AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.
|
|
- Nora Watkins
- 6 years ago
- Views:
Transcription
1 AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research was supported by the National Science Foundation Grants No. GP-5790 and No. GU-2059 and by the Ary Research Office, Durha, Grant No. DA-ARO-D-3l-l24-G9l0. DEPARTMENT OF STATISTICS UNIVERSITY OF NORTH CAROLINA Chapel Hill, N. C.
2 1. Introduction Historically, balanced and partially balanced incoplete block designs have been used priarily for statistical applications in the design of experients. Recently, incoplete block designs have been used by several authors in constructing error-correcting codes. This approach has yielded useful and efficient constructions of codes. This paper presents an application of incoplete block designs to the construction of error-correcting codes which ay be decoded using a relatively siple ajority logic decoding procedure. An identity atrix, I, is adjoined to the incidence atrix, N, of a balanced or partially balanced incoplete block design. The resulting atrix is taken as the parity check atrix of a linear code; a relatively siple ajority logic decoding procedure for error correction ay be used for the code. A brief introduction to incoplete block designs and to linear codes is given in sections 2 and 3 for the reader unfailiar with either area.
3 2 2. Incoplete Block Designs 2.1 Balanced Incoplete Block Designs A balanced incoplete block (BIB) design is an arrangeent of v objects, usually referred to as treatents, into b sets, called blocks, such that the following conditions are satisfied: (i) (ii) each block contains k*l distinct treatents; each treatent occurs in r*l distinct blocks; blocks. (iii) each pair of treatents occur together in exactly A different The variables v, b, r*, k*, A are referred to as the paraeters of the design. The existence and construction of BIB designs are treated in detail by Bose (1939), Bose (1969), Hall (1967), and Ryser (1963), aong others. Ryser (1963) uses the ter (v,b,r*,k*,a)- configuration for a BIB design with paraeters v,b,r*,k*,a. The five paraeters of a BIB design satisfy the following relations (see Bose (1969), for exaple): (2.1.1) vr* = bk*, (2.1.2) A(v-l)= r*(k*-l). Obviously, A~ r*. If O<A<r*, then Fisher's inequality, Bose (1969), states that (2.1. 3) b~ v. If b = v, then, fro equation (2.1.1), r* = k*. In this case, the BIB design is said to be syetrical. ITraditionally, k and r are used as paraeters of a design. We shall use k* and r* to avoid confusion with notation used in coding theory.
4 3 2.2 Partially Balanced Incoplete Block Designs Before proceeding, we need the concept of an association schee, Bose and Shiaoto (1952). An -class association schee is a relation between v treatents satisfying the following conditions: ( a) th any two treatents are either 1st, 2nd,..., or ' associates, the relation of association being syetrical; ( b) h t t t h.th. h d d eac rea en as n i 1 assoc1ates, t e nuber n i being in epen ent of the treatent chosen. ().f d Q th. t th th b f t t t h' h c 1 ~ an ~ are 1 assoc1a es, en e nu er 0 rea en s w 1C are jth associates of ~ and k th associates of ~ is P;k and is independent of t he pari 0 f i th assoc1ates. d ~ an ~. Q (i, j, k=l,2,.., ) i i Pjk = Pkj (1939). i The paraeters v, n i, Pjk are not all independent. For exaple, Other relations aong the paraeters are given by Bose and Nair Given an -class association schee of v treatents, a partially balanced incoplete block (PBIB) design is an arrangeent of the v treatents into b blocks such that (i) (ii) (iii) each block contains k* distinct treatents; each treatent occurs in r* distinct treatents; each pair of treatents which are i th associates occur together in exactly A. 1 blocks (i=1,2,..,). For a PBIB design based on an -class association schee with paraeters v, n., P:k' it is shown by Bose and Nair (1939), for exaple, that 1 J (2.2.1) vr* = bk* and
5 4 (2.2.2) In general, the nuber of blocks need not be as large as the nuber of treatents. A BIB design with paraeters v,b,r*,k*,a ay be considered a PBIB design based on an association schee with one class. 2.3 Incidence Matrix ~~ Design design as Let us arbitrarily label and order the treatents of a PBIB (or BIB) and the blocks, siilarily, as B l ' B 2,, B b We shall say that V. is incident with B. if the treatent V. occurs in the J 1 J block B.. ( i=l, 2,.., b i j =1, 2,..., v.) 1 (2.3.1) The b X v incidence atrix, N, of the design is defined as the atrix where (2.3.2) 1, if Vj ts incidentwith (occurs in) Bii 0, otherwise. (i=1,2, 00.,bi j=1,2,. 00'.) Clearly, each row of N contains k* 1 's and colun of N contains r* 1 'so
