always equal to 0 or 1, the first segmet B ~ a; f (1) ca be omitted i the biary case. Some examples of C a; f () are show i Table II. Sice a prefix of ay B ~ a; f ( k ) does ot coicide with [a] f 2, [a] f 2 ca delimit the codeword. We ow derive upper bouds o the codeword legth l a; f () of code C a; f () defied by (15) (or (17) ad (18)). Let wf 3 () be K +1 or the iteger k that satisfies k 0for k recursively defied by (16). Note that wf 3 () is a mootoically icreasig fuctio of ad wf 3 () w3 (). The, the followig theorem holds. Theorem 1: l a; f () satisfies for ay that l a; f () log F 2(f )w 3 f () +c f + 2 () (19) ad l a; f () satisfies for ifiitely may that where l a; f () log (1 0 F2(f ))w3 f () +c f +2 2() (20) F 2 (f )0 ( f ) (21) c f 5(f 0 2) + + f +5F 2 (f) (22) 2() e 1+ (w3 ()01)( e) 01 4:7 : (23) Proof: We ote from (14) that i itegers with ~ () j, the smallest ad largest oes are give by M 2(j; f ) 0 L(j; f ) ad M 2(j +1;f) 0 L(j +1;f) 0 1, respectively. Hece, from (16), l a; f () 0 log 3 has a local maximum at the followig : K 1 (24) k01 M 2( k +1;f) 0 L( k +1;f) (25) 0 (26) while it has a local miimum at the followig : k01 M 2 ( k +2;f) 0 L( k +2;f) 0 1: (27) I the followig, we derive a upper boud of l a; f () for these two extreme cases. We first cosider the former case, i.e., the worst case. For k f 0 1, (25) becomes k f 0 (f 0 1): (28) Furthermore, for k f 0 2, k satisfies k (f 0 1) + (f 0 k 0 1) f 0 (f 0 1) 2 +1 ( f ) 0 (f 0 1): (29) Hece, for ay k 1; 2; 111,wehave k +1 ( k01 +(f 0 1)) + F 2(f ): (30) From (30), 1 is upper-bouded by 1 +1 ( +(f 0 1)) + F 2(f ) + 1+ f F 2 (f ) + e (f 0 1) + F 2(f ): (31) From (30) ad (31), 2 +1is bouded by 2 +1 ( 1 +(f 0 1)) + F 2(f ) + e (f 0 1) + F 2(f )+(f 0 2) + F 2(f ) log e (f 0 1) + F 2 (f )+(f 0 2) + F 2 (f ) 2 + e e (f 0 1) + F2(f )+(f 0 2) + F 2(f ): (32)

5 720 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 Repeatig such procedure, we obtai k +1 log k 2 + e log k ( e) 2 2 )(log k02 2 ) (F 2 (f )+(f 02)) + ( e) k01 2 )(log k02 2 ) 111( ) ( e) k 2 )(log k02 (f 01)+F2(f) 2 ) 111( ) log k 2 +(1+A k())f 2(f)+Ak+1(2 )(f 02)+Bk() where Ak() ad BK () are defied as (33) A 1 () 0 (34) holds for b e. Furthermore, A 01 () ad A () ca be bouded above as follows: A 01 () b log b 2 (log 02 2 )(log 03 2 ) b (log 02 2 )(log 03 2 ) b 2 + b 2exp 2 (2) + b 2 exp 2 (2) exp 2 2 (2) b exp 2 (2) 111exp 03 2 (2) b 1+ b b b b 2 1 i0 2b 4 0 b b 4 i (40) Ak() Bk() k02 j0 ( e) j+1 2 )(log k02 2 ) 1110j 2 ) ( e) k (35) 2 )(log k02 2 ) 111( ) : (36) The codeword legth i the local maximum (or worst) cases, say (), has the followig upper-boud from (16) ad (33) a; f A () 3 b + b2 2 + b 3 2 exp 2 (2) b 1+ b 2 + b 2 2 exp 2 (2) b 1+ 2b 4 0 b where iequality 3 holds because of b(4 + b) 4 0 b (41) a; f () 01 k0 01 k0 ~(k) +f (k+1 +1)+f ad for k 3. Hece, we have log 01 1 log 02 2 log 0k exp k02 2 (2) (k +1)+f (37) (log k 2 +(1+A k())f 2(f) + Ak+1(2 )(f 0 2) + Bk()) + f log w3 f ()F 2 (f) + Ak()F 2 (f ) + Ak+1(2 )(f 0 2) + Bk() +f: (38) We ote from [3, eq. (A-12)] that iequality O the other had, Ak() 4b 3(4 0 b) + 2b b(4 + b) b 4 0 b b 4 0 b Ak+1(2 ) 22 + b G2: (42) 3 +1 k2 w (2 ) Ak(2 ) Ak(2 ) (43) because w 3 (2 ) w 3 () +1ad A 1 (2 ) 0by the defiitio. Therefore, (43) is also bouded by 02 4b Ak() 3(4 0 b) (39) Ak+1(2 ) G 2 : (44)

