Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May

Size: px
Start display at page:

Download "Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May"

Transcription

1 Coding Theory Ruud Pellikaan MasterMath 2MMC30 /k Lecture 11.1 May

2 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which solve the key equation and thus decode cyclic codes efficiently Interpolating with a twovariate polynomial gives list decoding 1. Decoding by key equation Algorithm of Euclid-Sugiyama Algorithm of Berlekamp-Massey 2. List decoding Johnson bound Algorithm of Sudan

3 Key equation - 1 3/31 In Lecture 8.2 we have seen that the decoding of BCH code with designed minimum distance δ is reduced to the problem of finding a pair of polynomials (σ (Z), ω(z)) satisfying the following key equation for a given syndrome polynomial S(Z) = δ 1 i=1 S i Z i 1 σ (Z)S(Z) ω(z) (mod Z δ 1 ) such that deg(σ (Z)) t = (δ 1)/2 and deg(ω(z)) < deg(σ (Z)) σ (Z) = t i=0 σ i Z i 1 is the error-locator polynomial and ω(z) = t 1 i=0 ω i Z i 1 is the error-evaluator polynomial Note that σ 0 = 1 by definition

4 Key equation - 2 4/31 Given the key equation the Euclid-Sugiyama algorithm or Sugiyama algorithm finds the error-locator and error-evaluator polynomials by an iterative procedure This algorithm is based on the well-known Euclidean algorithm We briefly review the Euclidean algorithm first For a pair of univariate polynomials r 1 (Z) and r 0 (Z) the Euclidean algorithm finds their greatest common divisor denoted by gcd(r 1 (Z), r 0 (Z))

5 Algorithm of Euclid - 1 5/31 The Euclidean algorithm proceeds as follows r 1 (Z) = q 1 (Z)r 0 (Z) + r 1 (Z), deg(r 1 (Z)) < deg(r 0 (Z)) r 0 (Z) = q 2 (Z)r 1 (Z) + r 2 (Z), deg(r 2 (Z)) < deg(r 1 (Z))... r s 2 (Z) = q s (Z)r s 1 (Z) + r s (Z), deg(r s (Z)) < deg(r s 1 (Z)) r s 1 (Z) = q s+1 (Z)r s (Z).

6 Algorithm of Euclid - 2 6/31 In each iteration of the algorithm, the operation of r j 2 (Z) = q j (Z)r j 1 (Z) + r j (Z) with deg(r j (Z)) < deg(r j 1 (Z)) is implemented by division of polynomials that is dividing r j 2 (Z) by r j 1 (Z) with quotient q j (Z) and remainder r j (Z) The algorithm stops after it completes the s-iteration where s is the smallest j such that r j+1 (Z) = 0 It is easy to prove that /k r s (Z) = gcd(r 1 (Z), r 0 (Z))

7 Algorithm of Euclid-Sugiyama - 1 7/31 Input: r 1 (Z) = Z δ 1, r 0 (Z) = S(Z), U 1 (Z) = 0 and U 0 (Z) = 1 Proceed with the Euclidean algorithm for r 1 (Z) and r 0 (Z) until an r s (Z) is reached such that deg(r s 1 (Z)) 1 2 (δ 1) and deg(r s(z)) 1 (δ 3) 2 Update U j (Z) = q j (Z)U j 1 (Z) + U j 2 (Z) Output: The following pair of polynomials: σ (Z) = ɛu s (Z) /k ω(z) = ( 1) s ɛr s (Z) where ɛ is chosen such that σ 0 = σ (0) = 1

8 Algorithm of Euclid-Sugiyama - 2 8/31 The error-locator and evaluator polynomials are given as σ (Z) = ɛu s (Z) and ω(z) = ( 1) s ɛr s (Z) Note that the Euclid-Sugiyama algorithm does not have to run the Euclidean algorithm completely it has a different stopping parameter s

9 EXAMPLE - 1 9/31 Consider the code C as given in Examples before It is a narrow sense BCH code of length 15 over F 16 of designed minimum distance δ = 5 Let r be the received word r = (α 5, α 8, α 11, α 10, α 10, α 7, α 12, α 11, 1, α, α 12, α 14, α 12, α 2, 0) Then S 1 = α 12, S 2 = α 7, S 3 = 0 and S 4 = α 2 So S(Z) = α 12 + α 7 Z + α 2 Z 3