6 5 3. Linear Error-Correcting Codes 3.1 Introduction We state here a few basic concepts of linear error-correcting codes. The reader is referred to Peterson (1963) or to Berlekap (1968) for further details. Only binary codes will be considered here. A nuber of essages are to be transitted over a noisy channel fro a source to a destination. Each essage corresponds to a sequence of n binary sybols, say 0 and 1, called a codeword. The n sybols of a codeword t,2 = (t,t,...,t ) are transitted consecutively over the channel. Rando l 2 n "noise" in the channel ay cause a 0 to be received as a 1 or vice versa. If this happens, we shall say that a transission error has occurred. The corresponding received sequence, ~' = (r l,r 2,...,r n ) is not necessarily a codeword. Suppose~' =!' + ~', where~' = (e l,e 2,...,e n ) is the unknown error vector; each coordinate of e' is a 0 or a 1 and the addition is in binary, i.e. over GF(2). The nuber of nonzero coordinates of e' is the nuber of errors which have occurred in transitting!'. We say that it is possible to correct s errors if, assuing at ost s errors have occurred in transitting a codeword, it is possible to deterine correctly which coordinates of the corresponding error vector are nonzero. The correct transitted codeword ay then be obtained by copleenting these coordinates of the received vector. This procedure is called decoding. A binary linear (n,k) code C is a k-diensional subspace of the n diensional vector space over GF(2). k Each of the 2-1 nonzero vectors of C 2The notation a' = (a,a,..,a ) l 2 n colun vector. denotes a row vector; a denotes a
7 6 is a codeword; k is the nuber of inforation sybols of the code C. The redundancy of C is r = n-k. A atrix whose rows span C is a generator atrix of the code. The orthogonal copleent of C, in the usual algebraic sense, is the ~ ~ C'. A parity check atrix of C is a atrix whose rows span the dual code C'. If H is a parity check atrix of C, then the vector~' = (gl,g2'.,gn) is a codeword of C if and only if (3.1.1) Each equation of (3.1.1), corresponding to the rows of H, is a parity check equation. Suppose t' is a transitted codeword and r' is the corresponding received vector. and The error vector is e' Ht = 0 = r' t ' -. Since t' is a codeword of C, then (3.1. 2) Hr = Ht+He = He =!o' say. The vector s = Hr is called the sydroe of the received vector r'. Equation (3.1.2) ay be used for decoding. The syndroe of a received word is ca1- culated and the equation He = s ay be solved, in soe instances, for the unknown error vector ~', assuing at ost, say, of the coordinates of e' are nonzero. 3.2 Systeatic codes If G is the generator atrix of a linear code C and G* is obtained fro G by colun perutations, then G* generates a linear code c* defined to be equivalent to C. Given a (n,k) linear code C, we can find an equivalent code C* for which the generating atrix is
8 7 where r k is the k x k identity atrix and P is a k x (n-k) atrix. Every codeword of C* is a linear cobination of the rows of G* and is of the for (c I ' c 2 '.., c k ' c I PII+c 2 P21+.+c~kl '..., c I Plr+c 2 P 2r '. '+'k J:k r), where c l,c 2,...,c k are arbitrary and P = (Pij)kxr' r = n-k. Thus the first k coordinates of a codeword of c* ay be arbitrarily chosen. The reaining coordinates are linear cobinations of these coordinates. The first k coordinates are inforation places and the reaining r coordinates are redundant places. Such a code is called a systeatic ~. We shall now consider a systeatic (n,k) code C with generator atrix for soe P. Let T H = [p, I J, r where p T denotes the transpose of P. Over GF(2), CpT I r ] G~] = = pt + pt o Thus the vector space generated by the rows of H is orthogonal to that generated by G, i.e., H is a parity check atrix for C. Since the first k coordinates of a codeword in a systeatic code copletely specify the codeword, only these sybols in a received vector need be decoded. The reaining r redundant sybols ay be deterined fro the first k sybols to for the decoded codeword if necessary.
