Arithmetic Distribution Matching

Size: px
Start display at page:

Download "Arithmetic Distribution Matching"

Transcription

1 Arithmetic Distributio Matchig Sebastia Baur ad Georg Böcherer Istitute for Commuicatios Egieerig Techische Uiversität Müche, Germay arxiv:48.393v [cs.it] 8 Aug 24 Abstract I this work, arithmetic distributio matchig (ADM) is preseted. ADM ivertibly trasforms a discrete memoryless source (DMS) ito a target DMS. ADM ca be used for probabilistic shapig ad for rate adaptio. Opposed to existig algorithms for distributio matchig, ADM works olie ad ca trasform arbitrarily log iput sequeces. It is show aalytically that as the iput legth teds to ifiity, the ADM output perfectly emulates the target DMS with respect to the ormalized iformatioal divergece ad the etropy rate. Numerical results are preseted that cofirm the aalytical bouds. I. INTRODUCTION Distributio matchig trasforms the output of a discrete memoryless source (DMS) ito a sequece that emulates a target DMS, see Figure for a illustratio. The trasformatio of a distributio matcher is ivertible, i.e., the iput ca be recovered from the output. Distributio matchig is used for example for probabilistic shapig [, Sectio IV.A], [2] ad for rate adaptio [3, Sectio VI.]. Distributio matchers ca be implemeted usig variable legth codig. I [4] ad [5], algorithms for optimal variableto-fixed (v2f) legth ad fixed-to-variable (f2v) legth matchig are preseted, respectively. The drawback of these optimal matchers is that the complete codebook eeds to be calculated offlie, which is ifeasible for large codebook sizes. For data compressio, Huffma [6] ad Tustall [7] codes have a similar problem. Arithmetic codes for data compressio [8], [9] are sub-optimal variable legth codes where ecodig ad decodig ca be doe olie, i.e., o codebook eeds to be stored. The use of arithmetic codig for distributio matchig was proposed i [3, Appedix G]. However, as stated by the authors of [3], their algorithm is icomplete, i particular, it is ot ivertible i the provided descriptio. The authors i [] propose a o-ivertible algorithm for exact radom umber geeratio based o the idea of arithmetic codig. The mai cotributios of this work are the developmet ad the aalysis of a algorithm for arithmetic distributio matchig (ADM). We review f2v legth distributio matchig i Sectio II. I particular, we discuss i Sectio II-E its relatio to data compressio. We the preset i Sectio III our ADM algorithm. We theoretically aalyze the performace of our algorithm i Sectio IV. I particular, we show that as the iput legth teds to ifiity, the output of ADM perfectly This work was supported by the Germa Miistry of Educatio ad Research i the framework of a Alexader vo Humboldt Professorship. DMS P S s, s 2,... c, c 2,... matcher DMS P Z z, z 2,... Fig.. The output s, s 2,... of the DMS P S is trasformed by the distributio matcher. The output sequece c, c 2,... appears similar to the output sequece z, z 2,... of the target DMS P Z. As idicated by the dashed box, the source P S together with the matcher emulates the target DMS P Z. emulates the target DMS with respect to ormalized iformatioal divergece ad etropy rate. We provide umerical results i Sectio V that cofirm our aalytical bouds. Our implemetatio is available at [] ad was used i [2] for coded modulatio with probabilistic shapig. II. FIXED-TO-VARIABLE LENGTH DISTRIBUTION MATCHING The cocept of distributio matchig is illustrated i Figure. We describe i the followig f2v matchig. For clarity of exposure, we cosider biary iput ad biary output. We deote radom variables by capital letters S ad realizatios by small letters s. A biary DMS P S geerates a bit sequece S = S, S 2,..., S of fixed legth. The bits S i are idepedet ad idetically distributed (iid) accordig to the distributio P S () = p src ad P S () = p src. Suppose the source output is s. The matcher trasforms s ito a biary sequece c = c, c 2,..., c l(c) of variable legth l(c), i.e., the matcher outputs codewords of a f2v legth codebook C. The goal of distributio matchig is to emulate a biary DMS with a arbitrary but fixed target distributio P Z () = p code ad P Z () = p code. We explai i the ext paragraphs what we mea by emulatio. A. Iterval represetatio We represet the probabilities of the iput realizatios s ad the target probabilities of the output realizatios c by subitervals of the iterval [; ). We deote the subiterval represetig the probability of s by ad the subiterval represetig the target probability of c by. We idetify the matcher iput s with ad the matcher output c with, i.e., the matcher maps to. We display a example of the iterval represetatio i Figure 2.