6 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH Furthermore, the sum of B k (), say 2(), ca be bouded by 3 2() B k () log e 2 (log 1 2 e) k01 1+ k2 2 )(log k02 2 ) 111( ) e 1+ (w3 () 0 1)( e) 01 (45) (46) 4:7 (47) where the last iequality holds because the secod term i the bracket of (46) has the maximum at 16. From (38), (42), ad (44), a; f () ca be bouded by a; f () log3 2 + w3 f ()F 2 (f ) + G 2F 2(f )+G 2(f 0 2) + + f + 2(): (48) Next we treat the local miimum (or best) case give by (27). I this case, we have for k f 0 2 ad for k f 0 3 k f 0 (f 0 1) 0 1 (49) k (f 0 1) + (f 0 k 0 2) f 0 (f 0 1) ( f ) 0 f: (50) This meas that, for ay k, k +2ca be bouded by k +2 ( k01 + f )+F 2 (f ): (51) Hece, i the same way as (33), we have k +2 log k 2 +(1+A k())f 2(f)+A k+1 (2 )(f 0 2)+2B k (): (52) Furthermore, from (37), (42), (44), ad (52), l (B) a; f () ca be bouded by l (B) a; f () ( k +1)+f ( k +2)0 w 3 f () +f (log k 2 +(1+A k())f 2 (f) + A k+1 (2 )(f 0 2) + 2B k ()) 0 wf 3 () +f log (1 0 F2(f ))w3 f () +G 2F 2(f ) + G 2 (f 0 2) + + f +2 2 (): (53) 3 A tight boud () 4 ca be obtaied by directly calculatig (45), where the secod term i the bracket has the maximum at 4. G 2 is bouded by G 2 4: < 5 because b e 1: Hece, we have from (48) ad (53) that a; f () log3 2 +F 2(f )w 3 f ()+5(f 0 2) + +f +5F 2 (f)+ 2 () l (B) a; f () log3 0 (1 0 F 2(f ))w 3 f () +5(f 0 2) + Fially, ote that ay satisfies (54) + f +5F 2 (f) +2 2 (): (55) k01 M 2( k +1;f) 0 L( k +1;f) (56) istead of (25). But (56) also iduces the same iequality (30) as (25). Hece (54) holds for ay. O the other had, (55) holds for ifiite may s that satisfy (27). Q.E.D. We ote from (21), (54), ad (55) that F 2(f ) ca be approximated as F 2 (f ) ( e)2 f, ad by settig f large, the coefficiet of w 3 f () i the worst case becomes very small while the oe i the best case becomes almost 01. Hece, we ca cojecture that l a; f () is shorter tha log 3 i large parts of the positive itegers. I the remaider of this sectio, we show that this cojecture is true by cosiderig a geeral case istead of the best ad worst cases. For a give k, k01 must be icluded i a regio R( k ) defied as R( k )f k01 : M 2( k +1;f) 0 L( k +1;f) k01 <M 2 ( k +2;f) 0 L( k +2;f)g: (57) We divide this regio R( k ) ito two regios, the worse regio R (W ) ( k ) ad the better regio R (B) ( k ), which are defied as R (W ) ( k )f k01 : M 2 ( k +1;f) 0 L( k +1;f) k01 < 1:5M 2( k +1;f) 0 L( k +1;f)g (58) R (B) ( k )f k01 :1:5M 2( k +1;f) 0 L( k +1;f) k01 <M 2 ( k +2;f) 0 L( k +2;f)g: (59) Sice the cardiality of R( k ), jr( k )j, is equal to M 2( k +1;f) for k f, the followig relatio holds: jr (W ) ( k )j jr( k )j jr(b) ( k )j jr( k )j Whe k01 2R (W ) ( k ), it satisfies 1 2 : (60) k01 M 2( k +1;f) 0 L( k +1;f): (61) Hece, i this case, we have from (30) that k +1 ( k01 +(f 0 1)) + F 2(f ): (62) Whe k01 2R (B) ( k ), it satisfies k01 1:5M 2( k +1;f) 0 L( k +1;f) (63) M 2 ( k :5; f) 0 L( k +1;f): (64) Therefore, we ca obtai similarly that k :5 ( k01 +(f 0 1)) + F 2(f ): (65)

