AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.

Size: px
Start display at page:

Download "AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587."

Transcription

1 AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research was supported by the National Science Foundation Grants No. GP-5790 and No. GU-2059 and by the Ary Research Office, Durha, Grant No. DA-ARO-D-3l-l24-G9l0. DEPARTMENT OF STATISTICS UNIVERSITY OF NORTH CAROLINA Chapel Hill, N. C.

2 1. Introduction Historically, balanced and partially balanced incoplete block designs have been used priarily for statistical applications in the design of experients. Recently, incoplete block designs have been used by several authors in constructing error-correcting codes. This approach has yielded useful and efficient constructions of codes. This paper presents an application of incoplete block designs to the construction of error-correcting codes which ay be decoded using a relatively siple ajority logic decoding procedure. An identity atrix, I, is adjoined to the incidence atrix, N, of a balanced or partially balanced incoplete block design. The resulting atrix is taken as the parity check atrix of a linear code; a relatively siple ajority logic decoding procedure for error correction ay be used for the code. A brief introduction to incoplete block designs and to linear codes is given in sections 2 and 3 for the reader unfailiar with either area.

3 2 2. Incoplete Block Designs 2.1 Balanced Incoplete Block Designs A balanced incoplete block (BIB) design is an arrangeent of v objects, usually referred to as treatents, into b sets, called blocks, such that the following conditions are satisfied: (i) (ii) each block contains k*l distinct treatents; each treatent occurs in r*l distinct blocks; blocks. (iii) each pair of treatents occur together in exactly A different The variables v, b, r*, k*, A are referred to as the paraeters of the design. The existence and construction of BIB designs are treated in detail by Bose (1939), Bose (1969), Hall (1967), and Ryser (1963), aong others. Ryser (1963) uses the ter (v,b,r*,k*,a)- configuration for a BIB design with paraeters v,b,r*,k*,a. The five paraeters of a BIB design satisfy the following relations (see Bose (1969), for exaple): (2.1.1) vr* = bk*, (2.1.2) A(v-l)= r*(k*-l). Obviously, A~ r*. If O<A<r*, then Fisher's inequality, Bose (1969), states that (2.1. 3) b~ v. If b = v, then, fro equation (2.1.1), r* = k*. In this case, the BIB design is said to be syetrical. ITraditionally, k and r are used as paraeters of a design. We shall use k* and r* to avoid confusion with notation used in coding theory.

4 3 2.2 Partially Balanced Incoplete Block Designs Before proceeding, we need the concept of an association schee, Bose and Shiaoto (1952). An -class association schee is a relation between v treatents satisfying the following conditions: ( a) th any two treatents are either 1st, 2nd,..., or ' associates, the relation of association being syetrical; ( b) h t t t h.th. h d d eac rea en as n i 1 assoc1ates, t e nuber n i being in epen ent of the treatent chosen. ().f d Q th. t th th b f t t t h' h c 1 ~ an ~ are 1 assoc1a es, en e nu er 0 rea en s w 1C are jth associates of ~ and k th associates of ~ is P;k and is independent of t he pari 0 f i th assoc1ates. d ~ an ~. Q (i, j, k=l,2,.., ) i i Pjk = Pkj (1939). i The paraeters v, n i, Pjk are not all independent. For exaple, Other relations aong the paraeters are given by Bose and Nair Given an -class association schee of v treatents, a partially balanced incoplete block (PBIB) design is an arrangeent of the v treatents into b blocks such that (i) (ii) (iii) each block contains k* distinct treatents; each treatent occurs in r* distinct treatents; each pair of treatents which are i th associates occur together in exactly A. 1 blocks (i=1,2,..,). For a PBIB design based on an -class association schee with paraeters v, n., P:k' it is shown by Bose and Nair (1939), for exaple, that 1 J (2.2.1) vr* = bk* and