2 Fig. 3. A optimal code for iput legth = 2, P S () =.5 ad P Z () =.3. The resultig iformatioal divergece is = Fig. 2. The source is P S () = P S () =.5 ad the target DMS is defied by P Z () = P Z () =.4. The matcher maps to ad to. The sequeces, ad appear at the matcher output with probability.5,, ad.5, respectively. At the output of the target DMS,,, ad would appear with probability.36,.24, ad.4, respectively. B. Iformatioal Divergece The divisio of the iterval [; ) ito subitervals defies the variable legth codebook C. For the example i Figure 2, the codebook is C = {,, }. For the iput legth, the matcher uses 2 output bitsequeces with o-zero probability. I Figure 2, = ad the two possible output sequeces are {, }. The mappig performed by the matcher defies a probability distributio o C. We represet the matcher output takig values i C by the radom variable Y. The codeword c appears at the matcher output with probability P Y (c) = { P X (s), if iput s maps to c, if o s maps to c. The target DMS would have put out the codeword c with probability l(c) PZ(c) C = P Z (c i ). i= We say that P Z iduces the distributio PZ C o the codebook C. I our iterval represetatio, the probability PZ C (c) by which the target DMS P Z would have geerated c is represeted by the iterval size of ad the actual probability is represeted by the iterval size of. The matcher output is a good approximatio of the target DMS output if P Y (c) PZ C(c) ad equivaletly if ad have approximately the same size. This ituitio is formalized by the iformatioal divergece of P Y ad PZ C, which is defied by D(P Y PZ) C = P Y (c) P C Z (c) = (c) () (c) Fig. 4. Example of a code geerated by a arithmetic matcher where = 2, P S () =.5 ad P Z () =.3. The resultig iformatioal divergece is D(P Y PZ C ) =.6346, which is larger tha the divergece of the optimal code i Figure 3. where supp P Y = {c C : P Y (c) > } deotes the support of P Y. We ca see that the iformatioal divergece depeds o the ratio /. It is small if ad have approximately the same size for all codewords that occur with o-zero probability. C. Optimal distributio matchig I [5] a algorithm is described to geerate f2v legth codes for distributio matchig that miimize (). I Figure 3 we show a example for such a optimal code. The iput legth is = 2, the source is uiform ad the target DMS is P Z () = P Z () =.3 The codebook C cosists of all 4 subitervals of [, ) displayed i Figure 3. The resultig iformatioal divergece is.746. The optimal mappig has to be calculated offlie ad stored. The required memory icreases expoetially with the iput legth ad becomes impractical already for reasoably small iput legths. D. Preview: Arithmetic distributio matchig The mai idea of ADM is to require that the code iterval idetifies the source iterval, i.e.,. By this requiremet, we also give up o usig all subitervals of [, ) as codewords. For the same example as i Figure 3, we display i Figure 4 a matcher with the property. The iformatioal divergece of the matcher i Figure 4 is equal to.6346, which is larger tha the divergece of the optimal code i Figure 3, so the code with the property performs worse tha the optimal code. However, as