9 8 3.3 Majority-logic decoding The technique of ajority-logic decoding of linear codes was developed by Massey (1963) for particular linear codes. This procedure is based on the concept of a set of parity check equations orthogonal on a given sybol. Let C be an (n,k) linear code and suppose it is possible to find a set of J vectors of the dual code C', say (3.3.1) hj = (hjl,hj2,,hjn)' j = 1,2,...,J such that for fixed, = 1,,n h. = 1 for each j = 1,2,...,J J (3.3.2) = 0 for all but at ost one j = 1,2,...,J and for any fixed u F:. of these J That is, each vectors of the J vectors h~ has th coordinate 1 and at ost one -J has u th coordinate 1 for any u F:. Then the set of J equations (3.3.3) h'lel+h'2e2+...+hj e =s., u=1,2,.,j J J,n n J are said to be orthogonal ~ the sybol!ro' (Massey (1963». If the set of equations (3.3.3) corresponds to a set of parity check equations for a linear code C, then a ajority-logic procedure ay be used to deterine the error sybol e and thus decode the received sybol r into the corresponding sybol t fro the following theore. Theore Suppose a set of J parity check equations (3.3.3) orthogonal as the sybol e ay be found for a linear code C. Then, provided at ost ~f2j3 errors have occured, the sybol e is given correctly by the following rule: 3The notation [x] denotes the greatest integer less than or equal to x.
10 (1) e is that value of GF(2) which is assued by the ajority (greatest fraction) of the [s.}, provided such a value exists; J (2) e is zero if the [s.} take on the values 0 and 1 with equal frequency. J This theore is proved by Massey (1963). We shall oit the proof here 9 and prove a generalization of the theore which does not assue the orthogonality of the parity check equations on a particular sybol. This generalization appears in Rudolph (1967) and Sith (1967). Theore Let C be a linear (n,h) code and let (3.3.4) h.!el+h '2e2+".+h j = 1,2,...,J 0 e = So J J In n J be a set of J parity check equations such that (3.3.5) hj = 1,j = 1,2,...,J. Assue that for any u ~, (3.3.6) h = 1 for at ost A subscripts j = 1,2,..,J. ju Then, provided at ost [J/ 2A ] errors have occurred, the sybol e is given correctly by the following rule: (1) the (2) e is that value of GF(2) which is assued by the greatest fraction of [s.}, if such a ost frequent value exists. J e is zero if the [so} take on the values 0 and 1 with equal frequency. J Proof: Suppose at ost t = [J/ 2A ] errors have occurred. Then at ost t of the sybols e l,e 2,..,e n are nonzero. If all sybols other than e were zero, then (3.3.7) s =e,j=1,2,...,j j and the decision rule of the theore is correct. If one of the other sybols is nonzero, then at ost A of the s. in equation (3.3.7) are different fro J e. In general, if x other sybols are nonzero, at ost XA of the So in J equation (3.3.7) are different fro e ' since each of these sybols can
11 affect at ost A of the s. J If ern = 0, then if t or fewer of the error sybols are nonzero, at ost ta of the s. are nonzero. Since J~2tA, then the decision rule of the theore J gives the correct value of e. If e = 1, then if (t-l) or fewer of the other error sybols are nonzero, at ost (t-l)a of the s. are different fro e. Since J >2(t-l)A, then the J greatest fraction of the s. are equal to 1 and the decision rule of the J theore gives the correct value of e. 3.4 Majority Decodable Codes A nuber of linear codes have been shown to be decodable using ajority 10 logic techniques. Aong these are the Reed-Muller codes and their generalizations discussed by Kasarni et al (1968) and Weldon (1968), as well as the codes tered "geoetric codes" by Goethals and Delsarte (1967), Rudolph (1967) and Sith (1967). Townsend and Weldon (1967) have investigated a class of codes called quasi-cyclic self-orthogonal codes, to which a ajority logic decoding algorith ay be applied. With the exception of the latter codes and soe special cases of the other codes entioned above, the proble of deterining a general expression for the nuber of inforation sybols in these codes is difficult and has not yet been copletely solved. To avoid this difficulty, we shall present in section 4 a class of linear codes which ay be ajority logic decodable and for which the nuber of inforation sybols is iediately deterined. Special cases of these codes are equivalent to the quasi-cyclic self orthogonal codes discussed by Townsend and Weldon (1967).
