Greedy Codes. Theodore Rice
|
|
- Martina Bruce
- 6 years ago
- Views:
Transcription
1 Greedy Codes Theodore Rice 1
2 Key ideas These greedy codes come from certain positions of combinatorial games. These codes will be identical to other well known codes. Little sophisticated mathematics is needed to generate them. 2
3 Combinatorial Games A combinatorial game is a two player game of perfect information. The game consists of a set of positions and a set of rules which delineate the allowable moves from each position. The first player unable to move loses. In impartial games the players have the same set of options from each position. 3
4 Game Theory Grundy s game is played with a heap(s) of counters. A move consists of dividing a heap into two non-empty heaps of different sizes. The first player unable to move loses. A general heap game is one where the moves are given by turning sets {h, p 1,..., p n } where a pile of size h may be replaced by piles of size p 1,..., p n. 4
5 Grundy s game is such a game where the turning sets are {3, 1, 2}; {4, 3, 1}; {5, 4, 1}; {5, 3, 2};... We can define a function, called the Grundy value or nim-value of a game (position), G(G) which assigns integer values to positions. G has the following properties: the value of a losing position is 0. The value of a position is the smallest value not already taken by an accessible position. 5
6 The Grundy value of a sum of positions is as follows: G(P 1 +P P n ) = G(P 1 ) G(P 2 )... G(P n ) where is binary addition without carrying. The first few Grundy values of Grundy s game are:
7 A general position may be represented by a vector: (..., a 3, a 2, a 1 ) where a i is the number of piles of size i. Now since two identical piles cancel each other out, (x x = 0) all we need to know is the parity of each number. Therefore we can represent our vectors in binary: (..., ζ 3, ζ 2, ζ 1 ). Winning positions in the game are positions for which ζi G(a i ) = 0. For example 3, 6 is a zero game. 7
8 Codes (at last) We call the collection of winning positions the winning code for the game. It consists of all positions for which the previous player wins the game. The winning code is linear (since 0 0 = 0.) 8
9 word heaps , , ,2,1 9
10 Theorem 1. The winning code for a game is a linear code over GF(2). Although these code words have infinitely many coordinates, we can get a code of any length by only using the code words that vanish outside our desired length. 10
11 For a general heap game in base B, a legal move from M = (ζ n,..., ζ 1 ) to M = (ζ n,..., ζ 1) so that N < N lexicographically and {i ζ i ζ i } is a turning set. Note turning sets only specify where to successive positions differ, not by how much. For each family of turning sets and base, B, we can create a code of vectors (ζ i ), ζ i < B of possible words considered in lexicographic order. 11
12 A word, N = (ζ i ), is rejected if there is an N = (ζ i ) in the code for which {i ζ i ζ i } is a turning set. Otherwise put the word in the code. Such a code is called a lexicode. Theorem 2. For any turning set and any base the winning moves in the game are to move to positions corresponding to the codewords of the lexicode. 12
13 Example 3. Let B = 8 and the turning sets have size 1,2. The code is: This code is linear. So 1456 = is in the code. 13
14 Example 4. Let B = 4, d = 4 where d is the Hamming distance. (Turning sets size 1,2,3) The code is: This is closed under but also by 0,1,2,3 which we will define later. 14
15 This code if truncated at length 6 is the Golay code over GF(4). This is the start of the table for The above code is closed under by 0,1,2,3, so 3 (010123) = (030312) is in the code. 15
16 Theorem 5. If B = 2 the lexicode defined by any family of turning sets is a binary linear code. Proof. This is a consequence of the two previous theorems. 16
17 This theorem can be generalized: Theorem 6. If B = 2 n the lexicode defined for any family of turning sets is linear under componentwise. Proof. We convert base B vectors into base 2 vectors by replacing each digit with its binary representation. That is ζ i is replaced by ζ in,..., ζ i1 The original game becomes a binary game in which 17
18 the turning sets are all T where {[ ] } i : i T n was a turning set in the original game. Turning sets are in groups of n. Now apply Theorem 5 to the new game. If not, then the lexicode is not closed under. 18
19 For example: If B = 4 and we have the vector (..., a 4, a 3, a 2, a 1, a 0 ) = (..., 1, 2, 3, 1, 0) we convert it to the vector ( ). If {4, 2, 1} was a turning set, {9, 8, 5, 4, 3, 2} and {8, 5, 4, 3, 2} will be turning sets. Let s apply the above turning set to the above vector: 19