10 EXAMPLE /31 j r j 1 (Z) r j (Z) U j 1 (Z) U j (Z) 0 Z 4 α 2 Z 3 + α 7 Z + α α 2 Z 3 + α 7 Z + α 12 α 5 Z 2 + α 10 Z 1 α 13 Z 2 α 5 Z 2 + α 10 Z α 2 Z + α 12 α 13 Z α 10 Z 2 + Z + 1 Thus the error-locator polynomial is σ (Z) = U 2 (Z) = 1 + Z + α 10 Z 2 the error-evaluator polynomial is ω(z) = r 2 (Z) = α 12 + α 2 Z

11 Key equation 11/31 Suppose is given Consider the key equation δ 1 S(Z) = S i Z i 1 i=1 σ (Z)S(Z) ω(z) (mod Z δ 1 ) such that and /k deg(σ (Z)) t = (δ 1)/2 deg(ω(z)) deg(σ (Z)) 1

12 System of linear euqations 12/31 It is easy to show that the problem of solving the key equation is equivalent to the problem of solving the following matrix equation with unknown (σ 1,..., σ t ) T S t S t 1... S 1 S t+1 S t... S 2... S 2t 1 S 2t 2... S t σ 1 σ 2. σ t = S t+1 S t+2. S 2t

13 Algorithm of Berlekamp-Massey /31 The Berlekamp-Massey algorithm can solve this matrix equation by finding σ 1,..., σ t for the following recursion t S i = σ j S i j, j=1 i = t + 1,..., 2t

14 Algorithm of Berlekamp-Massey /31 We should point out that the Berlekamp-Massey algorithm actually solves a more general problem that is, for a given sequence of length N: /k E 0, E 1, E 2,..., E N 1 which we denote by E it finds the recursion E i = L j E i j, i = L,..., N 1 j=1 for which L is smallest If the matrix equation has no solution the Berlekamp-Massey algorithm then finds a recursion with L > t

15 Algorithm of Berlekamp-Massey /31 To make it more convenient to present the Berlekamp-Massey algorithm and to prove the correctness, we denote (Z) = L i Z i i=0 with 0 = 1 The above recursion is denoted by is called the length of the recursion ( (Z), L) and L = deg( (Z))

16 Algorithm of Berlekamp-Massey /31 The Berlekamp-Massey algorithm is an iterative procedure for finding the shortest recursion for producing successive terms of the sequence E The r-th iteration of the algorithm finds the shortest recursion ( (r) (Z), L r ) where L r = deg( (r) (X)) for producing the first r terms of the sequence E, that is /k L r E i = (r) j E i j, i = L r,..., r 1 j=1 or equivalently with (r) 0 = 0 L r j=0 (r) j E i j = 0, i = L r,..., r 1

17 Algorithm of Berlekamp-Massey /31 (Initialization) r = 0, (Z) = B(Z) = 1, L = 0, λ = 1, and b = 1. (1) If r = N, stop. Otherwise, compute = L j=0 j E r j (2) If = 0, then λ λ + 1, and go to (5) (3) If = 0 and 2L > r, then (Z) (Z) b 1 Z λ B(Z) λ λ + 1 and go to (5) (4) If = 0 and 2L r, then T(Z) (Z) (temporary storage of (Z)) (Z) (Z) b 1 Z λ B(Z) L r + 1 L B(Z) T(Z) b λ 1 (5) r r + 1 and return to (1) For the the proof of correctness we refer to the literature /k

18 EXAMPLE /31 Consider again the code C of the previous Example Let r be the received word Then r = (α 5, α 8, α 11, α 10, α 10, α 7, α 12, α 11, 1, α, α 12, α 14, α 12, α 2, 0) /k S 1 = α 12, S 2 = α 7, S 3 = 0, S 4 = α 2 Now let us compute the error-locator polynomial σ (Z) by using the Berlekamp-Massey algorithm Letting E i = S i+1, for i = 0, 1, 2, 3, we have a sequence as the input of the algorithm E = {E 0, E 1, E 2, E 3 } = {α 12, α 7, 0, α 2 }