5 4 (2.2.2) In general, the nuber of blocks need not be as large as the nuber of treatents. A BIB design with paraeters v,b,r*,k*,a ay be considered a PBIB design based on an association schee with one class. 2.3 Incidence Matrix ~~ Design design as Let us arbitrarily label and order the treatents of a PBIB (or BIB) and the blocks, siilarily, as B l ' B 2,, B b We shall say that V. is incident with B. if the treatent V. occurs in the J 1 J block B.. ( i=l, 2,.., b i j =1, 2,..., v.) 1 (2.3.1) The b X v incidence atrix, N, of the design is defined as the atrix where (2.3.2) 1, if Vj ts incidentwith (occurs in) Bii 0, otherwise. (i=1,2, 00.,bi j=1,2,. 00'.) Clearly, each row of N contains k* 1 's and colun of N contains r* 1 'so

6 5 3. Linear Error-Correcting Codes 3.1 Introduction We state here a few basic concepts of linear error-correcting codes. The reader is referred to Peterson (1963) or to Berlekap (1968) for further details. Only binary codes will be considered here. A nuber of essages are to be transitted over a noisy channel fro a source to a destination. Each essage corresponds to a sequence of n binary sybols, say 0 and 1, called a codeword. The n sybols of a codeword t,2 = (t,t,...,t ) are transitted consecutively over the channel. Rando l 2 n "noise" in the channel ay cause a 0 to be received as a 1 or vice versa. If this happens, we shall say that a transission error has occurred. The corresponding received sequence, ~' = (r l,r 2,...,r n ) is not necessarily a codeword. Suppose~' =!' + ~', where~' = (e l,e 2,...,e n ) is the unknown error vector; each coordinate of e' is a 0 or a 1 and the addition is in binary, i.e. over GF(2). The nuber of nonzero coordinates of e' is the nuber of errors which have occurred in transitting!'. We say that it is possible to correct s errors if, assuing at ost s errors have occurred in transitting a codeword, it is possible to deterine correctly which coordinates of the corresponding error vector are nonzero. The correct transitted codeword ay then be obtained by copleenting these coordinates of the received vector. This procedure is called decoding. A binary linear (n,k) code C is a k-diensional subspace of the n diensional vector space over GF(2). k Each of the 2-1 nonzero vectors of C 2The notation a' = (a,a,..,a ) l 2 n colun vector. denotes a row vector; a denotes a

7 6 is a codeword; k is the nuber of inforation sybols of the code C. The redundancy of C is r = n-k. A atrix whose rows span C is a generator atrix of the code. The orthogonal copleent of C, in the usual algebraic sense, is the ~ ~ C'. A parity check atrix of C is a atrix whose rows span the dual code C'. If H is a parity check atrix of C, then the vector~' = (gl,g2'.,gn) is a codeword of C if and only if (3.1.1) Each equation of (3.1.1), corresponding to the rows of H, is a parity check equation. Suppose t' is a transitted codeword and r' is the corresponding received vector. and The error vector is e' Ht = 0 = r' t ' -. Since t' is a codeword of C, then (3.1. 2) Hr = Ht+He = He =!o' say. The vector s = Hr is called the sydroe of the received vector r'. Equation (3.1.2) ay be used for decoding. The syndroe of a received word is ca1- culated and the equation He = s ay be solved, in soe instances, for the unknown error vector ~', assuing at ost, say, of the coordinates of e' are nonzero. 3.2 Systeatic codes If G is the generator atrix of a linear code C and G* is obtained fro G by colun perutations, then G* generates a linear code c* defined to be equivalent to C. Given a (n,k) linear code C, we can find an equivalent code C* for which the generating atrix is