20 (..., 1, 2, 3, 1, 0) (0, 2, 4, 2, 0) (0, 2, 0, 2, 0) Now in the binary case this is: (..., 0, 1, 1, 0, 1, 1, 0, 1, 0, 0) (..., 0, 0, 1, 0, 0, 0, 1, 0, 0, 0) while applying the binary turning set does the same thing. 20
21 The Nim Field In an additive group, if a a and b b then a + b is not a + b, a + b. We can define on the set of integers as a b = mex a<a,b <b{a + b, a + b} Now if (a a )(b b ) 0, we have ab a b + ab a b or in a field of char 2: ab a b + ab + a b. a b = mex a <a,b <b{(a b) (a b ) (a b )} In this way we get a field of characteristic 2. 21
22 Proposition 7. Properties of the field: 2 n 2 m = 2 n + 2 m and N N = 0. Let N = 2 2n. N n = Nn for n < N. N N = 3 2 N. Theorem 8. If B = 2 2n the lexicode derived over any family of turning sets is closed under component wise, by numbers less than B. That is the field is linear over GF(2 2n ). 22
23 We now look at some particular families of lexicodes in detail. We specify a base, B, the desired mininal Hamming distance, d, and take the turning sets to be all sets of size 1, 2,..., d 1. The lexicode is formed by taking the zero word and repeatedly joining the earliest word a least d from all previous words in the code. If B = 2 a the code is closed under and if B = 2 2a the code is closed under, by scalars. That is it is linear over GF (B). 23
24 To obtain a code of length n, only use codewords that vanish outside the desired size. How good are these codes? Ho do they stack up against other codes? 24
25 Considering binary lexicodes and comparing with other codes, the lexicodes have dimensions with in one or two of the best known codes,and often have the same dimension. We now look at some examples. 25
26 Example 9. Zero-sum codes. For d = 2 and any B the lexicode of length n is the zero-sum code, consisting of all vectors, (a n 1,..., a 2, a 1 ) for which the nim sum ai = 0. In the binary case, the is the even-weight code. 26
27 Example 10. Hamming codes. When B = 2, d = 3 the turning sets have size 1,2 and the game is nim. Nim is played with several heaps of counters. A turn consists of removing some or all of the counters in one heap. The first player unable to move loses. The corresponging lexicodes have length 2 m 1 and correspond to binary Hamming codes. 27
28 Example 11. Similarly, when B = 2, d = 4 and m = 2 m, we obtain extended Hamming codes. This code corresponds to Mock Turtles. Mock Turtles is played with turtles numbered 0,1,2,3... A turn consists of turning over 1,2,3 turtles subject to the condition that the highest numbered turtle turned must be turned from its feet to its back. 28
29 Example 12. Extended Quadratic Redidue code of length 18. The lexicode with B = 2, d = 6, n = 18 is the [18,9,6] binary extended quadratic residue code. This correspond to Mock Turtles where you can turn up to 5 turtles. Example 13. The lexicode with B = 2, d = 8, n = 24 is the [24,12,8] binary Golay code. This corresponds to Mock turtles turning up to 7 turtles. 29
30 Specifying the code For B = 2 n the lexicode may be efficiently specified by giving the values for the G value of a position with a single non-zero digit at coordinate i. This function is written f(ζ, i). We write it in base B. For the position (...0, x, 0, 0, 0) in base 8 (say) we can move to any of (0, x, 0, 0, y); (0, x, 0, y, 0); (0, x, y, 0, 0), where x = 0, 1 and y = 0, 1,..., 7, since turning 30
31 sets are size 1 or 2. Thus f(2, 3) is the mex of f(0, 3) abc = 000 abc f(1, 3) abc = 012 abc Where abc = f(y, 0), f(y, 1), f(y, 2). 31
32 i, ζ Table 1: G values f(ζ, i) for B = 8, d = 3 32
33 Note that an entry in column 3 is the sum of the entries in columns 1,2 and the entry in column 5 is the sum of the entries in columns 1,4. The codewords are the positions where the G value is 0. Example 14. For what values of x, y is xy a code word? Since f(2, 3) = 023 and f(x, 1) = 0x0, f(y, 0) = 00y (from the table), x = 2, y = 3. 33
34 Example 15. For what value of x, y is 024xy in the code? Since f(2, 4) = 023 and f(4, 2) = 044 we have = 067. Thus x = 6, y = 7 as above. These codes are comparable in efficiency with Reed-Solomon codes but exist for all lengths, where Reed-Solomon codes do not. 34
35 The multiplicative property seen earlier makes it easy to construct lexicodes when B = 2 2n since f(ζ, P ) = ζ f(p ) where f(p ) = f(1, P ). Theorem 16. In the case B = 2 2n, d = 3 the lexicodes of length 1 + B + B B m 1 are Hamming codes. 35
36 What if, say, B = 3, d = 3? Unfortunately, this code seems to have little structure. Conway et. al. have been unable to discover any structure in the code or solve to corresponding game. Lexicodes in general have little or no known structure, but for the bases discussed they do and are identical to known codes. 36