19 EXAMPLE /31 The intermediate and final results of the algorithm are given in the following table /k r B(Z) (Z) L 0 α α 12 Z 1 2 α α 10 Z 1 3 α 1 + α 10 Z 1 + α 10 Z + α 5 Z α 10 Z 1 + Z + α 10 Z 2 2

20 EXAMPLE /31 The result of the last iteration the Berlekamp-Massey algorithm, (Z), is the error-locator polynomial That is σ (Z) = σ 1 + σ 2 Z + σ 2 Z 2 = (Z) = 0 + λ 1 Z + 2 Z 2 = 1 + Z + α 10 Z 2 Substituting this into the key equation, we then get ω(z) = α 12 + α 2 Z

21 List-decoding /31 A decoding algorithm is efficient if the complexity is bounded above by a polynomial in the code length Brute-force decoding is not efficient because for a received word it may need to compare q k codewords for the closest codewords The idea behind list decoding is that instead of returning a unique codeword the decoder returns a small list of codewords A list-decoding algorithm is efficient if both the complexity and the size of the output list of the algorithm are bounded above by polynomials in the code length List decoding was first introduced by Elias and Wozencraft in 1950 s /k

22 List-decoding /31 Suppose C is a q-ary [n, k, d] code Let t n is a positive integer For any received word r = (r 1,, r n ) F n q we refer to any codeword c in C satisfying d(c, r) t as a t-consistent codeword Let l be a positive integer less than or equal to q k The code C is called (t, l)-decodable, if for any word r F n q the number of t-consistent codewords is at most l If for any received word, a list decoder can find all the t-consistent codewords and the output list has at most l codewords then the decoder is called a (t, l)-list decoder /k

23 List-decoding /31 In 1997 for the first time Sudan proposed an efficient list-decoding algorithm for Reed-Solomon codes Later Sudan s list-decoding algorithm was generalized to decoding algebraic-geometric codes and Reed-Muller codes

24 Error-correcting capacity 24/31 Suppose a decoding algorithm can find all the t-consistent codewords for any received word We call t the error-correcting capacity or decoding radius of the decoding algorithm As we have seen for any [n, k, d] code, if t d 1 2 then there is only one t-consistent codeword for any received word In other words, any [n, k, d] code is ( ) d 1 2, 1 -decodable The decoding algorithms in the previous sections return a unique codeword for any received word and they achieve an error-correcting capability less than or equal to d 1 2 The list decoding achieves a decoding radius greater than d 1 2 and the size of the output list must be bounded by a polynomial in n /k

25 Johnson bound 25/31 It is natural to ask the following question for a class of codes C For an [n, k, d] F q -linear code C in C what is the maximal value t, such that C is (t, l)-decodable for a l which is bounded above by a polynomial in n? In the following, we give a lower bound on the maximum t such that C is (t, l)-decodable This is called the Johnson bound

26 PROPOSITION Johnson bound 26/31 Let 0 < β < 1 and 0 < γ < 1 Let C F n q be a linear code of minimum distance Letd = (1 1/q)(1 β)n Let t = (1 1/q)(1 γ )n Then for any word r F n q { { min n(q 1), (1 β)/(γ B t (r) C 2 β) }, when γ > β 2n(q 1) 1, when γ = β where /k B t (r) = {x F n q d(x, r) t} is the Hamming ball of radius t around r Proof is referred to the literature

27 THEOREM Johnson bound 27/31 For any linear code C F n q of relative minimum distance δ = d/n, it is (t, l(n))-decodable with l(n) bounded above by a linear function in n, provided that ( t n 1 1 ) ( 1 1 q ) q q 1 δ

28 PROOF Johnson bound 28/31 For any received word r F n q, the set of t-consistent codewords {c C d(c, r) t} = B t (r) C Let β be a positive real number and β < 1 Denote d = (1 1/q) (1 β)n Let t = (1 1/q) (1 γ )n for some 0 < γ < 1 Suppose Then, γ /k ( t n 1 1 ) ( 1 1 q ) q q 1 δ 1 q q 1 d n = β By the previous Proposition, the number of t-consistent codewords, l(n), which is B t (r) C, is bounded above by a polynomial in n, here q is viewed as a constant