8 7 where r k is the k x k identity atrix and P is a k x (n-k) atrix. Every codeword of C* is a linear cobination of the rows of G* and is of the for (c I ' c 2 '.., c k ' c I PII+c 2 P21+.+c~kl '..., c I Plr+c 2 P 2r '. '+'k J:k r), where c l,c 2,...,c k are arbitrary and P = (Pij)kxr' r = n-k. Thus the first k coordinates of a codeword of c* ay be arbitrarily chosen. The reaining coordinates are linear cobinations of these coordinates. The first k coordinates are inforation places and the reaining r coordinates are redundant places. Such a code is called a systeatic ~. We shall now consider a systeatic (n,k) code C with generator atrix for soe P. Let T H = [p, I J, r where p T denotes the transpose of P. Over GF(2), CpT I r ] G~] = = pt + pt o Thus the vector space generated by the rows of H is orthogonal to that generated by G, i.e., H is a parity check atrix for C. Since the first k coordinates of a codeword in a systeatic code copletely specify the codeword, only these sybols in a received vector need be decoded. The reaining r redundant sybols ay be deterined fro the first k sybols to for the decoded codeword if necessary.

9 8 3.3 Majority-logic decoding The technique of ajority-logic decoding of linear codes was developed by Massey (1963) for particular linear codes. This procedure is based on the concept of a set of parity check equations orthogonal on a given sybol. Let C be an (n,k) linear code and suppose it is possible to find a set of J vectors of the dual code C', say (3.3.1) hj = (hjl,hj2,,hjn)' j = 1,2,...,J such that for fixed, = 1,,n h. = 1 for each j = 1,2,...,J J (3.3.2) = 0 for all but at ost one j = 1,2,...,J and for any fixed u F:. of these J That is, each vectors of the J vectors h~ has th coordinate 1 and at ost one -J has u th coordinate 1 for any u F:. Then the set of J equations (3.3.3) h'lel+h'2e2+...+hj e =s., u=1,2,.,j J J,n n J are said to be orthogonal ~ the sybol!ro' (Massey (1963». If the set of equations (3.3.3) corresponds to a set of parity check equations for a linear code C, then a ajority-logic procedure ay be used to deterine the error sybol e and thus decode the received sybol r into the corresponding sybol t fro the following theore. Theore Suppose a set of J parity check equations (3.3.3) orthogonal as the sybol e ay be found for a linear code C. Then, provided at ost ~f2j3 errors have occured, the sybol e is given correctly by the following rule: 3The notation [x] denotes the greatest integer less than or equal to x.

10 (1) e is that value of GF(2) which is assued by the ajority (greatest fraction) of the [s.}, provided such a value exists; J (2) e is zero if the [s.} take on the values 0 and 1 with equal frequency. J This theore is proved by Massey (1963). We shall oit the proof here 9 and prove a generalization of the theore which does not assue the orthogonality of the parity check equations on a particular sybol. This generalization appears in Rudolph (1967) and Sith (1967). Theore Let C be a linear (n,h) code and let (3.3.4) h.!el+h '2e2+".+h j = 1,2,...,J 0 e = So J J In n J be a set of J parity check equations such that (3.3.5) hj = 1,j = 1,2,...,J. Assue that for any u ~, (3.3.6) h = 1 for at ost A subscripts j = 1,2,..,J. ju Then, provided at ost [J/ 2A ] errors have occurred, the sybol e is given correctly by the following rule: (1) the (2) e is that value of GF(2) which is assued by the greatest fraction of [s.}, if such a ost frequent value exists. J e is zero if the [so} take on the values 0 and 1 with equal frequency. J Proof: Suppose at ost t = [J/ 2A ] errors have occurred. Then at ost t of the sybols e l,e 2,..,e n are nonzero. If all sybols other than e were zero, then (3.3.7) s =e,j=1,2,...,j j and the decision rule of the theore is correct. If one of the other sybols is nonzero, then at ost A of the s. in equation (3.3.7) are different fro J e. In general, if x other sybols are nonzero, at ost XA of the So in J equation (3.3.7) are different fro e ' since each of these sybols can