37 Fixed Weight Codes We can insist that the code has a fixed weight. Consider all words of the desired weight in lexicographic order and accept a word if it is at Hamming distance from all previous words. I will only consider binary codes. The Hamming distance is necessarily even. 37
38 These codes also correspond to a game: Consider a set {a n,..., a 1 } of distinct integers. A turn consists of decreasing 1, 2,..., t 1 of these, keeping the integers distinct. The first player unable to move loses. Remark: These games will not be described by turning sets. But we can define a winning code. 38
39 Theorem 17. For any d = 2t 4 and any weight w, the winning code for this game is the constant weight lexicode with the same parameters. The proof is analogous to that of previous theorems. Example 18. For d = 2 we get the lexicode of all words of weight w for any w, since they must differ at at least two places. 39
40 Welter s Game Welter s Game is usually played on a semi-infinite strip. Coins are placed at various places on the strip. A move consists of moving the coin down the strip, possibly jumping other coins, with the caveat the two coins may not be on the same square at any time. The first player unable to move loses. Thus the game ends when the coins are jammed in the lowest number squares. 40
41 41
42 Example 19. Consider the constant weight lexicode with d = 4. This is actually the winning code for Welter s game! In fact, this is the only other case other than d = 2 where a complete theory exists. (as of 1986). Welter s Game is actually the case t = 2 of the above situation. Analysis of Welter s Game is more complex than that of other games like Nim, but it is possible. 42
43 We can compute values in Welter s Game using Welter s (remarkable) function. Suppose there are coins at (a 1,..., a n ). Compute W (a 1,..., a n ) as follows: W (a 1 ) = a 1 W (a 1, a 2 ) = (a 1 a 2 ) 1 W (a 1,..., a k+1 ) = W (a 2,..., a k ) ((W (a 1,..., a k ) W (a 2,..., a k+1 )) 1) 43
44 Theorem 20. If W (a 1,..., a w ) = n and n n,!a 1,..., a w so that a 1,..., a w, a 1,..., a w are distinct and: W (a 1, a 2,..., a w ) = n W (a 1, a 2,..., a w ) = n W (a 1, a 2,..., a w) = n. 44
45 More generally, if an even number of a i are replaced by the prime letters, the new vector has W value n. Furthermore an even number a 1 < a 1. a w < a w n < n This is referred to as the Even Alteration Property 45
46 The Even Alteration Property implies the following theorem: Theorem 21. (a 1, a 2,..., a w ) is a winning position for Welter s game, or equivalently, the vector with 1 s in positions a 1,..., a w is in the lexicode with constant weight w and minimal distance 4 iff W (a 1,..., a w ) = 0. 46
47 Proof. When n 0 if we take n = 0 we see there is always possible to move from a position for which W (a 1,..., a w ) 0 to one for which W (a 1,..., a w ) = 0 since 0 = n < n 0 by the Even Alteration Property, we have at least one a i < a i and that is the move. 47
48 To calculate Welter s function, we use a frieze pattern: W (a 1 ) W(a 2 )... W(a k ) W (a k+1 ) W (a 1, a 2 )... W (a k, a k+1 ). W (a 1,..., a k ) W (a 2,..., a k+1 W (a 1,..., a k+1 ) 48
49 Where whenever we have a diamond: A B C D the equality A D = (B C) 1 is satisfied. 49
50 Theorem 17 guarantees that if a vector ζ is not in the code, there is a codeword within Hamming distance 3 occurring before ζ in the lexicographic order. To find the winning move a i a i, and hence decode ζ, we will again use a frieze pattern. I will demonstrate with an example. 50
51 Example 22. Set up the frieze pattern: a b c d e a b c d e n n n n n n 51
52 Suppose we have received the word and we want to decode it. This word corresponds to the position (2, 3, 5, 7, 11) in Welter s Game. To decode, we find the winning move. (If there is no winning move, we have a codeword.) The first order of business to to compute W (2, 3, 5, 7, 11). Note that we will set n = 0. 52
53 Fill in the left half working down using the diamond property: a b c d e n n n n n 53
54 For instance in: ? the? may be computed by realizing that (6 14) 1 = 8 1 = 7. So 1? = 7 or? = 7 1 = 6 as seen in the table. When we get to the bottom, we see that W (2, 3, 5, 7, 11) = 4. We want to decode to a word of value 0. So let n = 0, n = 4. 54
55 a b c d e
56 Now work up the table until all of a, b, c, d, e are found. For instance the first dot can be computed as follows: 14 6 Now 14 0 = (6 ) 1 so 15 = 6. So = 6 15 = 9. Fill in the array in a similar way. 0 56