29 REMARK /31 The classical error-correcting capability is t = d 1 2 For a linear [n, k] code of minimum distance d, we have d n k + 1 Note that for Reed-Solomon codes, d = n k + 1 Thus, the normalized capability τ = t/n τ = t n 1 n k n = R where R is the code rate

30 REMARK /31 Let us compare this with the Johnson bound From the Theorem and d n k + 1, the Johnson bound is ( ) ( ) q q q 1 ( ) ( δ ) q q q 1 (1 k n + 1 n ) 1 R for large n and large q

31 Figure of Johnson bound 31/31

The Golay codes. Mario de Boer and Ruud Pellikaan

The Golay codes. Mario de Boer and Ruud Pellikaan The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

On Syndrome Decoding of Chinese Remainder Codes

On Syndrome Decoding of Chinese Remainder Codes On Syndrome Decoding of Chinese Remainder Codes Wenhui Li Institute of, June 16, 2012 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2012) Pomorie, Bulgaria Wenhui

More information

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department

More information

Algebraic Codes for Error Control

Algebraic Codes for Error Control little -at- mathcs -dot- holycross -dot- edu Department of Mathematics and Computer Science College of the Holy Cross SACNAS National Conference An Abstract Look at Algebra October 16, 2009 Outline Coding

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Gröbner bases for decoding

Gröbner bases for decoding Gröbner bases for decoding Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Chap. 11, Gröbner bases for decoding, pp. 260-275, Springer,

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

Error-correcting Pairs for a Public-key Cryptosystem

Error-correcting Pairs for a Public-key Cryptosystem Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and

More information

Decoding Reed-Muller codes over product sets

Decoding Reed-Muller codes over product sets Rutgers University May 30, 2016 Overview Error-correcting codes 1 Error-correcting codes Motivation 2 Reed-Solomon codes Reed-Muller codes 3 Error-correcting codes Motivation Goal: Send a message Don t

More information

List Decoding of Binary Goppa Codes up to the Binary Johnson Bound

List Decoding of Binary Goppa Codes up to the Binary Johnson Bound List Decoding of Binary Goppa Codes up to the Binary Johnson Bound Daniel Augot Morgan Barbier Alain Couvreur École Polytechnique INRIA Saclay - Île de France ITW 2011 - Paraty Augot - Barbier - Couvreur

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

REED-SOLOMON codes are powerful techniques for

REED-SOLOMON codes are powerful techniques for 1 Efficient algorithms for decoding Reed-Solomon codes with erasures Todd Mateer Abstract In this paper, we present a new algorithm for decoding Reed-Solomon codes with both errors and erasures. The algorithm

More information

A Fresh Look at the Berlekamp-Massey Algorithm with Application to Low Power BCH decoding Ishai Ilani, Western Digital

A Fresh Look at the Berlekamp-Massey Algorithm with Application to Low Power BCH decoding Ishai Ilani, Western Digital A Fresh ook at the Berlekamp-Massey Algorithm with Application to ow Power BCH decoding Ishai Ilani, Western Digital Abstract BCH codes are gaining renewed attention lately as new applications based on

More information

Modified Euclidean Algorithms for Decoding Reed-Solomon Codes

Modified Euclidean Algorithms for Decoding Reed-Solomon Codes Modified Euclidean Algorithms for Decoding Reed-Solomon Codes Dilip V. Sarwate Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

Generalized Reed-Solomon Codes

Generalized Reed-Solomon Codes Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Notes 6: Polynomials in One Variable

Notes 6: Polynomials in One Variable Notes 6: Polynomials in One Variable Definition. Let f(x) = b 0 x n + b x n + + b n be a polynomial of degree n, so b 0 0. The leading term of f is LT (f) = b 0 x n. We begin by analyzing the long division

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

Skew cyclic codes: Hamming distance and decoding algorithms 1

Skew cyclic codes: Hamming distance and decoding algorithms 1 Skew cyclic codes: Hamming distance and decoding algorithms 1 J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro Department of Algebra and CITIC, University of Granada Department of Computer Sciences and

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

Computing Error Distance of Reed-Solomon Codes

Computing Error Distance of Reed-Solomon Codes Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

The Euclidean Algorithm and Multiplicative Inverses

The Euclidean Algorithm and Multiplicative Inverses 1 The Euclidean Algorithm and Multiplicative Inverses Lecture notes for Access 2009 The Euclidean Algorithm is a set of instructions for finding the greatest common divisor of any two positive integers.