3 Fig. 5. Example of a arithmetic source compressio code for iput legth = 2, P S () =.3 ad P Z () =.5. we will see i the remaiig sectios, ADM allows us to ecode ad decode olie for arbitrarily log iput sequeces. Furthermore, we will see that for log iput sequeces, ADM results i a smaller divergece tha repeatedly applyig a optimal code. E. Compressio decoder as a matchig ecoder It is claimed i [3] that a ADM for a target DMS P Z ca be realized by applyig the decoder of a arithmetic source compressio code for P Z to the output of a uiform source P S. We illustrate that this is ot possible by a example. We cosider iput legth = 2 ad a source P S () = P S () =.3. We compress P S by emulatig the uiform target DMS P Z () = P Z () =.5. The resultig arithmetic source compressio code is displayed i Figure 5. Suppose ow we wat to apply the correspodig decoder to the output of a uiform source. This meas we apply the iverse mappig from right to left. The output maps to, so this is fie. However, if the output is, this approach fails, sice the ecoder maps othig to, so caot be ecoded. We coclude that i geeral, a arithmetic decoder caot be used as a ecoder. III. ARITHMETIC DISTRIBUTION MATCHING We describe the algorithms for a ADM ecoder ad decoder for biary iput distributios. A. Basic operatios There are two basic operatios, which are used by the ecoder as well as the decoder. ) Read Bits: A bitsequece that was created by a DMS ca be represeted by a iterval by successively readig its bits. We start with the iterval I = [; ). Now we divide the iterval I i two parts accordig to the probability distributio p of the correspodig DMS. The lower subiterval [; p) is assiged to, the upper subiterval [p; ) is assiged to. The we read the first bit of the bitsequece. If there is a, we choose the lower subiterval as the ew iterval I, if there is a, we choose the upper subiterval. This iterval I represets the bitsequece we have read. We cotiue this process recursively by subdividig the curret iterval I accordig to p. Whe all bits of the bitsequece are read, I represets the whole bitsequece. 2) Refie Cadidate List: We subdivide the iterval [; ) accordig to p. I this way we create two subitervals which we call cadidates. The lower subiterval [; p) is assiged to, the upper subiterval [p; ) is assiged to. We call this process refiemet. All itervals created by this process ca also be refied by subdividig them equivaletly accordig to p. So after a secod refiemet we have four cadidates. B. Ecoder Algorithm Ecoder : s iput sequece 2: p src source distributio 3: p code target distributio 4: cadidatelist = refie([; ), p code ) 5: c = empty array 6: for i= to legth(s) do 7: = readbit(, p src, s i ) 8: while j : cadidatelist(j) do 9: apped bits correspodig to j to c : = refie(cadidatelist(j), p code ) : [I u code, Il code ] = refie(, p code ) 2: while k : I u code (k) do 3: I u code = refie(iu code, p code) 4: while l : I l code (l) do 5: I l code = refie(il code, p code) 6: = max(i u code (k), Il code (l)) 7: apped correspodig bits to c The arithmetic ecoder creates a cadidate list by refiig the iterval usig p code. The it reads bits of s util the correspodig iterval idetifies oe of the cadidates. This cadidate is the ew ad. The bit correspodig to this cadidate is writte i the output buffer of c. The the ecoder refies. If idetifies oe of the ew cadidates, the correspodig bit is writte i the output buffer of c too ad this cadidate is the ew agai. The ecoder cotiues the refiemet of ad puts out the correspodig bits if possible, util is ot cotaied i ay of the ew cadidates. The the ecoder starts over agai by readig the ext bit. It repeats this process util all bits are read. To fiish the ecodig, whe all iput bits are read there is a upper cadidate Icode u ad a lower cadidate Il code. The the ecoder refies Icode u util oe cadidate idetifies. It the refies Icode l util a secod cadidate idetifies. The the ecoder chooses the larger oe of the two cadidates as the ew. So holds. Fially it appeds the additioal bits correspodig to this cadidate to c. This fializatio is ecessary to guaratee decodability. Algorithm shows a pseudocode for the ecoder. C. Decoder The arithmetic decoder creates a cadidate list by refiig the iterval usig p src. It the reads bits of c util