7 722 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 For a give, lettig K (B) () be the set of k such that k 2R (B) ( k+1 ) ad lettig () be the ratio defied as () jk(b) ()j w 3 f () (66) the the codeword legth of satisfies from (37), (62), ad (65) that l a; f () ( k +1)+f ( k +1) k62k () + (( k +1+ 1:5) 0 1:5) + f k2k () log (() 1:5 0 F 2(f))wf 3 () + G 2F 2(f )+G 2(f 0 2) + + f + 2(): (67) Hece, whe is sufficietly large, the codeword legth l a; f () becomes shorter tha log 3 2 if () 1:5 0 F 2(f) > 0, i.e., () > 0 (1 0 20f ) 1:5 e 1:5 20f 2: f (68) where the approximatio holds for 2 0f 1. We ow show that (68) holds for almost all positive itegers. Assume that is uiformly distributed over the set of itegers satisfyig w 3 f () w for a give iteger w, ad a radom variable X k is defied as X k 0; if k 2R (W ) ( k+1 ) (69) 1; if k 2R (B) ( k+1 ) for such probability distributio. The, from the defiitio of R (W ) ( k+1 ) ad R (B) ( k+1 ),wehave where K w 0 1. Furthermore, sice PrfX K 0g 1 (70) jr (W ) ( k+1 )j jr (B) ( k+1 )j holds for ay k+1 f ad ay iteger icluded i R (B) ( k+1 ) is larger tha itegers i R (W ) ( k+1 ), we ca easily show that for w 3 ad 1 k K 0 1 PrfX k 0jX K 0;XK01 x k01 ; 111;X k+1 x k+1 g < 1 4 (71) PrfX 0 0jX K 0;X K01 x k01 ; 111;X 2 x 2 ;X 1 x 1 g 1 2 (72) hold for ay x K01 x K02 111x k+1 ad x K01 x K02 111x 2 x 1, respectively. 4 Obviously, PrfX k 1jX K 0;X K01 x k01 ; 111;X k+1 x k+1 g1 (73) 4 For simplicity, a rough upper boud 14 is used i (71) although PrfX 1jX 0;X x ; 111;X x g14 holds. also holds for ay k. Hece, a sequece x K01 x K02 111x 1 x 0 with m occurs with probability Pr (x) bouded above by Therefore, we have Pr(x) < Pr (N ) m w Pr K w02m 1 w010m 1 m w0102m 1 2m 4 m 1 m K k0 x k <w2 2 w : (74) k0 X k m < w m 20w (75) where N is the radom variable of. This meas from the law of the large umber for the biomial distributio that for ay fixed 0 < 12 lim w!1 Prf(N ) < 0g 0: (76) Sice it holds that 0 ( f ) 1:5 < 12 for f 3, we ca coclude that lim w!1 Prfl a; f (N) > log 3 2 N g lim w!1 Pr (N ) < 0 (1 0 20f ) 1:5 0: (77) Theorem 2: I case of f 3, the codeword legth of code C a; f () is shorter tha log 3 2 i almost all of sufficietly large positive itegers i the sese of (77). IV. CONCLUDING REMARKS We proposed a ew recursive uiversal code of the positive itegers, the codeword legth of which is shorter tha log 3 2 i almost all of sufficietly large positive itegers. Although we treated the biary case i the previous sectios, the results ca easily be exteded to r-ary code by usig log r, [] j r, [a] f r, M r (j; f ) rj 0 r (j0f) r 0 1 (78) ~N r (j; f; a) br j0f ac (79) istead of, [] j 2, [a] f 2, M 2(j; f), N ~ 2(j; f; a), respectively. For this case, we ca show, i the same way as the biary case, that a; f () ad l (B) a; f () are bouded as follows: a; f () log3 r + F r(f)wf 3 () +G r (f 0 2) + + f + G rf r(f) +r() (80) l (B) a; f () log3 r 0 (1 0 Fr(f))w3 f () +G r(f 0 2)+ + f + G r F r (f) +2 r () (81)