57 So: a = 6, b = 23, c = 1, d = 19, e = 15. The only one of the primes less than the non primes is c < c. Thus moving from c to c is the unique winning move. 57
58 Thus we move from (2, 3, 5, 7, 11) to (2, 3, 1, 7, 11) = (1, 2, 3, 7, 11) Thus the word is decoded to
59 Generalizations So far we have been considering vectors in the standard lexicographic order. What if we consider them in a different order? We do in fact get codes similar to the ones we got before. The first question is how to determine an order. 59
60 B-orders Let B = {y 1, y 2,..., y n } be an order basis of F2 n. This basis induces an order on the vectors of F2 n defined recursively: Let V 0 = (0, 0,..., 0) and let V 1 = v 1, v 2,..., v i. Now suppose the vectors in V i 1 are ordered, x 1, x 2,..., x m where m = 2 n 1. Then we have the partition V i = V i 1 (y i V i 1 ). 60
61 We order the vectors x 1, x 2,..., x m, y i x 1, y 2, x 2,..., y i x m. Call this order the B-order of F2 n. In this way we can obtain an order of F2 n than the lexicographic order other 61
62 Example 23. Suppose we take B = (0,..., 0, 1); (0,..., 1, 0);,..., (1, 0,..., 0). In this case the B-order is the standard lexicographic order Example 24. Let B = (0,..., 0, 1); (0,..., 1, 1); (0,..., 1, 1, 0);...; (1, 1, 0,..., 0). In this case the B-order corresponds to the reflected Gray code of order n. Call B the Gray ordered basis of F n 2. 62
63 Both the lexicographic and Gray orders are what may be called triangular orders of F n 2. Consider an order basis B = y 1, y 2,..., y n of F n 2 for which each V i = y 1,..., y i is the coordinate subspace consisting of all n-tuples with 0 s in the n i leftmost positions. 63
64 y 1 y 2. y n = Such a basis is called a triangular ordered basis of F n 2. 64
65 We can now take an ordered basis B of F2 n and take 0 d n to be a desired distance. We apply a greedy algorithm as before to the B order to obtain a code with minimal distance d. The code obtained is a greedy code. The lexicodes from before are a special types of greedy codes. 65
66 Example 25. Let the length be 5 and the desired distance be 3. We chose our basis to be B = (0, 0, 0, 0, 1); (0, 0, 0, 1, 1); (0, 0, 1, 1, 0); (0, 1, 1, 0, 0); (1, 1, 0, 0, 0). The code obtained is 00000, 00111, 11001,
67 We can define an analog of the G value on this order. Define g : F2 n Z 0 as follows. Assume Fn 2 has been ordered z a, z 2,..., z 2 n. Define g(z 1 ) = 0. Then define g(z i ) to be the smallest t such that ρ(z i, x) d for all x {z 1,..., z i 1 } such that g(x) = t. If there is no such t, let g(z) = mex(g(z 1 ),..., g(z i 1 )). 67
68 That is g(z i ) is the smallest value possible so that z i is d away from all other vectors with the same value. The greedy code is the set {z F 2 n : g(z) = 0}. The smallest integer m, such that g(z) 2 m 1 for all z F2 n is called the index of the given ordering F2 m relative to the distance d. Each g(z) can be seen as a vector in F2 m. 68
69 Hence we can see g as a map g : F2 n F2 m. Here, F2 m is ordered in the lexicographic way. It can be checked that the set of all vectors with a particular g-value is a coset of the Gray-greedy code. Thus g : F2 5 F2 3 is a homomorphism, whose kernel is the code. 69
70 The 3 by 5 matrix: [ ] H = g(e 5 ) g(e 4 ) g(3 2 ) g(e 2 ) g(e 1 ) is a parity check matrix for the code. The g value of a vector is its syndrome relative to this check matrix H =
71 Example 26. Suppose we receive z = = A syndrome of 011 corresponds to an error is the second place so decodes to
72 Linearity of Greedy Codes Theorem 27. Let B be an ordered basis of F n 2 and let d be an integer with 0 d n. Let m be the index of the B-order of F n 2. Then g : F n 2 F m 2 is a surjective homomorphism whose kernel equals the B-greedy code C of length n and distance d. In particular, C is a linear code of dimension n m. 72
73 A parity check matrix for C is given by: [ ] H = g(e n )... g(e 2 ) g(e 1 ) and for each x F n 2, g(z) is the syndrome of z relative to H 73
74 We observe that every linear code C with minimal distance d and covering radius d 1 is a B-greedy code of designated distance d and some ordered basis B. We may choose ; B to be any ordered basis whose first k vectors are a basis of C where k is the dimension of C. Since B-greedy codes of distance d has covering radius d 1 they obtain the Varshamov-Gilbert bound for binary linear codes. 74
75 If y F n 2, then let ŷ F n+1 2 be the vector obtained from y be adding a parity check digit. Theorem 28. Let B = y 1,..., y n be an ordered basis of F2 n and let d be odd. Let z be an odd weight vector of F2 n+1 and let B be the ordered basis ŷ 1,..., ŷ n, z. Then the B -greedy code of distance d + 1 is obtained from the B greedy code of distance d by adding a parity check. 75