4 Algorithm 2 Decoder : c codeword 2: p src source distributio 3: p code target distributio 4: legth of iput sequece s 5: cadidatelist = refie([; ), p src ) 6: s = empty strig 7: i = 8: while legth(s) < do 9: = readbit(, p code, c i ) : i = i + : while j : cadidatelist(j) do 2: apped bits correspodig to j to s 3: = refie(cadidatelist(j), p src ) idetifies oe of the cadidates. The bit correspodig to this cadidate is writte i the output buffer of s. This cadidate is the ew. It is refied, ad if idetifies oe of the ew cadidates, the correspodig bit is writte i the output buffer of s too. Agai, this cadidate is the ew. This is repeated util does ot idetify ay of the cadidates. The the decoder starts readig bits from c agai. It carries o util bits are writte to the output buffer of s. Algorithm shows a pseudocode for the decoder. D. Implemetatio For the floatig poit implemetatio of the algorithms described above we have to prevet the subitervals from becomig too small for a represetatio i floatig poit umbers. That is why they are repeatedly scaled durig the ecodig ad decodig process. Additioally the decoder has to execute the same scaligs as the ecoder, to avoid differet roudig at the ecoder ad the decoder, i.e. the decoder eeds to emulate the ecoder exactly i terms of floatig poit operatios. A. Iformatioal Divergece IV. ANALYSIS Suppose the output of the ecoder is the sequece c. The width of the source iterval is equal to the probability that c is geerated, i.e., (c) = P Y (c). The width of the code iterval is equal to the probability by which the target DMS would geerate c, i.e., (c) = P C Z (c). Propositio. The ratio of the iterval sizes is bouded as (c) (c) = P Y (c) P C Z (c) p code ( p code ). Proof: The left iequality holds sice the algorithm guaratees. The upper boud is proved i the appedix. We boud the iformatioal divergece D(P Y PZ) C = P Y (c) P C Z (c) p code ( p code ) = log 2 p code ( p code ) Thus the u-ormalized iformatioal divergece is bouded from above by a costat that does ot deped o the iput legth. The expected output legth is bouded as (2) (a) H(P Y ) (b) = H(P S ) = H(P S ) (3) where (a) follows by the coverse of the source codig theorem [3, Theorem 5.3.] ad where (b) holds because the mappig of the matcher is oe-to-oe. We ca ow boud the ormalized iformatioal divergece as (a) log 2 p code ( p code ) (b) log 2 p code ( p code ) H(P S ) where (a) follows by Propositio ad where (b) follows by (3). We ca see from (4) that the ormalized iformatioal divergece approaches zero for large iput legths. Our umerical results i Sectio V cofirm this observatio. B. Rate Propositio 2. As the iput legth teds to ifiity, the etropy rate of the matcher output coverges to the etropy of the target distributio, i.e., H(P Y ) H(P Z). (5) Proof: Accordig to (4) which accordig to [4, Propositio 6] implies (5). Sice the mappig is oe-to-oe, we have H(P Y ) = H(P S ). I the average, iput bits are trasformed ito output bits. I terms of the coversio rate /, Propositio 2 states that H(P Z) H(P S ). C. Biary data compressio We ow wat to show how ADM ca be used for data compressio. Suppose P Z () = P Z () = 2. We the have (4) log 2 (p code ( p code )) = 2. (6)