12 11 4. Systeatic ~ Design Codes 4.1 Definition We define a large class of linear codes, which we shall call systeatic block design codes, as follows. Let N be the b x v incidence atrix, defined in section 2.3, of a balanced or partially balanced incoplete block design D with paraeters v,b,r*,k*,al,...,a. Let I be an identity atrix of order b. The systeatic b block design code (associated with the design D) is the (binary) linear code orthogonal to the row space of the atrix (4.1.1) that is, the linear code for which H is a parity check atrix. The systeatic block design code associated with the atrix H has the following iediate properties. (1) The length of the code is n = v+b (2) (3) (4) (5) (4.1.2) (6) (4.1. 3) The redundancy is r = b. The nuber of inforation sybols is k = n-r=v. The code is systeatic but not necessarily cyclic. The generator atrix of the code is T G=[I,N] v The inforation rate R =kin is v 1 R = V+b = l+b/ v Clearly, Rs1 if and only if b~v. For a BIB design b~v. Thus we ay state Lea The inforation rate of a systeatic block design code associated With a BIB design is at ost 1. In searching for a high rate (R>l, say) systeatic block design code, we
13 ust therefore restrict our attention to codes associated with PBIB designs for which b<v. Soe exaples of such codes will be given in section Encoding ~ Decoding Since the codes are systeatic, the encoding or construction of codewords is relatively siple. The first k = v sybols ay be chosen arbitrarily; the reaining r = b redundant sybols are linear cobinations, deterined by the generator atrix in equation (4.1.2), of the k inforation sybols. A relatively siple ajority logic decoding procedure ay be used for the systeatic block design codes. We state this as a theore. Theore Let C be a systeatic block design code associated with a (partially) balanced incoplete block design D with paraeters v,b,r*,k*, (4.2.1) Up to [r*/ 2A J errors ay be corrected using a one-step ajority logic decoding procedure. Proof: It is necessary to correct only the inforation sybols, for the redundant sybols ay then be deterined fro the encoding procedure. EaCh row of the parity check atrix of the code deterines a parity check equation. If N is the incidence atrix of the associated design, then the parity check atrix for the code is H = [N, I]. Each of the first k = v inforation sybols corresponds to a treatent in the design. Each row of H corresponds to a block. The first k entries in a row are 1 or 0, according to whether the appropriate treatent occurs or does not occur in the corresponding block. Each treatent occurs in r* blocks.
14 and the r* rows of H cor Consider anyone of the v treatents, say V a responding to the blocks in which V occurs. Each of the r* parity check a equations deterined by these rows, (4.2.2) h e + h e + jl l j2 2 say 13 Let us relabel the rows such that these are the first r* rows of H. Then for j = 1,2,...,r*, = 1. If treatent V and V are i th associates, then u a Moreover, h. = 1 for at ost Xi subscripts j = 1,2,..,r* JU and for any fixed u p a, l~u~v. h ja = 1 for at ost one j = 1,2,,r* if v+l~a$n. Thus, if X = ax Xi' then l$i$ro (4.2.3) fixed u p a. h. = 1 for j = 1,2,...,r* Ja h ju = 1 for at ost X subscripts j = 1,2,...,r* and for any Hence, fro Theore 3.3.2, a ajority logic decoding procedure ay be used to deterine e. This will a have occurred. The procedure is give e a correctly if at ost [r*/ 2X ] to consider the set of r* parity check errors equations corresponding to the blocks in which treatent V occurs. The a sybol e a is given as that value of GF(2) which is assued by the greatest fraction of the corresponding s. in the syndroe vector. J fraction exists, then e a is zero. If no such greatest This procedure is repeated for each of the reaining v-i inforation sybols and yields the inforation sybols of the codeword corresponding to a received word correctly, provided at ost []tjerrors have occurred.