8 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH where F r(f )0 log r 1 0 r 0f r 0 1 (82) same code C 0(K 0) to represet K 0 istead of 1 K 0 [9]. The the code have the followig structure: C 1 ( 0 )1 S 0[K S ] 0 2 [K S 01] [K 1] 0 2 [K 0] 0 2 [ K ] 0 2 [ K 01] [ 1 ] 0 2 [ 0] 0 2 : (86) G r r r log r e (r r 0 1)(r r 0 log r e) + rr log r e r(r r 0 log r e) + (rrr +(r r 0 r) log r e) log r e r(r r 0 log r e) log r e r r 0 log r e r () log r e (r r ) 2 r r rr +(r r 0 r) log r e r 1+ w3 () 0 1 log r (83) : (84) G r goes to log r e as r becomes large. We also ote that, as f becomes large, F r(f ) goes to logr (r 0 1), istead of zero, which is approximately equal to oe whe r is large. This correspods to the fact that i the r-ary case, the optimal code legth is give by logr 3 0 w3 () with < log r log r e < 0 [2], [3]. This meas that the codeword legth caot become shorter tha logr 3 for all large.5 Sice fuctio wf 3 () ad w3 () are mootoically icreasig fuctios of, the term of wf 3 () i (19) ad (20) becomes sigificat compared with costat terms for large. But, the rate of icrease is very slow. Hece, the overhead of delimiter legth f is more severe tha the effect of wf 3 () i moderate, ad the performace of the proposed code C a; f () is o better tha the kow codes i practical use. We ote that C a; f () ca be improved i the same way as Stout code [7]. But eve such modified code is ot suited for practical use. As we oted i Sectio II, Leveshtei W2 0 code [2] or Betley Yao code [5] have a code structure such that C 0 ( 0 )1 K 0[ K ] 0 2 [ K 01] [ 1] 0 2 [ 0] 0 2 (85) where 1 K is a sequece of 1 s with legth K 0 ad [ k ] 2 1[ k ] 0 2, i.e., [ k ] 0 2 is obtaied by deletig the MSB from [ k ] 2. Compared with C E ( 0 ) give by (3), the MSB s ad delimiter 0 are gathered as the prefix 1 K 0, which is the uary code deotig the recurrece umber K 0. Sice the uary code is iefficiet for large K 0, we ca use the 5 l () is a little shorter tha log i (81). But this is attaied by the loss of (80) which is larger tha log 0. Furthermore, S 0 i (86) ca be represeted by C 0 (S 0 ) istead of 1 S 0. By repeatig such recurrece arbitrarily fixed times t, code C t(0) ca be defied. But ote that C t ( 0 ) is a doubly recursive code while our code C a; f ( 0) is a simple recursive code. The evaluatio of the asymptotic performace for C t(0) is a ope problem. Fially, we ote that Leveshtei W 0 2 code ad Betley Yao code satisfy the lexicographic property. Recetly, Nakamura ad Murashima [10] showed that if their devised code C NM (K 0 ) is used istead of uary code 1 K 0 i (85), the legth of the code satisfies l() log w3 2() m + m + c (87) for ay give iteger m>0, ad the lexicographic property also holds i their code. REFERENCES [1] T. Amemiya ad H. Yamamoto, A ew class of the uiversal represetatio for the positive itegers, IEICE Tras. Fudametals, vol. E76-A, o. 3, pp , Mar [2] V. I. Leveshtei, O the redudacy ad delay of decodable codig of atural umbers, Probl. Cyber., vol. 20, pp , [3] R. Ahlswede, T. S. Ha, ad K. Kobayashi, Uiversal codig of itegers ad ubouded search trees, IEEE Tras. Iform. Theory, vol. 43, pp , Mar [4] P. Elias, Uiversal codeword sets ad represetatio of the itegers, IEEE Tras. Iform. Theory, vol. IT-21, pp , [5] J. L. Betley ad A. C. Yao, A almost optimal algorithm for ubouded searchig, Iform. Processig Lett., vol. 5, o. 3, pp , [6] S. Eve ad M. Rodeh, Ecoomical ecodig of comma betwee strigs, Commu. ACM, vol. 21, o. 4, pp , [7] Q. F. Stout, Improved prefix ecodigs of the atural umbers, IEEE Tras. Iform. Theory, vol. IT-26, pp , [8] T. C. Bell, J. G. Cleary, ad I. H. Witte, Text Compressio. Eglewood Cliffs, NJ: Pretice-Hall, [9] V. I. Leveshtei, private commuicatio, [10] H. Nakamura ad S. Murashima, Costructio method of positive iteger code by codig MSB strig of legth iformatio of existig codes (i Japaese), Tras. Iform. Processig Soc. of Japa, vol. 40, o. 4, pp , Apr