5 With PZ C(c) = 2 l(c) it follows = P Y (c) P C Z (c) P Y (c) = P Y (c)l(c) +. For the first term of this sum we get P Y (c) = H(P Y ). The secod term of the sum is equal to oe, as = P Y (c). Thus = H(P Y ) holds. With H(P Y ) = H(P S ) = H(P S ) we get = H(P S ) + D(P Y P C Z) (a) H(P S ) + 2 (7) where (a) follows by (2) ad (6). The boud (7) recovers the kow boud for arithmetic data compressio, see [5, Exercise 6.]. This shows that ADM ca be used for arithmetic data compressio by usig the target distributio P Z () = P Z () =.5. For Huffma codes H(P S ) + holds [3, Theorem 5.4.]. The additioal bit ecessary for arithmetic codig is the price for calculatig the codewords olie. V. NUMERICAL RESULTS To validate our aalytical results i Sectio IV, we discuss a example applicatio of our ADM implemetatio. We cosider a uiform biary source P S () = P S () =.5 ad the target DMS P Z () = P Z () =.3 ad we evaluate the iformatioal divergece ad the expected output legth. For =, 2,..., 3, we calculate the correct values. For =, 2, 3, 4, we use estimates obtaied from Mote Carlo simulatio. The results for iformatioal divergece are displayed i Figure 6. All obtaied values are below the theoretical boud log 2 (.3.7) = This validates Propositio ad (2). I Figure 7 we plot the rate H(P Y ) = versus the iput legth. As gets large, the rate approaches H(P Z ) =.883 from below. This validates Propositio 2. D(PY P C Z ) ADM (Mote Carlo) ADM (aalytical) optimal (aalytical) boud Fig. 6. Iformatioal divergece D(P Y PZ C ) plotted over iput legth for P S () =.5 ad P Z () =.3. H(P Y ) ADM (Mote Carlo) ADM (aalytical) optimal (aalytical) H(P Z ) Fig. 7. Rate H(P Y ) plotted over iput legth for P S () =.5 ad P Z () =.3. For compariso, we also calculate iformatioal divergece ad rate for the optimal code [5]. As ca be see i Figure 6, the iformatioal divergece is smaller tha for ADM. Suppose ow we would like to ecode 4 iput bits. By (4), the resultig ormalized divergece for ADM would be bouded from above by log 2 p code ( p code ) H(P S ) = Alteratively we could apply the optimal code for = oe thousad times. The resultig ormalized divergece is i this case give by =. = /.884

6 which is higher tha for ADM. This shows that usig suboptimal matchers that ca ecode olie is advatageous for large iput legths. APPENDIX A PROOF OF PROPOSITION To prove the upper boud o the ratio /, we have to take a closer look at the last step of the ecodig algorithm. We cosider the sceario depicted i Figure 8. The last step of the ecodig algorithm ca always be reduced to this sceario. The ecoder refies Icode u ad Il code idepedetly at the ed of the algorithm as described i III-B. To achieve the state i Figure 8, we stop each of these refiemets oe step before a cadidate idetifies. We the drop all cadidates but the two eighborig cadidates, where oe is a subiterval of Icode u ad the other is a subiterval of Il code. The we scale this iterval cosistig of two cadidates to [, ). The last step of the algorithm is ow to refie each of the two subitervals of [, ) ad to choose the largest subiterval idetifyig. The two fial cadidates are cad = p code ( p ratio ) ad cad2 = p ratio ( p code ). We ow show that at least oe of the two fial cadidates is larger tha p code ( p code ). The followig statemets are equivalet: p ratio ( p code ) p code ( p code ) p ratio p code ( p ratio ) ( p code ) p code ( p ratio ) p code ( p code ). This shows i particular that if cad2 is smaller tha p code ( p code ) the cad is larger tha p code ( p code ). Similarly, p code ( p ratio ) p code ( p code ) p ratio p code p ratio p code p ratio ( p code ) p code ( p code ) which shows that if cad is smaller tha p code ( p code ) the cad2 is larger tha p code ( p code ). Sice the algorithm chooses for the fial code iterval Icode fial = max{cad, cad2}, we have Icode fial = max{cad, cad2} p code ( p code ) which is the statemet of the propositio. Fig. 8. p ratio cad cad2 The sceario for the last step of the algorithm. REFERENCES [] J. Forey, G., R. Gallager, G. Lag, F. Logstaff, ad S. Qureshi, Efficiet modulatio for bad-limited chaels, IEEE J. Sel. Areas Commu., vol. 2, o. 5, pp , 984. [2] G. Böcherer, Capacity-achievig probabilistic shapig for oisy ad oiseless chaels, Ph.D. dissertatio, RWTH Aache Uiversity, 22. [Olie]. Available: de/capacityachievigshapig.pdf [3] D. MacKay, Good error-correctig codes based o very sparse matrices, IEEE Tras. If. Theory, vol. 45, o. 2, pp , 999. [4] G. Böcherer ad R. Mathar, Matchig dyadic distributios to chaels, i Proc. Data Compressio Cof., 2, pp [5] R. A. Amjad ad G. Böcherer, Fixed-to-variable legth distributio matchig, i IEEE It. Symp. If. Theory (ISIT), 23, pp [6] D. A. Huffma, A method for the costructio of miimum-redudacy codes, Proc. IRE, vol. 4, o. 9, pp. 98, Sep [7] B. Tustall, Sythesis of oiseless compressio codes, Ph.D. dissertatio, Georgia Istitute of Techology, 967. [8] J. Rissae ad G. G. Lagdo Jr, Arithmetic codig, IBM J. Res. Devel., vol. 23, o. 2, pp , 979. [9] I. H. Witte, R. M. Neal, ad J. G. Cleary, Arithmetic codig for data compressio, Commu. ACM, vol. 3, o. 6, pp , 987. [] T. S. Ha ad M. Hoshi, Iterval algorithm for radom umber geeratio, IEEE Tras. If. Theory, vol. 43, o. 2, pp , 997. [] S. Baur ad G. Böcherer, Arithmetic distributio matchig, Apr. 24. [Olie]. Available: [2] G. Böcherer, Probabilistic sigal shapig for bit-metric decodig, i Proc. IEEE It. Symp. If. Theory (ISIT), 24, pp [3] T. M. Cover ad J. A. Thomas, Elemets of Iformatio Theory, 2d ed. Joh Wiley & Sos, Ic., 26. [4] G. Böcherer ad R. A. Amjad, Iformatioal divergece ad etropy rate o rooted trees with probabilities, Proc. IEEE It. Symp. If. Theory (ISIT), pp. 76 8, 23. [5] D. MacKay, Iformatio Theory, Iferece, ad Learig Algorithms. Cambridge Uiversity Press, 23.