15 Systeatic Block Design Codes Associated ~~ Designs A systeatic block design code associated with a BIB design with paraeters v,b,r*,k*,a is a (n,k) linear code with n = v+b and k = v. Th~ ajority-logic decoding procedure described in section 4.2 will correct up to [r*/2aj errors. In this section, we give a few exaples of these codes associated with particular BIB designs. The literature on BIB designs is extensive and includes any constructions for a wide range of design paraeters. The reader is referred to Bose (1969) for a coprehensive treatent of such designs and to ethods of constructing the designs entioned below. BIB designswith k* = 3 and A = 1 are called Steiner triple systes. It ay be shown that these conditions iply that r* ust be of the for 3t+l or 3t for soe positive integer t. In the case r* = 3t+l, the paraeters are v = 6t+3, b = (3t+l)(2t+l), r* = 3t+l, k* = 3, A =1. This series of designs is referred to as the T l series and exists for all values of t. The systeatic block codes associated with the T l designs have n = v+b = (2t+l) (3t+4) k = v = 6t+3 3 R = kin = 3t+4 and the ajority decoding procedure described earlier will correct up to [r*/2j = [3~+lJ errors. Table lists these paraeters of the codes with soe of the T l series of designs.
16 15 TABLE Systeatic Block Design Codes Associated With T l Series v = 6t+3, b = (3t+l)(2t+l), r* = 3t+l, k* = 3, A = 1 t Code Inforation Errors Rate Length Sybols Corrected These codes have low rates and only a relatively sall nuber of errors are guaranteed correctable by the ajority decoding procedure. A different series of BIB designs with ~ = 1 are the BIB designs constructed fro finite projective planes. These designs are often called the orthogonal series 2 or OS2 series. The paraeters are 2 v = b = s +s+l, r* = k* = s+l, ~ = 1. Such designs are known to exist when s is a prie power. The associated systeatic block design codes have n = v+b k = v = 2 = 2(s +s+l), 2 2( s +5+1), R = k/ =!, n and up to ~*/ 2J = [s;lj errors ay be corrected by our decoding procedure. These paraeters of soe codes are exhibited in Table
17 16 TABLE Systeatic Block Design Codes Associated With OS2 Series 2 v = b = s +s+l, r* = k* = s+l, A = 1 s Code Inforation Errors Rate Length Sybols Corrected While these codes have rate.5, the nuber of errors corrected is still relatively sall. 4.4 Systeatic Block Design Codes Associated with ~ Designs A systeatic block design code associated with a PBIB design with paraeters v, b, r*, k *, A. l ',A. has [r*/2aj errors ay be corrected described in Section 4.2. n = v+b and k = v. If A. = ax A.., then up to. 1 1 S1: using the ajority-logic decoding procedure Of particular interest are the PBIB designs with b<v, for the rates of the associated codes are greater than 1. We shall consider here codes associated with soe PBIB designs based on partial geoetries, Bose (1963), for which b<v. If the roles of treatents and blocks of a BIB design with A. = 1 are interchanged, then the resulting design, called the dual design, is a PBIB
18 17 design with paraeters b,v,k*,r*,l,o. This notation iplies that the nuber of treatents is b, etc. Consider the T series of BIB designs, discussed in section 4.3. The l dual designs are PBIB designs with paraeters v = (3t+l)(2t+l), b = 6t+3, r* = 3, k* = 3t+l, Al = 1, A 2 = 0. The resulting systeatic block design codes have n = (2t+l) (3t+4) k = (3t+l) (2t+l) R = 3t+l 3t+4 and the ajority decoding procedure will Table exhibits these properties of correct up to [3/~ = 1 error. soe such codes. TABLE Systeatic Block Design Codes Associated With Duals of T 1 Designs v = (3t+l)(2t+l), b = 6t+l, r* = 3, k* = 3t+l, Al = 1, A 2 = t Code Inforation Errors Rate Length Sybols Corrected These codes have high rates, although only a single error is guaranteed correctable by the ajority decoding procedure. The latter property is not necessarily a disadvantage, however.