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

On Divisibility concerning Binomial Coefficients

On Divisibility concerning Binomial Coefficients A talk give at the Natioal Chiao Tug Uiversity (Hsichu, Taiwa; August 5, 2010 O Divisibility cocerig Biomial Coefficiets Zhi-Wei Su Najig Uiversity Najig 210093, P. R. Chia zwsu@ju.edu.c http://math.ju.edu.c/

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Worksheet on Generating Functions

Worksheet on Generating Functions Worksheet o Geeratig Fuctios October 26, 205 This worksheet is adapted from otes/exercises by Nat Thiem. Derivatives of Geeratig Fuctios. If the sequece a 0, a, a 2,... has ordiary geeratig fuctio A(x,

More information

7 Sequences of real numbers

7 Sequences of real numbers 40 7 Sequeces of real umbers 7. Defiitios ad examples Defiitio 7... A sequece of real umbers is a real fuctio whose domai is the set N of atural umbers. Let s : N R be a sequece. The the values of s are

More information

1 Introduction to reducing variance in Monte Carlo simulations

1 Introduction to reducing variance in Monte Carlo simulations Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by

More information

4.3 Growth Rates of Solutions to Recurrences

4.3 Growth Rates of Solutions to Recurrences 4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.

More information

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code: 6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:

More information

Homework 9. (n + 1)! = 1 1

Homework 9. (n + 1)! = 1 1 . Chapter : Questio 8 If N, the Homewor 9 Proof. We will prove this by usig iductio o. 2! + 2 3! + 3 4! + + +! +!. Base step: Whe the left had side is. Whe the right had side is 2! 2 +! 2 which proves

More information

INFINITE SEQUENCES AND SERIES

INFINITE SEQUENCES AND SERIES 11 INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES 11.4 The Compariso Tests I this sectio, we will lear: How to fid the value of a series by comparig it with a kow series. COMPARISON TESTS