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Lecture 7: October 18, 2017

Lecture 7: October 18, 2017 Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Intro to Learning Theory

Intro to Learning Theory Lecture 1, October 18, 2016 Itro to Learig Theory Ruth Urer 1 Machie Learig ad Learig Theory Comig soo 2 Formal Framework 21 Basic otios I our formal model for machie learig, the istaces to be classified

More information

Lecture 11: Decision Trees

Lecture 11: Decision Trees ECE9 Sprig 7 Statistical Learig Theory Istructor: R. Nowak Lecture : Decisio Trees Miimum Complexity Pealized Fuctio Recall the basic results of the last lectures: let X ad Y deote the iput ad output spaces

More information

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology Advaced Aalysis Mi Ya Departmet of Mathematics Hog Kog Uiversity of Sciece ad Techology September 3, 009 Cotets Limit ad Cotiuity 7 Limit of Sequece 8 Defiitio 8 Property 3 3 Ifiity ad Ifiitesimal 8 4

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

Output Analysis and Run-Length Control

Output Analysis and Run-Length Control IEOR E4703: Mote Carlo Simulatio Columbia Uiversity c 2017 by Marti Haugh Output Aalysis ad Ru-Legth Cotrol I these otes we describe how the Cetral Limit Theorem ca be used to costruct approximate (1 α%

More information

1 Introduction to reducing variance in Monte Carlo simulations

1 Introduction to reducing variance in Monte Carlo simulations Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Series III. Chapter Alternating Series

Series III. Chapter Alternating Series Chapter 9 Series III With the exceptio of the Null Sequece Test, all the tests for series covergece ad divergece that we have cosidered so far have dealt oly with series of oegative terms. Series with

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Number Representation

Number Representation Number Represetatio 1 Number System :: The Basics We are accustomed to usig the so-called decimal umber system Te digits :: 0,1,2,3,4,5,6,7,8,9 Every digit positio has a weight which is a power of 10 Base

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

Alternating Series. 1 n 0 2 n n THEOREM 9.14 Alternating Series Test Let a n > 0. The alternating series. 1 n a n.