19 A ore interesting PBIB design is that obtained fro the configuration of points and generators on an elliptic non-degenerate quadric Q 5 in the 18 finite projective space PG(5,s). Taking treatents as generators and blocks as points, we obtain a PBIB design with paraeters. 233 v = (s +l)(s +1), b = (s+l)(s +1) r* = s+l, k* This design is discussed by Ray-Chaudhuri (1962) and Bose (1963). Table gives the paraeters of the associated syetric block design code for a few values of s, s being a prie power. TABLE Systeatic Block Design Codes Associated With The PBIB Design v = (s +l)(s +1), b = (s+l)(s +1), r* = s+l, k* = s +1, A 1 =1, A 2 =0 s Code Inforation Errors Rate Length Sybols Corrected Discussion A systeatic block design code associated with an incoplete block design with v treatents and b blocks has rate R -...!- If b~v, then R.< v+b If the associated design is a (P)BIB design with paraeters v,b,r*,k*, AI'..,A, then, fro equation (2.1.1), vr* b =- k*
20 19 and R = k* k*+r* = 1 Since the ore interesting codes are those whose rates are bounded away fro zero, designs for which r*/k* is bounded will be ore useful. The nuber of errors corrected by the ajority logic decoding procedure is [r*/2~. Thus, designs with relatively large values of r* and relatively sall values of A = ax Ai will also be of interest. lsi$. Designs with r* relatively large have not yet been investigated as thoroughly as those with r* $.20, Until the advent of coputers, designs with large values of r* and k* have been ipractical for statistical application. However, further research on these designs ay yield iportant results in such areas as the constructions of error-correcting codes. The nuber of errors guaranteed correctable by a ajority decoding procedure of the systeatic block design codes is relatively sall. However, a ore iportant property of a code is the average probability of incorrect decoding. An upper bound on the probability of a decoding error ay be calculated for the systeatic block design codes for which A = 1. This will be the subject of a separate report.
21 20 REFERENCES 1. Berlekap, E. R. (1968). Algebraic Coding Theory, McGraw-Hill, New York. 2. Bose, R. C. (1939). "On the construction of balanced incoplete block designs," Ann. Eugenics, ~, Bose, R. C. (1963). "Strongly regular graphs, partial geoetries and partially balanced designs," ~. :!.. Math., 22, Bose, R. C. (1969). Cobinatorial Probles of Experiental Designs, Vol I, John Wiley and Sons, New York, (to appear). 5. Bose, R. C. and Nair, K. R. (1939). "Partially balanced incoplete block designs," Sankhya,.,!, Bose, R. C. and Shiaoto, T. (1952). "Classification and analysis of partially balanced designs with two associate classes,"!.. ~. Statist. Assoc., ~, Goethals, J. M. and Delsarte, p. (196). "On a class of ajority logic decodable cyclic codes," IEEE Trans. on Inforation Theory, IT-14, Hall, M., Jr. (1967). Cobinatorial Theory, Blaisdell, Wathha, Mass. 9. Kasai, T., S. Lin and W. W. Peterson. (1968). the Reed-Muller codes - Part I: Priitive Inforation Theory, It-14, "New generalizations of codes," ~ Trans. on 10. Massey, J. L. (1963). Threshold Decoding, M.I.T. Press, Cabridge, Mass. 11. Peterson, W. W. (1961). Error-Correcting Codes, M.I.T. Press, Cabridge, Mass. 12. Ray-Chaudhuri, D. K. (1962). "Application of the geoetry of quadrics for constructing PBIB designs," ~. ~. Statist., ~, Rudolph, L. D. (1967). "A class of ajority logic decodable codes," ~ Trans. ~ Inforation Theory, IT-13, Ryser, H. J. (1963). Cobinatorial Matheatics, Carus Math. Monograph No. 14, Matheatical Association of Aerica, Buffalo, N. Y. 15. Sith, K. J. C. (1967). "Majority decodable derived fro finite geoetries," Institute of Statistics Mieo Series No. 561, Departent of Statistics, University of North Carolina.
22 16. Townsend, R. L. and Weldon, E. J., Jr. (1967). "Self-orthogonal quasicyclic codes," ~ Trans. ~ Inforation Theory, IT-13, Weldon, E. J., Jr. (1968). "New generalizations of the Reed-Muller codes - Part II: Nonpriitive codes." IEEE Trans. on Inforation Theory, IT-14,
Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.
Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationA1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3
A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationAlgebraic Montgomery-Yang problem: the log del Pezzo surface case
c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang
More informationarxiv: v2 [math.co] 8 Mar 2018
Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,
More informationLATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS.
i LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. C. A. CHURCH, Jr. and H. W. GOULD, W. Virginia University, Morgantown, W. V a. In this paper we give
More information#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES
#A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,
More informationAPPLICATION OF CYCLIC COLLINEATIONS TO THE CONSTRUCTION OF BAIAKCED L-RESTRICTIONAL IATTICES ABSTRACT
APPLICATION OF CYCLIC COLLINEATIONS TO THE CONSTRUCTION OF BAIAKCED L-RESTRICTIONAL IATTICES BU-172-M B. L. Raktoe Noveber, 1964 ABSTRACT The construction of balanced -restrictional prie powered lattice
More informationON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN
More informationThe Fundamental Basis Theorem of Geometry from an algebraic point of view
Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationA note on the realignment criterion
A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationEXPLICIT CONGRUENCES FOR EULER POLYNOMIALS
EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit
More informationRECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE
Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS
More informationThe Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters
journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn
More informationReed-Muller codes for random erasures and errors
Reed-Muller codes for rando erasures and errors Eanuel Abbe Air Shpilka Avi Wigderson Abstract This paper studies the paraeters for which Reed-Muller (RM) codes over GF (2) can correct rando erasures and
More informationMULTIVARIATE ORDER STATISTICS. H. W. Corley. University of Texas at Arlington Arlington, Texas ABSTRACT
MULTIVARIATE ORDER STATISTICS H. W. Corley University of Texas at Arlington Arlington, Texas 76019 Key Words and Phrases: orderings; Zattiaes. ABSTRACT Classical order statistics are generalized to rando
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationSequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,
Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:
More informationDivisibility of Polynomials over Finite Fields and Combinatorial Applications
Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationTHE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!
THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationarxiv: v1 [math.co] 19 Apr 2017
PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,
More informationOptimal Jamming Over Additive Noise: Vector Source-Channel Case
Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationSupplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion
Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish
More information60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the
Chapter 6 Introduction to binary block codes In this chapter we b e g i n to study binary signal constellations, which are the Euclidean-space iages of binary block codes. Such constellations have bit
More information. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe
PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal
More informationPREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL
PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationPhysics 215 Winter The Density Matrix
Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it
More informationPhysics 139B Solutions to Homework Set 3 Fall 2009
Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about
More informationA Family of Reversible BCH Codes
1 A Faily of Reversible BCH Codes Shuxing Li, Cunsheng Ding, and Hao Liu Abstract arxiv:1608.0169v1 [cs.it] 7 Aug 016 Cyclic codes are an interesting class of linear codes due to their efficient encoding
More informationThe concavity and convexity of the Boros Moll sequences
The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:
More informationi ij j ( ) sin cos x y z x x x interchangeably.)
Tensor Operators Michael Fowler,2/3/12 Introduction: Cartesian Vectors and Tensors Physics is full of vectors: x, L, S and so on Classically, a (three-diensional) vector is defined by its properties under
More informationarxiv: v1 [math.nt] 14 Sep 2014
ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row
More informationSolutions of some selected problems of Homework 4
Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationMulti-Dimensional Hegselmann-Krause Dynamics
Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationCSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13
CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationJordan Journal of Physics
Volue 5, Nuber 3, 212. pp. 113-118 ARTILE Jordan Journal of Physics Networks of Identical apacitors with a Substitutional apacitor Departent of Physics, Al-Hussein Bin Talal University, Ma an, 2, 71111,
More informationThe Hilbert Schmidt version of the commutator theorem for zero trace matrices
The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that
More information3.3 Variational Characterization of Singular Values
3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and
More informationThe Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationPAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes
359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationClosed-form evaluations of Fibonacci Lucas reciprocal sums with three factors
Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank
More informationPRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas.