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Universal Codes for Finite Sequences of Integers Drawn from a Monotone Distribution

Universal Codes for Finite Sequences of Integers Drawn from a Monotone Distribution Uiversal Codes for Fiite Sequeces of Itegers Draw from a Mootoe Distributio Dea P. Foster, Robert A. Stie & Abraham J. Wyer Departmet of Statistics The Wharto School of the Uiversity of Pesylvaia Philadelphia,

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

CALCULATION OF FIBONACCI VECTORS

CALCULATION OF FIBONACCI VECTORS CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College

More information

INEQUALITIES BJORN POONEN

INEQUALITIES BJORN POONEN INEQUALITIES BJORN POONEN 1 The AM-GM iequality The most basic arithmetic mea-geometric mea (AM-GM) iequality states simply that if x ad y are oegative real umbers, the (x + y)/2 xy, with equality if ad

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT TR/46 OCTOBER 974 THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION by A. TALBOT .. Itroductio. A problem i approximatio theory o which I have recetly worked [] required for its solutio a proof that the

More information

EE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course

EE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course Sigal-EE Postal Correspodece Course 1 SAMPLE STUDY MATERIAL Electrical Egieerig EE / EEE Postal Correspodece Course GATE, IES & PSUs Sigal System Sigal-EE Postal Correspodece Course CONTENTS 1. SIGNAL

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

On the Capacity of Symmetric Gaussian Interference Channels with Feedback

On the Capacity of Symmetric Gaussian Interference Channels with Feedback O the Capacity of Symmetric Gaussia Iterferece Chaels with Feedback La V Truog Iformatio Techology Specializatio Departmet ITS FPT Uiversity, Haoi, Vietam E-mail: latv@fpteduv Hirosuke Yamamoto Dept of

More information

Hoggatt and King [lo] defined a complete sequence of natural numbers

Hoggatt and King [lo] defined a complete sequence of natural numbers REPRESENTATIONS OF N AS A SUM OF DISTINCT ELEMENTS FROM SPECIAL SEQUENCES DAVID A. KLARNER, Uiversity of Alberta, Edmoto, Caada 1. INTRODUCTION Let a, I deote a sequece of atural umbers which satisfies

More information

If a subset E of R contains no open interval, is it of zero measure? For instance, is the set of irrationals in [0, 1] is of measure zero?

If a subset E of R contains no open interval, is it of zero measure? For instance, is the set of irrationals in [0, 1] is of measure zero? 2 Lebesgue Measure I Chapter 1 we defied the cocept of a set of measure zero, ad we have observed that every coutable set is of measure zero. Here are some atural questios: If a subset E of R cotais a

More information

Math 104: Homework 2 solutions

Math 104: Homework 2 solutions Math 04: Homework solutios. A (0, ): Sice this is a ope iterval, the miimum is udefied, ad sice the set is ot bouded above, the maximum is also udefied. if A 0 ad sup A. B { m + : m, N}: This set does

More information

MATH 324 Summer 2006 Elementary Number Theory Solutions to Assignment 2 Due: Thursday July 27, 2006

MATH 324 Summer 2006 Elementary Number Theory Solutions to Assignment 2 Due: Thursday July 27, 2006 MATH 34 Summer 006 Elemetary Number Theory Solutios to Assigmet Due: Thursday July 7, 006 Departmet of Mathematical ad Statistical Scieces Uiversity of Alberta Questio [p 74 #6] Show that o iteger of the

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

REAL ANALYSIS II: PROBLEM SET 1 - SOLUTIONS

REAL ANALYSIS II: PROBLEM SET 1 - SOLUTIONS REAL ANALYSIS II: PROBLEM SET 1 - SOLUTIONS 18th Feb, 016 Defiitio (Lipschitz fuctio). A fuctio f : R R is said to be Lipschitz if there exists a positive real umber c such that for ay x, y i the domai

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you

More information

and each factor on the right is clearly greater than 1. which is a contradiction, so n must be prime.

and each factor on the right is clearly greater than 1. which is a contradiction, so n must be prime. MATH 324 Summer 200 Elemetary Number Theory Solutios to Assigmet 2 Due: Wedesday July 2, 200 Questio [p 74 #6] Show that o iteger of the form 3 + is a prime, other tha 2 = 3 + Solutio: If 3 + is a prime,

More information

The Borel hierarchy classifies subsets of the reals by their topological complexity. Another approach is to classify them by size.