11 affect at ost A of the s. J If ern = 0, then if t or fewer of the error sybols are nonzero, at ost ta of the s. are nonzero. Since J~2tA, then the decision rule of the theore J gives the correct value of e. If e = 1, then if (t-l) or fewer of the other error sybols are nonzero, at ost (t-l)a of the s. are different fro e. Since J >2(t-l)A, then the J greatest fraction of the s. are equal to 1 and the decision rule of the J theore gives the correct value of e. 3.4 Majority Decodable Codes A nuber of linear codes have been shown to be decodable using ajority 10 logic techniques. Aong these are the Reed-Muller codes and their generalizations discussed by Kasarni et al (1968) and Weldon (1968), as well as the codes tered "geoetric codes" by Goethals and Delsarte (1967), Rudolph (1967) and Sith (1967). Townsend and Weldon (1967) have investigated a class of codes called quasi-cyclic self-orthogonal codes, to which a ajority logic decoding algorith ay be applied. With the exception of the latter codes and soe special cases of the other codes entioned above, the proble of deterining a general expression for the nuber of inforation sybols in these codes is difficult and has not yet been copletely solved. To avoid this difficulty, we shall present in section 4 a class of linear codes which ay be ajority logic decodable and for which the nuber of inforation sybols is iediately deterined. Special cases of these codes are equivalent to the quasi-cyclic self orthogonal codes discussed by Townsend and Weldon (1967).

12 11 4. Systeatic ~ Design Codes 4.1 Definition We define a large class of linear codes, which we shall call systeatic block design codes, as follows. Let N be the b x v incidence atrix, defined in section 2.3, of a balanced or partially balanced incoplete block design D with paraeters v,b,r*,k*,al,...,a. Let I be an identity atrix of order b. The systeatic b block design code (associated with the design D) is the (binary) linear code orthogonal to the row space of the atrix (4.1.1) that is, the linear code for which H is a parity check atrix. The systeatic block design code associated with the atrix H has the following iediate properties. (1) The length of the code is n = v+b (2) (3) (4) (5) (4.1.2) (6) (4.1. 3) The redundancy is r = b. The nuber of inforation sybols is k = n-r=v. The code is systeatic but not necessarily cyclic. The generator atrix of the code is T G=[I,N] v The inforation rate R =kin is v 1 R = V+b = l+b/ v Clearly, Rs1 if and only if b~v. For a BIB design b~v. Thus we ay state Lea The inforation rate of a systeatic block design code associated With a BIB design is at ost 1. In searching for a high rate (R>l, say) systeatic block design code, we

13 ust therefore restrict our attention to codes associated with PBIB designs for which b<v. Soe exaples of such codes will be given in section Encoding ~ Decoding Since the codes are systeatic, the encoding or construction of codewords is relatively siple. The first k = v sybols ay be chosen arbitrarily; the reaining r = b redundant sybols are linear cobinations, deterined by the generator atrix in equation (4.1.2), of the k inforation sybols. A relatively siple ajority logic decoding procedure ay be used for the systeatic block design codes. We state this as a theore. Theore Let C be a systeatic block design code associated with a (partially) balanced incoplete block design D with paraeters v,b,r*,k*, (4.2.1) Up to [r*/ 2A J errors ay be corrected using a one-step ajority logic decoding procedure. Proof: It is necessary to correct only the inforation sybols, for the redundant sybols ay then be deterined fro the encoding procedure. EaCh row of the parity check atrix of the code deterines a parity check equation. If N is the incidence atrix of the associated design, then the parity check atrix for the code is H = [N, I]. Each of the first k = v inforation sybols corresponds to a treatent in the design. Each row of H corresponds to a block. The first k entries in a row are 1 or 0, according to whether the appropriate treatent occurs or does not occur in the corresponding block. Each treatent occurs in r* blocks.