76 We can play a game analogous to these codes as well. The game is played on the binary n-tuples. A legal move consists of moving to a position earlier in the B order subject to the condition that the new vector is with in d of the old. The last player to move wins. 76
77 Note that if g(z) = 0 then the only moves are to vectors x such that g(x) 0. And if g(z) 0, there is a vector x such that g(x) = 0. So the winning positions of the game are exactly the 0 positions which form the code. 77
78 Conclusions There is a strong connection between games and codes. Using greedy algorithms allows is to get familiar codes. The greedy algorithms are easy to understand and implement. 78
79 Buraldi, Richard and Pless, Vera Greedy Codes Journal of Combinatorial Theory Ser A 1993 pp Conway, John H. and Sloane N.J.A. Lexicographic Codes: Error-Correcting Codes from Game Theory IEEE Transactions on Information Theory May 1986 pp Conway, John H Integral Lexicographic Codes Discrete Mathematics 1990 pp
Lexicographic Codes: Error-Correcting Codes from Game Theory
IEEE TRANSACTIONS ON INFORMATlON THEORY, VOL. IT-32, NO. 3, MAY 1986 Lexicographic Codes: Error-Correcting Codes from Game Theory 337 JOHN H. CONWAY AND N. J. A. SLOANE, FELLOW, IEEE A~.~hslruct-Lexicographic
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationHamming Codes 11/17/04
Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationarxiv: v2 [math.co] 9 Aug 2011
Winning strategies for aperiodic subtraction games arxiv:1108.1239v2 [math.co] 9 Aug 2011 Alan Guo MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA aguo@mit.edu Abstract
More informationPARTIAL NIM. Chu-Wee Lim Department of Mathematics, University of California Berkeley, Berkeley, CA , USA.
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 5 (005), #G0 PARTIAL NIM Chu-Wee Lim Department of Mathematics, University of California Berkeley, Berkeley, CA 9470-3840, USA limchuwe@math.berkeley.edu
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationEASY PUTNAM PROBLEMS
EASY PUTNAM PROBLEMS (Last updated: December 11, 2017) Remark. The problems in the Putnam Competition are usually very hard, but practically every session contains at least one problem very easy to solve
More informationSlow k-nim. Vladimir Gurvich a
R u t c o r Research R e p o r t Slow k-nim Vladimir Gurvich a Nhan Bao Ho b RRR 3-2015, August 2015 RUTCOR Rutgers Center for Operations Research Rutgers University 640 Bartholomew Road Piscataway, New
More informationELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes
ELEC 405/ELEC 511 Error Control Coding Hamming Codes and Bounds on Codes Single Error Correcting Codes (3,1,3) code (5,2,3) code (6,3,3) code G = rate R=1/3 n-k=2 [ 1 1 1] rate R=2/5 n-k=3 1 0 1 1 0 G
More informationMATH4250 Game Theory 1. THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory
MATH4250 Game Theory 1 THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory Contents 1 Combinatorial games 2 1.1 Combinatorial games....................... 2 1.2 P-positions
More information#G03 INTEGERS 10 (2010), MIN, A COMBINATORIAL GAME HAVING A CONNECTION WITH PRIME NUMBERS
#G03 INTEGERS 10 (2010), 765-770 MIN, A COMBINATORIAL GAME HAVING A CONNECTION WITH PRIME NUMBERS Grant Cairns Department of Mathematics, La Trobe University, Melbourne, Australia G.Cairns@latrobe.edu.au
More informationCombinatorial Games, Theory and Applications. Brit C. A. Milvang-Jensen
Combinatorial Games, Theory and Applications Brit C. A. Milvang-Jensen February 18, 2000 Abstract Combinatorial games are two-person perfect information zero-sum games, and can in theory be analyzed completely.
More informationImpartial Games. Lemma: In any finite impartial game G, either Player 1 has a winning strategy, or Player 2 has.
1 Impartial Games An impartial game is a two-player game in which players take turns to make moves, and where the moves available from a given position don t depend on whose turn it is. A player loses
More informationPLAYING END-NIM WITH A MULLER TWIST
#G5 INTEGERS 17 (2017) PLAYING END-NIM WITH A MULLER TWIST David G. C. Horrocks School of Mathematical and Computational Sciences, University of Prince Edward Island, Charlottetown, PE, Canada dhorrocks@upei.ca
More informationGeometrical extensions of Wythoff s game
Discrete Mathematics 309 (2009) 3595 3608 www.elsevier.com/locate/disc Geometrical extensions of Wythoff s game Eric Duchêne, Sylvain Gravier Institut Fourier, ERTé Maths à modeler Grenoble, France Received
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationCyclic codes. I give an example of a shift register with four storage elements and two binary adders.