The Borel hierarchy classifies subsets of the reals by their topological complexity. Another approach is to classify them by size. Lecture 7: Measure ad Category The Borel hierarchy classifies subsets of the reals by their topological complexity. Aother approach is to classify them by size. Filters ad Ideals The most commo measure

More information

University of Twente The Netherlands

University of Twente The Netherlands Faculty of Mathematical Scieces t Uiversity of Twete The Netherlads P.O. Box 7 7500 AE Eschede The Netherlads Phoe: +3-53-4893400 Fax: +3-53-48934 Email: memo@math.utwete.l www.math.utwete.l/publicatios

More information

Ma 530 Introduction to Power Series

Ma 530 Introduction to Power Series Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power

More information

The method of types. PhD short course Information Theory and Statistics Siena, September, Mauro Barni University of Siena

The method of types. PhD short course Information Theory and Statistics Siena, September, Mauro Barni University of Siena PhD short course Iformatio Theory ad Statistics Siea, 15-19 September, 2014 The method of types Mauro Bari Uiversity of Siea Outlie of the course Part 1: Iformatio theory i a utshell Part 2: The method

More information

Application to Random Graphs

Application to Random Graphs A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

De Bruijn Sequences for the Binary Strings with Maximum Density

De Bruijn Sequences for the Binary Strings with Maximum Density De Bruij Sequeces for the Biary Strigs with Maximum Desity Joe Sawada 1, Brett Steves 2, ad Aaro Williams 2 1 jsawada@uoguelph.ca School of Computer Sciece, Uiversity of Guelph, CANADA 2 brett@math.carleto.ca

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

4.1 SIGMA NOTATION AND RIEMANN SUMS

4.1 SIGMA NOTATION AND RIEMANN SUMS .1 Sigma Notatio ad Riema Sums Cotemporary Calculus 1.1 SIGMA NOTATION AND RIEMANN SUMS Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information

BINOMIAL PREDICTORS. + 2 j 1. Then n + 1 = The row of the binomial coefficients { ( n

BINOMIAL PREDICTORS. + 2 j 1. Then n + 1 = The row of the binomial coefficients { ( n BINOMIAL PREDICTORS VLADIMIR SHEVELEV arxiv:0907.3302v2 [math.nt] 22 Jul 2009 Abstract. For oegative itegers, k, cosider the set A,k = { [0, 1,..., ] : 2 k ( ). Let the biary epasio of + 1 be: + 1 = 2

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Seunghee Ye Ma 8: Week 5 Oct 28

Seunghee Ye Ma 8: Week 5 Oct 28 Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

New Definition of Density on Knapsack Cryptosystems

New Definition of Density on Knapsack Cryptosystems Africacryt008@Casablaca 008.06.1 New Defiitio of Desity o Kasac Crytosystems Noboru Kuihiro The Uiversity of Toyo, Jaa 1/31 Kasac Scheme rough idea Public Key: asac: a={a 1, a,, a } Ecrytio: message m=m

More information

Math 2784 (or 2794W) University of Connecticut

Math 2784 (or 2794W) University of Connecticut ORDERS OF GROWTH PAT SMITH Math 2784 (or 2794W) Uiversity of Coecticut Date: Mar. 2, 22. ORDERS OF GROWTH. Itroductio Gaiig a ituitive feel for the relative growth of fuctios is importat if you really

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Counting Well-Formed Parenthesizations Easily