More information

ECEN 604: Channel Coding for Communications

ECEN 604: Channel Coding for Communications ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications

More information

List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem

List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem List decoding of binary Goppa codes and key reduction for McEliece s cryptosystem Morgan Barbier morgan.barbier@lix.polytechnique.fr École Polytechnique INRIA Saclay - Île de France 14 April 2011 University

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

Number Theory Basics Z = {..., 2, 1, 0, 1, 2,...} For, b Z, we say that divides b if z = b for some. Notation: b Fact: for all, b, c Z:

Number Theory Basics Z = {..., 2, 1, 0, 1, 2,...} For, b Z, we say that divides b if z = b for some. Notation: b Fact: for all, b, c Z: Number Theory Basics Z = {..., 2, 1, 0, 1, 2,...} For, b Z, we say that divides b if z = b for some z Z Notation: b Fact: for all, b, c Z:, 1, and 0 0 = 0 b and b c = c b and c = (b + c) b and b = ±b 1

More information

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2, 4-4 (29) VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code HUANG-CHI CHEN,2, YU-WEN CHANG 3 AND REY-CHUE HWANG Deaprtment of Electrical

More information

Chinese Remainder Theorem

Chinese Remainder Theorem Chinese Remainder Theorem Theorem Let R be a Euclidean domain with m 1, m 2,..., m k R. If gcd(m i, m j ) = 1 for 1 i < j k then m = m 1 m 2 m k = lcm(m 1, m 2,..., m k ) and R/m = R/m 1 R/m 2 R/m k ;

More information

Lecture 12: Reed-Solomon Codes

Lecture 12: Reed-Solomon Codes Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 1: Reed-Solomon Codes September 8, 007 Lecturer: Atri Rudra Scribe: Michel Kulhandjian Last lecture we saw the proof

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

2. THE EUCLIDEAN ALGORITHM More ring essentials

2. THE EUCLIDEAN ALGORITHM More ring essentials 2. THE EUCLIDEAN ALGORITHM More ring essentials In this chapter: rings R commutative with 1. An element b R divides a R, or b is a divisor of a, or a is divisible by b, or a is a multiple of b, if there

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together

More information

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1. Cyclic Codes II Generator Matrix We would now like to consider how the ideas we have previously discussed for linear codes are interpreted in this polynomial version of cyclic codes. Theorem 6: If the

More information

6.S897 Algebra and Computation February 27, Lecture 6

6.S897 Algebra and Computation February 27, Lecture 6 6.S897 Algebra and Computation February 7, 01 Lecture 6 Lecturer: Madhu Sudan Scribe: Mohmammad Bavarian 1 Overview Last lecture we saw how to use FFT to multiply f, g R[x] in nearly linear time. We also

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

a = qb + r where 0 r < b. Proof. We first prove this result under the additional assumption that b > 0 is a natural number. Let

a = qb + r where 0 r < b. Proof. We first prove this result under the additional assumption that b > 0 is a natural number. Let 2. Induction and the division algorithm The main method to prove results about the natural numbers is to use induction. We recall some of the details and at the same time present the material in a different

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Intermediate Math Circles February 29, 2012 Linear Diophantine Equations I

Intermediate Math Circles February 29, 2012 Linear Diophantine Equations I Intermediate Math Circles February 29, 2012 Linear Diophantine Equations I Diophantine equations are equations intended to be solved in the integers. We re going to focus on Linear Diophantine Equations.