Good afternoon, gentleman! Today I give you a lecture about cyclic codes. This lecture consists of three parts: I Origin and definition of cyclic codes ;? how to find cyclic codes: The Generator Polynomial
More informationAnd for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)
Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationELEC 405/ELEC 511 Error Control Coding and Sequences. Hamming Codes and the Hamming Bound
ELEC 45/ELEC 5 Error Control Coding and Sequences Hamming Codes and the Hamming Bound Single Error Correcting Codes ELEC 45 2 Hamming Codes One form of the (7,4,3) Hamming code is generated by This is
More informationConsider an infinite row of dominoes, labeled by 1, 2, 3,, where each domino is standing up. What should one do to knock over all dominoes?
1 Section 4.1 Mathematical Induction Consider an infinite row of dominoes, labeled by 1,, 3,, where each domino is standing up. What should one do to knock over all dominoes? Principle of Mathematical
More informationOn Aperiodic Subtraction Games with Bounded Nim Sequence
On Aperiodic Subtraction Games with Bounded Nim Sequence Nathan Fox arxiv:1407.2823v1 [math.co] 10 Jul 2014 Abstract Subtraction games are a class of impartial combinatorial games whose positions correspond
More informationA Projection Decoding of a Binary Extremal Self-Dual Code of Length 40
A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationarxiv: v1 [math.co] 27 Aug 2015
P-positions in Modular Extensions to Nim arxiv:1508.07054v1 [math.co] 7 Aug 015 Tanya Khovanova August 31, 015 Abstract Karan Sarkar In this paper, we consider a modular extension to the game of Nim, which
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationWen An Liu College of Mathematics and Information Science, Henan Normal University, Xinxiang, P.R. China
#G4 INTEGERS 1 (01) ON SUPPLEMENTS OF M BOARD IN TOPPLING TOWERS Wen An Liu College of Mathematics and Information Science, Henan Normal University, Xinxiang, P.R. China liuwenan@16.com Haifeng Li College
More informationSubtraction games. Chapter The Bachet game
Chapter 7 Subtraction games 7.1 The Bachet game Beginning with a positive integer, two players alternately subtract a positive integer < d. The player who gets down to 0 is the winner. There is a set of
More informationChapter 2. Error Correcting Codes. 2.1 Basic Notions
Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationError-Correcting Codes Derived from Combinatorial Games
Games of No Chance MSRI Publications Volume 29, 1996 Error-Correcting Codes Derived from Combinatorial Games AVIEZRI S. FRAENKEL Abstract. The losing positions of certain combinatorial games constitute
More informationMartin Gardner and Wythoff s Game
Martin Gardner and Wythoff s Game February 1, 2011 What s a question to your answer? We will not settle this puzzle here, yet we ll taste it. But let s begin at the beginning, namely in 1907, when Willem
More informationAlgebraic Structure in a Family of Nim-like Arrays
Algebraic Structure in a Family of Nim-like Arrays Lowell Abrams Department of Mathematics The George Washington University Washington, DC 20052 U.S.A. labrams@gwu.edu Dena S. Cowen-Morton Department of
More informationIntroduction to Combinatorial Game Theory
Introduction to Combinatorial Game Theory Tom Plick Drexel MCS Society April 10, 2008 1/40 A combinatorial game is a two-player game with the following properties: alternating play perfect information
More informationERROR CORRECTING CODES
ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A
More informationAnalysis of odd/odd vertex removal games on special graphs
Analysis of odd/odd vertex removal games on special graphs Master Thesis, Royal Institute of Technology - KTH, 2012 Oliver Krüger okruger@kth.se May 21, 2012 Thesis advisor: Jonas Sjöstrand, KTH Abstract
More informationModular numbers and Error Correcting Codes. Introduction. Modular Arithmetic.
Modular numbers and Error Correcting Codes Introduction Modular Arithmetic Finite fields n-space over a finite field Error correcting codes Exercises Introduction. Data transmission is not normally perfect;
More informationKnow the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].
The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive
More informationSUMBERS SUMS OF UPS AND DOWNS. Kuo-Yuan Kao National Penghu Institute of Technology, Taiwan. Abstract
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 5 (2005), #G01 SUMBERS SUMS OF UPS AND DOWNS Kuo-Yuan Kao National Penghu Institute of Technology, Taiwan stone@npit.edu.tw Received: 4/23/04,
More informationAperiodic Subtraction Games
Aperiodic Subtraction Games Aviezri S. Fraenkel Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100, Israel Submitted: 2011; Accepted: 2011; Published: XX
More informationMath 512 Syllabus Spring 2017, LIU Post
Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30
More informationNotes 10: Public-key cryptography
MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such
More informationBinary dicots, a core of dicot games
Binary dicots, a core of dicot games Gabriel Renault Univ. Bordeaux, LaBRI, UMR5800, F-33400 Talence CNRS, LaBRI, UMR5800, F-33400 Talence Department of Mathematics, Beijing Jiaotong University, Beijing
More informationPoset-Game Periodicity
Poset-Game Periodicity Steven Byrnes Final Siemens-Westinghouse Version September 29, 2002 Abstract In this paper, we explore poset games, a large class of combinatorial games which includes Nim, Chomp,
More informationChapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005
Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each
More informationMathematics Department
Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find
More informationMATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016
MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]
More informationA 2-error Correcting Code
A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationMATH 433 Applied Algebra Lecture 22: Review for Exam 2.