MORE O SQUARE AD SQUARE ROOT OF A ODE O T TREE Xingbo Wang Departent of Mechatronic Engineering, Foshan University, PRC Guangdong Engineering Center of Inforation Security for Intelligent Manufacturing
More informationWorst-case performance of critical path type algorithms
Intl. Trans. in Op. Res. 7 (2000) 383±399 www.elsevier.co/locate/ors Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007,
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationOn APP Decoding SURFACE. Syracuse University. Carlos R.P. Hartmann Syracuse University, Luther D. Rudolph Syracuse University
Syracuse University SURFACE Electrical Engineering and Coputer Science Technical Reports College of Engineering and Coputer Science 6-1981 On APP Decoding Carlos R.P. Hartann Syracuse University, chartan@syr.edu
More informationMULTIPLAYER ROCK-PAPER-SCISSORS
MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction
More informationTHE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT
THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and
More informationA Bernstein-Markov Theorem for Normed Spaces
A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :
More informationM ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.
M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x
More informationUpper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition
Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and
More informationThe Frequent Paucity of Trivial Strings
The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that
More informationLecture 9 November 23, 2015
CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)
More informationTight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography
Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationPage 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011
Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for
More informationTHE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n
THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra
More informationLeast Squares Fitting of Data
Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a
More informationPoly-Bernoulli Numbers and Eulerian Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441
More informationGeneralized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,
Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University
More informationPolynomial Division By Convolution
Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division
More informationMINIMUM DISTANCE DECODING OF GENERAL ALGEBRAIC GEOMETRY CODES VIA LISTS
MINIMUM DISTANCE DECODING OF GENERAL ALGEBRAIC GEOMETRY CODES VIA LISTS NATHAN DRAKE AND GRETCHEN L MATTHEWS DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 9634-0975 USA E-MAIL: GMATTHE@CLEMSONEDU
More informationExponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus
ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationWeek 15-16: Combinatorial Design
Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial
More informationChaotic Coupled Map Lattices
Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each
More informationA new type of lower bound for the largest eigenvalue of a symmetric matrix
Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box
More informationON SOME MATRIX INEQUALITIES. Hyun Deok Lee. 1. Introduction Matrix inequalities play an important role in statistical mechanics([1,3,6,7]).
Korean J. Math. 6 (2008), No. 4, pp. 565 57 ON SOME MATRIX INEQUALITIES Hyun Deok Lee Abstract. In this paper we present soe trace inequalities for positive definite atrices in statistical echanics. In
More informationResearch Article On the Isolated Vertices and Connectivity in Random Intersection Graphs
International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for
More informationSpine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area
Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular
More information+ -d-t-' )=1. = vpi. Aportaciones Matematicas Comunicaciones 17 (1996) 5-10.
Aportaciones Mateaticas Counicaciones 17 (1996) 5-10. 1. A suary of the proble Much of the processing that is used in the petroleu industry requires the consideration of a large nuber of cheical reactions.
More informationIntelligent Systems: Reasoning and Recognition. Artificial Neural Networks
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationCosine similarity and the Borda rule
Cosine siilarity and the Borda rule Yoko Kawada Abstract Cosine siilarity is a coonly used siilarity easure in coputer science. We propose a voting rule based on cosine siilarity, naely, the cosine siilarity
More informationVC Dimension and Sauer s Lemma
CMSC 35900 (Spring 2008) Learning Theory Lecture: VC Diension and Sauer s Lea Instructors: Sha Kakade and Abuj Tewari Radeacher Averages and Growth Function Theore Let F be a class of ±-valued functions
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationStandard & Canonical Forms
Standard & Canonical Fors CHAPTER OBJECTIVES Learn Binary Logic and BOOLEAN AlgebraLearn How to ap a Boolean Expression into Logic Circuit Ipleentation Learn How To anipulate Boolean Expressions and Siplify
More informationarxiv: v1 [math.na] 10 Oct 2016
GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble
More informationTEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES
TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,
More informationMechanics Physics 151
Mechanics Physics 5 Lecture Oscillations (Chapter 6) What We Did Last Tie Analyzed the otion of a heavy top Reduced into -diensional proble of θ Qualitative behavior Precession + nutation Initial condition
More information