Counting Well-Formed Parenthesizations Easily Coutig Well-Formed Parethesizatios Easily Pekka Kilpeläie Uiversity of Easter Filad School of Computig, Kuopio August 20, 2014 Abstract It is well kow that there is a oe-to-oe correspodece betwee ordered

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

ADVANCED DIGITAL SIGNAL PROCESSING

ADVANCED DIGITAL SIGNAL PROCESSING ADVANCED DIGITAL SIGNAL PROCESSING PROF. S. C. CHAN (email : sccha@eee.hku.hk, Rm. CYC-702) DISCRETE-TIME SIGNALS AND SYSTEMS MULTI-DIMENSIONAL SIGNALS AND SYSTEMS RANDOM PROCESSES AND APPLICATIONS ADAPTIVE

More information

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,

More information

Lesson 10: Limits and Continuity

Lesson 10: Limits and Continuity www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals

More information

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

2.4 Sequences, Sequences of Sets

2.4 Sequences, Sequences of Sets 72 CHAPTER 2. IMPORTANT PROPERTIES OF R 2.4 Sequeces, Sequeces of Sets 2.4.1 Sequeces Defiitio 2.4.1 (sequece Let S R. 1. A sequece i S is a fuctio f : K S where K = { N : 0 for some 0 N}. 2. For each

More information

Fixed-Threshold Polar Codes

Fixed-Threshold Polar Codes Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam 4 will cover.-., 0. ad 0.. Note that eve though. was tested i exam, questios from that sectios may also be o this exam. For practice problems o., refer to the last review. This

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

MAT1026 Calculus II Basic Convergence Tests for Series

MAT1026 Calculus II Basic Convergence Tests for Series MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real

More information

INFINITE SEQUENCES AND SERIES

INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES I geeral, it is difficult to fid the exact sum of a series. We were able to accomplish this for geometric series ad the series /[(+)]. This is

More information

4. Partial Sums and the Central Limit Theorem

4. Partial Sums and the Central Limit Theorem 1 of 10 7/16/2009 6:05 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 4. Partial Sums ad the Cetral Limit Theorem The cetral limit theorem ad the law of large umbers are the two fudametal theorems

More information

TEACHER CERTIFICATION STUDY GUIDE

TEACHER CERTIFICATION STUDY GUIDE COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Riemann Sums y = f (x)

Riemann Sums y = f (x) Riema Sums Recall that we have previously discussed the area problem I its simplest form we ca state it this way: The Area Problem Let f be a cotiuous, o-egative fuctio o the closed iterval [a, b] Fid

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Zeros of Polynomials

Zeros of Polynomials Math 160 www.timetodare.com 4.5 4.6 Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered with fidig the solutios of polyomial equatios of ay degree

More information

MA541 : Real Analysis. Tutorial and Practice Problems - 1 Hints and Solutions

MA541 : Real Analysis. Tutorial and Practice Problems - 1 Hints and Solutions MA54 : Real Aalysis Tutorial ad Practice Problems - Hits ad Solutios. Suppose that S is a oempty subset of real umbers that is bouded (i.e. bouded above as well as below). Prove that if S sup S. What ca

More information

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4.

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4. 4. BASES I BAACH SPACES 39 4. BASES I BAACH SPACES Sice a Baach space X is a vector space, it must possess a Hamel, or vector space, basis, i.e., a subset {x γ } γ Γ whose fiite liear spa is all of X ad

More information

Square-Congruence Modulo n

Square-Congruence Modulo n Square-Cogruece Modulo Abstract This paper is a ivestigatio of a equivalece relatio o the itegers that was itroduced as a exercise i our Discrete Math class. Part I - Itro Defiitio Two itegers are Square-Cogruet

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

1. Universal v.s. non-universal: know the source distribution or not.

1. Universal v.s. non-universal: know the source distribution or not. 28. Radom umber geerators Let s play the followig game: Give a stream of Ber( p) bits, with ukow p, we wat to tur them ito pure radom bits, i.e., idepedet fair coi flips Ber( / 2 ). Our goal is to fid

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information