MATH 433 Applied Algebra Lecture 22: Review for Exam 2. Topics for Exam 2 Permutations Cycles, transpositions Cycle decomposition of a permutation Order of a permutation Sign of a permutation Symmetric
More informationChampion Spiders in the Game of Graph Nim
Champion Spiders in the Game of Graph Nim Neil J. Calkin, Janine E. Janoski, Allison Nelson, Sydney Ryan, Chao Xu Abstract In the game of Graph Nim, players take turns removing one or more edges incident
More informationRings If R is a commutative ring, a zero divisor is a nonzero element x such that xy = 0 for some nonzero element y R.
Rings 10-26-2008 A ring is an abelian group R with binary operation + ( addition ), together with a second binary operation ( multiplication ). Multiplication must be associative, and must distribute over
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More information1. Consider the conditional E = p q r. Use de Morgan s laws to write simplified versions of the following : The negation of E : 5 points
Introduction to Discrete Mathematics 3450:208 Test 1 1. Consider the conditional E = p q r. Use de Morgan s laws to write simplified versions of the following : The negation of E : The inverse of E : The
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationGroups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems
Group Theory Groups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems Groups Definition : A non-empty set ( G,*)
More information1 Basic Combinatorics
1 Basic Combinatorics 1.1 Sets and sequences Sets. A set is an unordered collection of distinct objects. The objects are called elements of the set. We use braces to denote a set, for example, the set
More informationB Sc MATHEMATICS ABSTRACT ALGEBRA
UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc MATHEMATICS (0 Admission Onwards) V Semester Core Course ABSTRACT ALGEBRA QUESTION BANK () Which of the following defines a binary operation on Z
More informationThe extended Golay code
The extended Golay code N. E. Straathof July 6, 2014 Master thesis Mathematics Supervisor: Dr R. R. J. Bocklandt Korteweg-de Vries Instituut voor Wiskunde Faculteit der Natuurwetenschappen, Wiskunde en
More informationOrganization Team Team ID#
1. [4] A random number generator will always output 7. Sam uses this random number generator once. What is the expected value of the output? 2. [4] Let A, B, C, D, E, F be 6 points on a circle in that
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationTraditional Lexicodes. Linear Bound on Decoding Steps. Quadratic Bound on Decoding Steps State Bound=2^6 State Bound=2^5 State Bound=2^4
Lexicographic Codes: Constructions Bounds, and Trellis Complexity Ari Trachtenberg Digital Computer Laboratory University of Illinois at Urbana-Champaign 1304 W. Springeld Avenue, Urbana, IL 61801 Alexander
More informationAlgorithmic Problem Solving. Roland Backhouse January 29, 2004
1 Algorithmic Problem Solving Roland Backhouse January 29, 2004 Outline 2 Goal Introduce principles of algorithm construction Vehicle Fun problems (games, puzzles) Chocolate-bar Problem 3 How many cuts
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationAlgebraic Structure in a Family of Nim-like Arrays
Algebraic Structure in a Family of Nim-like Arrays Lowell Abrams Department of Mathematics The George Washington University Washington, DC 20052 U.S.A. labrams@gwu.edu Dena S. Cowen-Morton Department of
More informationPUTNAM TRAINING EASY PUTNAM PROBLEMS
PUTNAM TRAINING EASY PUTNAM PROBLEMS (Last updated: September 24, 2018) Remark. This is a list of exercises on Easy Putnam Problems Miguel A. Lerma Exercises 1. 2017-A1. Let S be the smallest set of positive
More informationUSA Mathematical Talent Search Round 3 Solutions Year 20 Academic Year
1/3/20. Let S be the set of all 10-digit numbers (which by definition may not begin with 0) in which each digit 0 through 9 appears exactly once. For example, the number 3,820,956,714 is in S. A number
More informationINTRODUCTION TO THE GROUP THEORY
Lecture Notes on Structure of Algebra INTRODUCTION TO THE GROUP THEORY By : Drs. Antonius Cahya Prihandoko, M.App.Sc e-mail: antoniuscp.fkip@unej.ac.id Mathematics Education Study Program Faculty of Teacher
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More informationOrdinal Partizan End Nim
Ordinal Partizan End Nim Adam Duffy, Garrett Kolpin, and David Wolfe October 24, 2003 Introduction Partizan End Nim is a game played by two players called Left and Right. Initially there are n stacks of
More informationPUTNAM PROBLEM SOLVING SEMINAR WEEK 7 This is the last meeting before the Putnam. The Rules. These are way too many problems to consider. Just pick a