14 and the r* rows of H cor Consider anyone of the v treatents, say V a responding to the blocks in which V occurs. Each of the r* parity check a equations deterined by these rows, (4.2.2) h e + h e + jl l j2 2 say 13 Let us relabel the rows such that these are the first r* rows of H. Then for j = 1,2,...,r*, = 1. If treatent V and V are i th associates, then u a Moreover, h. = 1 for at ost Xi subscripts j = 1,2,..,r* JU and for any fixed u p a, l~u~v. h ja = 1 for at ost one j = 1,2,,r* if v+l~a$n. Thus, if X = ax Xi' then l$i$ro (4.2.3) fixed u p a. h. = 1 for j = 1,2,...,r* Ja h ju = 1 for at ost X subscripts j = 1,2,...,r* and for any Hence, fro Theore 3.3.2, a ajority logic decoding procedure ay be used to deterine e. This will a have occurred. The procedure is give e a correctly if at ost [r*/ 2X ] to consider the set of r* parity check errors equations corresponding to the blocks in which treatent V occurs. The a sybol e a is given as that value of GF(2) which is assued by the greatest fraction of the corresponding s. in the syndroe vector. J fraction exists, then e a is zero. If no such greatest This procedure is repeated for each of the reaining v-i inforation sybols and yields the inforation sybols of the codeword corresponding to a received word correctly, provided at ost []tjerrors have occurred.

15 Systeatic Block Design Codes Associated ~~ Designs A systeatic block design code associated with a BIB design with paraeters v,b,r*,k*,a is a (n,k) linear code with n = v+b and k = v. Th~ ajority-logic decoding procedure described in section 4.2 will correct up to [r*/2aj errors. In this section, we give a few exaples of these codes associated with particular BIB designs. The literature on BIB designs is extensive and includes any constructions for a wide range of design paraeters. The reader is referred to Bose (1969) for a coprehensive treatent of such designs and to ethods of constructing the designs entioned below. BIB designswith k* = 3 and A = 1 are called Steiner triple systes. It ay be shown that these conditions iply that r* ust be of the for 3t+l or 3t for soe positive integer t. In the case r* = 3t+l, the paraeters are v = 6t+3, b = (3t+l)(2t+l), r* = 3t+l, k* = 3, A =1. This series of designs is referred to as the T l series and exists for all values of t. The systeatic block codes associated with the T l designs have n = v+b = (2t+l) (3t+4) k = v = 6t+3 3 R = kin = 3t+4 and the ajority decoding procedure described earlier will correct up to [r*/2j = [3~+lJ errors. Table lists these paraeters of the codes with soe of the T l series of designs.

16 15 TABLE Systeatic Block Design Codes Associated With T l Series v = 6t+3, b = (3t+l)(2t+l), r* = 3t+l, k* = 3, A = 1 t Code Inforation Errors Rate Length Sybols Corrected These codes have low rates and only a relatively sall nuber of errors are guaranteed correctable by the ajority decoding procedure. A different series of BIB designs with ~ = 1 are the BIB designs constructed fro finite projective planes. These designs are often called the orthogonal series 2 or OS2 series. The paraeters are 2 v = b = s +s+l, r* = k* = s+l, ~ = 1. Such designs are known to exist when s is a prie power. The associated systeatic block design codes have n = v+b k = v = 2 = 2(s +s+l), 2 2( s +5+1), R = k/ =!, n and up to ~*/ 2J = [s;lj errors ay be corrected by our decoding procedure. These paraeters of soe codes are exhibited in Table

17 16 TABLE Systeatic Block Design Codes Associated With OS2 Series 2 v = b = s +s+l, r* = k* = s+l, A = 1 s Code Inforation Errors Rate Length Sybols Corrected While these codes have rate.5, the nuber of errors corrected is still relatively sall. 4.4 Systeatic Block Design Codes Associated with ~ Designs A systeatic block design code associated with a PBIB design with paraeters v, b, r*, k *, A. l ',A. has [r*/2aj errors ay be corrected described in Section 4.2. n = v+b and k = v. If A. = ax A.., then up to. 1 1 S1: using the ajority-logic decoding procedure Of particular interest are the PBIB designs with b<v, for the rates of the associated codes are greater than 1. We shall consider here codes associated with soe PBIB designs based on partial geoetries, Bose (1963), for which b<v. If the roles of treatents and blocks of a BIB design with A. = 1 are interchanged, then the resulting design, called the dual design, is a PBIB