More information

Lecture 19: Elias-Bassalygo Bound

Lecture 19: Elias-Bassalygo Bound Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

EUCLID S ALGORITHM AND THE FUNDAMENTAL THEOREM OF ARITHMETIC after N. Vasiliev and V. Gutenmacher (Kvant, 1972)

EUCLID S ALGORITHM AND THE FUNDAMENTAL THEOREM OF ARITHMETIC after N. Vasiliev and V. Gutenmacher (Kvant, 1972) Intro to Math Reasoning Grinshpan EUCLID S ALGORITHM AND THE FUNDAMENTAL THEOREM OF ARITHMETIC after N. Vasiliev and V. Gutenmacher (Kvant, 1972) We all know that every composite natural number is a product

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

NOTES ON SIMPLE NUMBER THEORY

NOTES ON SIMPLE NUMBER THEORY NOTES ON SIMPLE NUMBER THEORY DAMIEN PITMAN 1. Definitions & Theorems Definition: We say d divides m iff d is positive integer and m is an integer and there is an integer q such that m = dq. In this case,

More information

MSRI-UP 2009 PROJECT TOPIC IDEAS. 1. Toric Codes. A first group of project topics deals with a class of codes known as toric codes.

MSRI-UP 2009 PROJECT TOPIC IDEAS. 1. Toric Codes. A first group of project topics deals with a class of codes known as toric codes. MSRI-UP 2009 PROJECT TOPIC IDEAS JOHN LITTLE COLLEGE OF THE HOLY CROSS 1 Toric Codes A first group of project topics deals with a class of codes known as toric codes General Background In [6], [7], J Hansen

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

Lecture 03: Polynomial Based Codes

Lecture 03: Polynomial Based Codes Lecture 03: Polynomial Based Codes Error-Correcting Codes (Spring 016) Rutgers University Swastik Kopparty Scribes: Ross Berkowitz & Amey Bhangale 1 Reed-Solomon Codes Reed Solomon codes are large alphabet

More information

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1 Combinatória e Teoria de Códigos Exercises from the notes Chapter 1 1.1. The following binary word 01111000000?001110000?00110011001010111000000000?01110 encodes a date. The encoding method used consisted

More information

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Decoding linear codes via systems solving: complexity issues and generalized Newton identities Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-13 Recap Divisibility Prime Number Theorem Euclid s Lemma Fundamental Theorem of Arithmetic Euclidean Algorithm Basic Notions - Section

More information

Chapter 1 A Survey of Divisibility 14

Chapter 1 A Survey of Divisibility 14 Chapter 1 A Survey of Divisibility 14 SECTION C Euclidean Algorithm By the end of this section you will be able to use properties of the greatest common divisor (gcd) obtain the gcd using the Euclidean

More information

Computing over Z, Q, K[X]

Computing over Z, Q, K[X] Computing over Z, Q, K[X] Clément PERNET M2-MIA Calcul Exact Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

The extended coset leader weight enumerator

The extended coset leader weight enumerator The extended coset leader weight enumerator Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands Symposium on Information Theory in the Benelux, 2009 1/14 Outline Codes, weights

More information

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Journal of ELECTRICAL ENGINEERING, VOL. 54, NO. -2, 2003, 305 30 ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Sergey Egorov Garik Markarian A modification of Blahut procedure

More information

Polynomials. In many problems, it is useful to write polynomials as products. For example, when solving equations: Example:

Polynomials. In many problems, it is useful to write polynomials as products. For example, when solving equations: Example: Polynomials Monomials: 10, 5x, 3x 2, x 3, 4x 2 y 6, or 5xyz 2. A monomial is a product of quantities some of which are unknown. Polynomials: 10 + 5x 3x 2 + x 3, or 4x 2 y 6 + 5xyz 2. A polynomial is a

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

Intermediate Math Circles February 26, 2014 Diophantine Equations I

Intermediate Math Circles February 26, 2014 Diophantine Equations I Intermediate Math Circles February 26, 2014 Diophantine Equations I 1. An introduction to Diophantine equations A Diophantine equation is a polynomial equation that is intended to be solved over the integers.