PUTNAM PROBLEM SOLVING SEMINAR WEEK 7 This is the last meeting before the Putnam The Rules These are way too many problems to consider Just pick a few problems in one of the sections and play around with
More informationVariants of the Game of Nim that have Inequalities as Conditions
Rose-Hulman Undergraduate Mathematics Journal Volume 10 Issue 2 Article 12 Variants of the Game of Nim that have Inequalities as Conditions Toshiyuki Yamauchi Kwansei Gakuin University, Japan Taishi Inoue
More informationRings and Fields Theorems
Rings and Fields Theorems Rajesh Kumar PMATH 334 Intro to Rings and Fields Fall 2009 October 25, 2009 12 Rings and Fields 12.1 Definition Groups and Abelian Groups Let R be a non-empty set. Let + and (multiplication)
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationOne Pile Nim with Arbitrary Move Function
One Pile Nim with Arbitrary Move Function by Arthur Holshouser and Harold Reiter Arthur Holshouser 3600 Bullard St. Charlotte, NC, USA, 28208 Harold Reiter Department of Mathematics UNC Charlotte Charlotte,
More informationA Family of Nim-Like Arrays: The Locator Theorem
locator theorem paper v 2.pdf A Family of Nim-Like Arrays: The Locator Theorem Lowell Abrams a,denas.cowen-morton b, a Department of Mathematics, The George Washington University, Washington, DC 20052
More informationCSE 20 DISCRETE MATH WINTER
CSE 20 DISCRETE MATH WINTER 2016 http://cseweb.ucsd.edu/classes/wi16/cse20-ab/ Today's learning goals Explain the steps in a proof by (strong) mathematical induction Use (strong) mathematical induction
More information3.1 Induction: An informal introduction
Chapter 3 Induction and Recursion 3.1 Induction: An informal introduction This section is intended as a somewhat informal introduction to The Principle of Mathematical Induction (PMI): a theorem that establishes
More information1 What is the area model for multiplication?
for multiplication represents a lovely way to view the distribution property the real number exhibit. This property is the link between addition and multiplication. 1 1 What is the area model for multiplication?
More informationarxiv: v1 [cs.it] 25 Mar 2010
LARGE CONSTANT DIMENSION CODES AND LEXICODES arxiv:1003.4879v1 [cs.it] 25 Mar 2010 Natalia Silberstein Computer Science Department Technion - Israel Institute of Technology Haifa, Israel, 32000 Tuvi Etzion
More informationTHE RALEIGH GAME. Received: 1/6/06, Accepted: 6/25/06. Abstract
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 7(2) (2007), #A13 THE RALEIGH GAME Aviezri S. Fraenkel 1 Department of Computer Science and Applied Mathematics, Weizmann Institute of Science,
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationTeddy Einstein Math 4320
Teddy Einstein Math 4320 HW4 Solutions Problem 1: 2.92 An automorphism of a group G is an isomorphism G G. i. Prove that Aut G is a group under composition. Proof. Let f, g Aut G. Then f g is a bijective
More informationMisère canonical forms of partizan games
Games of No Chance 4 MSRI Publications Volume 63, 2015 Misère canonical forms of partizan games AARON N. SIEGEL We show that partizan games admit canonical forms in misère play. The proof is a synthesis
More informationError-correcting Pairs for a Public-key Cryptosystem
Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and
More informationKevin James. MTHSC 412 Section 3.1 Definition and Examples of Rings
MTHSC 412 Section 3.1 Definition and Examples of Rings A ring R is a nonempty set R together with two binary operations (usually written as addition and multiplication) that satisfy the following axioms.
More informationarxiv:cs/ v1 [cs.it] 15 Sep 2005
On Hats and other Covers (Extended Summary) arxiv:cs/0509045v1 [cs.it] 15 Sep 2005 Hendrik W. Lenstra Gadiel Seroussi Abstract. We study a game puzzle that has enjoyed recent popularity among mathematicians,
More informationProof: Let the check matrix be
Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion
More informationFinite and Infinite Sets
Chapter 9 Finite and Infinite Sets 9. Finite Sets Preview Activity (Equivalent Sets, Part ). Let A and B be sets and let f be a function from A to B..f W A! B/. Carefully complete each of the following
More informationFinite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal
Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationSingle Pile (Move Size) Dynamic Blocking Nim
Single Pile (Move Size) Dynamic Blocking Nim Abstract: Several authors have written papers dealing with a class of combinatorial games consisting of one-pile counter pickup games for which the maximum
More informationSelf-Dual Cyclic Codes
Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace
More information