18 17 design with paraeters b,v,k*,r*,l,o. This notation iplies that the nuber of treatents is b, etc. Consider the T series of BIB designs, discussed in section 4.3. The l dual designs are PBIB designs with paraeters v = (3t+l)(2t+l), b = 6t+3, r* = 3, k* = 3t+l, Al = 1, A 2 = 0. The resulting systeatic block design codes have n = (2t+l) (3t+4) k = (3t+l) (2t+l) R = 3t+l 3t+4 and the ajority decoding procedure will Table exhibits these properties of correct up to [3/~ = 1 error. soe such codes. TABLE Systeatic Block Design Codes Associated With Duals of T 1 Designs v = (3t+l)(2t+l), b = 6t+l, r* = 3, k* = 3t+l, Al = 1, A 2 = t Code Inforation Errors Rate Length Sybols Corrected These codes have high rates, although only a single error is guaranteed correctable by the ajority decoding procedure. The latter property is not necessarily a disadvantage, however.

19 A ore interesting PBIB design is that obtained fro the configuration of points and generators on an elliptic non-degenerate quadric Q 5 in the 18 finite projective space PG(5,s). Taking treatents as generators and blocks as points, we obtain a PBIB design with paraeters. 233 v = (s +l)(s +1), b = (s+l)(s +1) r* = s+l, k* This design is discussed by Ray-Chaudhuri (1962) and Bose (1963). Table gives the paraeters of the associated syetric block design code for a few values of s, s being a prie power. TABLE Systeatic Block Design Codes Associated With The PBIB Design v = (s +l)(s +1), b = (s+l)(s +1), r* = s+l, k* = s +1, A 1 =1, A 2 =0 s Code Inforation Errors Rate Length Sybols Corrected Discussion A systeatic block design code associated with an incoplete block design with v treatents and b blocks has rate R -...!- If b~v, then R.< v+b If the associated design is a (P)BIB design with paraeters v,b,r*,k*, AI'..,A, then, fro equation (2.1.1), vr* b =- k*

20 19 and R = k* k*+r* = 1 Since the ore interesting codes are those whose rates are bounded away fro zero, designs for which r*/k* is bounded will be ore useful. The nuber of errors corrected by the ajority logic decoding procedure is [r*/2~. Thus, designs with relatively large values of r* and relatively sall values of A = ax Ai will also be of interest. lsi$. Designs with r* relatively large have not yet been investigated as thoroughly as those with r* $.20, Until the advent of coputers, designs with large values of r* and k* have been ipractical for statistical application. However, further research on these designs ay yield iportant results in such areas as the constructions of error-correcting codes. The nuber of errors guaranteed correctable by a ajority decoding procedure of the systeatic block design codes is relatively sall. However, a ore iportant property of a code is the average probability of incorrect decoding. An upper bound on the probability of a decoding error ay be calculated for the systeatic block design codes for which A = 1. This will be the subject of a separate report.

21 20 REFERENCES 1. Berlekap, E. R. (1968). Algebraic Coding Theory, McGraw-Hill, New York. 2. Bose, R. C. (1939). "On the construction of balanced incoplete block designs," Ann. Eugenics, ~, Bose, R. C. (1963). "Strongly regular graphs, partial geoetries and partially balanced designs," ~. :!.. Math., 22, Bose, R. C. (1969). Cobinatorial Probles of Experiental Designs, Vol I, John Wiley and Sons, New York, (to appear). 5. Bose, R. C. and Nair, K. R. (1939). "Partially balanced incoplete block designs," Sankhya,.,!, Bose, R. C. and Shiaoto, T. (1952). "Classification and analysis of partially balanced designs with two associate classes,"!.. ~. Statist. Assoc., ~, Goethals, J. M. and Delsarte, p. (196). "On a class of ajority logic decodable cyclic codes," IEEE Trans. on Inforation Theory, IT-14, Hall, M., Jr. (1967). Cobinatorial Theory, Blaisdell, Wathha, Mass. 9. Kasai, T., S. Lin and W. W. Peterson. (1968). the Reed-Muller codes - Part I: Priitive Inforation Theory, It-14, "New generalizations of codes," ~ Trans. on 10. Massey, J. L. (1963). Threshold Decoding, M.I.T. Press, Cabridge, Mass. 11. Peterson, W. W. (1961). Error-Correcting Codes, M.I.T. Press, Cabridge, Mass. 12. Ray-Chaudhuri, D. K. (1962). "Application of the geoetry of quadrics for constructing PBIB designs," ~. ~. Statist., ~, Rudolph, L. D. (1967). "A class of ajority logic decodable codes," ~ Trans. ~ Inforation Theory, IT-13, Ryser, H. J. (1963). Cobinatorial Matheatics, Carus Math. Monograph No. 14, Matheatical Association of Aerica, Buffalo, N. Y. 15. Sith, K. J. C. (1967). "Majority decodable derived fro finite geoetries," Institute of Statistics Mieo Series No. 561, Departent of Statistics, University of North Carolina.