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x), Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Adaptive decoding for dense and sparse evaluation/interpolation codes

Adaptive decoding for dense and sparse evaluation/interpolation codes Adaptive decoding for dense and sparse evaluation/interpolation codes Clément PERNET INRIA/LIG-MOAIS, Grenoble Université joint work with M. Comer, E. Kaltofen, J-L. Roch, T. Roche Séminaire Calcul formel

More information

Permanent is hard to compute even on a good day

Permanent is hard to compute even on a good day Permanent is hard to compute even on a good day Yuval Filmus September 11, 2012 Abstract We give an exposition of Cai, Pavan and Sivakumar s result on the hardness of permanent. They show that assuming

More information

The number of message symbols encoded into a

The number of message symbols encoded into a L.R.Welch THE ORIGINAL VIEW OF REED-SOLOMON CODES THE ORIGINAL VIEW [Polynomial Codes over Certain Finite Fields, I.S.Reed and G. Solomon, Journal of SIAM, June 1960] Parameters: Let GF(2 n ) be the eld

More information

arxiv: v1 [cs.it] 27 May 2017

arxiv: v1 [cs.it] 27 May 2017 Volume xx No 0x 20xx xxx-xxx doi:xxx ON SHORTENED AND PUNCTURED CYCLIC CODES arxiv:170509859v1 csit 27 May 2017 Arti Yardi IRIT/INP-ENSEEIHT University of Toulouse Toulouse France Ruud Pellikaan Department

More information

Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn

Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide

More information

CMPUT 403: Number Theory

CMPUT 403: Number Theory CMPUT 403: Number Theory Zachary Friggstad February 26, 2016 Outline Factoring Sieve Multiplicative Functions Greatest Common Divisors Applications Chinese Remainder Theorem Factoring Theorem (Fundamental

More information

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be

More information

Algebraic Soft-Decision Decoding of Reed Solomon Codes

Algebraic Soft-Decision Decoding of Reed Solomon Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 11, NOVEMBER 2003 2809 Algebraic Soft-Decision Decoding of Reed Solomon Codes Ralf Koetter, Member, IEEE, Alexer Vardy, Fellow, IEEE Abstract A polynomial-time

More information

ELEC3227/4247 Mid term Quiz2 Solution with explanation

ELEC3227/4247 Mid term Quiz2 Solution with explanation ELEC7/447 Mid term Quiz Solution with explanation Ang Man Shun Department of Electrical and Electronic Engineering, University of Hong Kong Document creation date : 015 1 05 This document explain the solution

More information

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Code Based Cryptology at TU/e

Code Based Cryptology at TU/e Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University Padjadjaran, Bandung, Nov. 6 Institute Technology Bandung, Bandung, Nov. 6 University Gadjah

More information

Reed-Solomon Error-correcting Codes

Reed-Solomon Error-correcting Codes The Deep Hole Problem Matt Keti (Advisor: Professor Daqing Wan) Department of Mathematics University of California, Irvine November 8, 2012 Humble Beginnings Preview of Topics 1 Humble Beginnings Problems

More information

EDULABZ INTERNATIONAL NUMBER SYSTEM

EDULABZ INTERNATIONAL NUMBER SYSTEM NUMBER SYSTEM 1. Find the product of the place value of 8 and the face value of 7 in the number 7801. Ans. Place value of 8 in 7801 = 800, Face value of 7 in 7801 = 7 Required product = 800 7 = 00. How

More information

4 Powers of an Element; Cyclic Groups

4 Powers of an Element; Cyclic Groups 4 Powers of an Element; Cyclic Groups Notation When considering an abstract group (G, ), we will often simplify notation as follows x y will be expressed as xy (x y) z will be expressed as xyz x (y z)

More information

The Berlekamp-Massey Algorithm revisited

The Berlekamp-Massey Algorithm revisited The Berlekamp-Massey Algorithm revisited Nadia Ben Atti ( ), Gema M Diaz Toca ( ) Henri Lombardi ( ) Abstract We propose a slight modification of the Berlekamp-Massey Algorithm for obtaining the minimal

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Kevin James. MTHSC 412 Section 3.4 Cyclic Groups

Kevin James. MTHSC 412 Section 3.4 Cyclic Groups MTHSC 412 Section 3.4 Cyclic Groups Definition If G is a cyclic group and G =< a > then a is a generator of G. Definition If G is a cyclic group and G =< a > then a is a generator of G. Example 1 Z is

More information

On the BMS Algorithm

On the BMS Algorithm On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of

More information