22 16. Townsend, R. L. and Weldon, E. J., Jr. (1967). "Self-orthogonal quasicyclic codes," ~ Trans. ~ Inforation Theory, IT-13, Weldon, E. J., Jr. (1968). "New generalizations of the Reed-Muller codes - Part II: Nonpriitive codes." IEEE Trans. on Inforation Theory, IT-14,

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS.

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. i LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. C. A. CHURCH, Jr. and H. W. GOULD, W. Virginia University, Morgantown, W. V a. In this paper we give

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

APPLICATION OF CYCLIC COLLINEATIONS TO THE CONSTRUCTION OF BAIAKCED L-RESTRICTIONAL IATTICES ABSTRACT

APPLICATION OF CYCLIC COLLINEATIONS TO THE CONSTRUCTION OF BAIAKCED L-RESTRICTIONAL IATTICES ABSTRACT APPLICATION OF CYCLIC COLLINEATIONS TO THE CONSTRUCTION OF BAIAKCED L-RESTRICTIONAL IATTICES BU-172-M B. L. Raktoe Noveber, 1964 ABSTRACT The construction of balanced -restrictional prie powered lattice

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS

More information

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn

More information

Reed-Muller codes for random erasures and errors

Reed-Muller codes for random erasures and errors Reed-Muller codes for rando erasures and errors Eanuel Abbe Air Shpilka Avi Wigderson Abstract This paper studies the paraeters for which Reed-Muller (RM) codes over GF (2) can correct rando erasures and

More information

MULTIVARIATE ORDER STATISTICS. H. W. Corley. University of Texas at Arlington Arlington, Texas ABSTRACT

MULTIVARIATE ORDER STATISTICS. H. W. Corley. University of Texas at Arlington Arlington, Texas ABSTRACT MULTIVARIATE ORDER STATISTICS H. W. Corley University of Texas at Arlington Arlington, Texas 76019 Key Words and Phrases: orderings; Zattiaes. ABSTRACT Classical order statistics are generalized to rando

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)! THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the Chapter 6 Introduction to binary block codes In this chapter we b e g i n to study binary signal constellations, which are the Euclidean-space iages of binary block codes. Such constellations have bit

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Physics 139B Solutions to Homework Set 3 Fall 2009

Physics 139B Solutions to Homework Set 3 Fall 2009 Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about

More information

A Family of Reversible BCH Codes

A Family of Reversible BCH Codes 1 A Faily of Reversible BCH Codes Shuxing Li, Cunsheng Ding, and Hao Liu Abstract arxiv:1608.0169v1 [cs.it] 7 Aug 016 Cyclic codes are an interesting class of linear codes due to their efficient encoding

More information

The concavity and convexity of the Boros Moll sequences

The concavity and convexity of the Boros Moll sequences The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:

More information

i ij j ( ) sin cos x y z x x x interchangeably.)

i ij j ( ) sin cos x y z x x x interchangeably.) Tensor Operators Michael Fowler,2/3/12 Introduction: Cartesian Vectors and Tensors Physics is full of vectors: x, L, S and so on Classically, a (three-diensional) vector is defined by its properties under

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Jordan Journal of Physics

Jordan Journal of Physics Volue 5, Nuber 3, 212. pp. 113-118 ARTILE Jordan Journal of Physics Networks of Identical apacitors with a Substitutional apacitor Departent of Physics, Al-Hussein Bin Talal University, Ma an, 2, 71111,

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas.

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas. MORE O SQUARE AD SQUARE ROOT OF A ODE O T TREE Xingbo Wang Departent of Mechatronic Engineering, Foshan University, PRC Guangdong Engineering Center of Inforation Security for Intelligent Manufacturing

More information

Worst-case performance of critical path type algorithms

Worst-case performance of critical path type algorithms Intl. Trans. in Op. Res. 7 (2000) 383±399 www.elsevier.co/locate/ors Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007,

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

On APP Decoding SURFACE. Syracuse University. Carlos R.P. Hartmann Syracuse University, Luther D. Rudolph Syracuse University

On APP Decoding SURFACE. Syracuse University. Carlos R.P. Hartmann Syracuse University, Luther D. Rudolph Syracuse University Syracuse University SURFACE Electrical Engineering and Coputer Science Technical Reports College of Engineering and Coputer Science 6-1981 On APP Decoding Carlos R.P. Hartann Syracuse University, chartan@syr.edu

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

MINIMUM DISTANCE DECODING OF GENERAL ALGEBRAIC GEOMETRY CODES VIA LISTS

MINIMUM DISTANCE DECODING OF GENERAL ALGEBRAIC GEOMETRY CODES VIA LISTS MINIMUM DISTANCE DECODING OF GENERAL ALGEBRAIC GEOMETRY CODES VIA LISTS NATHAN DRAKE AND GRETCHEN L MATTHEWS DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 9634-0975 USA E-MAIL: GMATTHE@CLEMSONEDU

More information

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Week 15-16: Combinatorial Design

Week 15-16: Combinatorial Design Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

ON SOME MATRIX INEQUALITIES. Hyun Deok Lee. 1. Introduction Matrix inequalities play an important role in statistical mechanics([1,3,6,7]).

ON SOME MATRIX INEQUALITIES. Hyun Deok Lee. 1. Introduction Matrix inequalities play an important role in statistical mechanics([1,3,6,7]). Korean J. Math. 6 (2008), No. 4, pp. 565 57 ON SOME MATRIX INEQUALITIES Hyun Deok Lee Abstract. In this paper we present soe trace inequalities for positive definite atrices in statistical echanics. In

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

+ -d-t-' )=1. = vpi. Aportaciones Matematicas Comunicaciones 17 (1996) 5-10.

+ -d-t-' )=1. = vpi. Aportaciones Matematicas Comunicaciones 17 (1996) 5-10. Aportaciones Mateaticas Counicaciones 17 (1996) 5-10. 1. A suary of the proble Much of the processing that is used in the petroleu industry requires the consideration of a large nuber of cheical reactions.

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Cosine similarity and the Borda rule

Cosine similarity and the Borda rule Cosine siilarity and the Borda rule Yoko Kawada Abstract Cosine siilarity is a coonly used siilarity easure in coputer science. We propose a voting rule based on cosine siilarity, naely, the cosine siilarity

More information

VC Dimension and Sauer s Lemma

VC Dimension and Sauer s Lemma CMSC 35900 (Spring 2008) Learning Theory Lecture: VC Diension and Sauer s Lea Instructors: Sha Kakade and Abuj Tewari Radeacher Averages and Growth Function Theore Let F be a class of ±-valued functions

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Standard & Canonical Forms

Standard & Canonical Forms Standard & Canonical Fors CHAPTER OBJECTIVES Learn Binary Logic and BOOLEAN AlgebraLearn How to ap a Boolean Expression into Logic Circuit Ipleentation Learn How To anipulate Boolean Expressions and Siplify

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Mechanics Physics 151

Mechanics Physics 151 Mechanics Physics 5 Lecture Oscillations (Chapter 6) What We Did Last Tie Analyzed the otion of a heavy top Reduced into -diensional proble of θ Qualitative behavior Precession + nutation Initial condition

More information