Alternating Series. 1 n 0 2 n n THEOREM 9.14 Alternating Series Test Let a n > 0. The alternating series. 1 n a n. 0_0905.qxd //0 :7 PM Page SECTION 9.5 Alteratig Series Sectio 9.5 Alteratig Series Use the Alteratig Series Test to determie whether a ifiite series coverges. Use the Alteratig Series Remaider to approximate

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 Fuctioal Law of Large Numbers. Costructio of the Wieer Measure Cotet. 1. Additioal techical results o weak covergece

More information

A statistical method to determine sample size to estimate characteristic value of soil parameters

A statistical method to determine sample size to estimate characteristic value of soil parameters A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

Complexity Bounds of LDPC Codes for Parallel Channels

Complexity Bounds of LDPC Codes for Parallel Channels Complexity Bouds of DPC Codes for Parallel Chaels Youjia (Eugee) iu, eugeeliu@ieee.org Departmet of Electrical ad Computer Egieerig Uiversity of Colorado at Boulder Jilei Hou, jhou@qualcomm.com Qualcomm

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should be doe

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

A Partial Decode-Forward Scheme For A Network with N relays

A Partial Decode-Forward Scheme For A Network with N relays A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:

More information

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n.

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n. Jauary 1, 2019 Resamplig Methods Motivatio We have so may estimators with the property θ θ d N 0, σ 2 We ca also write θ a N θ, σ 2 /, where a meas approximately distributed as Oce we have a cosistet estimator

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

1. Universal v.s. non-universal: know the source distribution or not.

1. Universal v.s. non-universal: know the source distribution or not. 28. Radom umber geerators Let s play the followig game: Give a stream of Ber( p) bits, with ukow p, we wat to tur them ito pure radom bits, i.e., idepedet fair coi flips Ber( / 2 ). Our goal is to fid

More information

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain Assigmet 9 Exercise 5.5 Let X biomial, p, where p 0, 1 is ukow. Obtai cofidece itervals for p i two differet ways: a Sice X / p d N0, p1 p], the variace of the limitig distributio depeds oly o p. Use the

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

On Constellation Shaping for Short Block Lengths

On Constellation Shaping for Short Block Lengths O Costellatio Shapig for Short Block Legths Y.C. Gülteki W.J. va Houtum F.M.J. Willems Iformatio ad Commuicatio Theory Lab Sigal Processig Systems Group Departmet of Electrical Egieerig, TU/e, The Netherlads

More information

Lecture 9: Hierarchy Theorems

Lecture 9: Hierarchy Theorems IAS/PCMI Summer Sessio 2000 Clay Mathematics Udergraduate Program Basic Course o Computatioal Complexity Lecture 9: Hierarchy Theorems David Mix Barrigto ad Alexis Maciel July 27, 2000 Most of this lecture

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

Lossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding

Lossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding ossy Compressio via Sparse iear Regressio: Computatioally Efficiet Ecodig ad Decodig Ramji Vekataramaa Dept of Egieerig, Uiv of Cambridge ramjiv@egcamacuk Tuhi Sarkar Dept of EE, IIT Bombay tuhi91@gmailcom

More information

Monte Carlo Integration

Monte Carlo Integration Mote Carlo Itegratio I these otes we first review basic umerical itegratio methods (usig Riema approximatio ad the trapezoidal rule) ad their limitatios for evaluatig multidimesioal itegrals. Next we itroduce

More information

Olli Simula T / Chapter 1 3. Olli Simula T / Chapter 1 5

Olli Simula T / Chapter 1 3. Olli Simula T / Chapter 1 5 Sigals ad Systems Sigals ad Systems Sigals are variables that carry iformatio Systemstake sigals as iputs ad produce sigals as outputs The course deals with the passage of sigals through systems T-6.4

More information

lim za n n = z lim a n n.

lim za n n = z lim a n n. Lecture 6 Sequeces ad Series Defiitio 1 By a sequece i a set A, we mea a mappig f : N A. It is customary to deote a sequece f by {s } where, s := f(). A sequece {z } of (complex) umbers is said to be coverget

More information

Stat 421-SP2012 Interval Estimation Section

Stat 421-SP2012 Interval Estimation Section Stat 41-SP01 Iterval Estimatio Sectio 11.1-11. We ow uderstad (Chapter 10) how to fid poit estimators of a ukow parameter. o However, a poit estimate does ot provide ay iformatio about the ucertaity (possible

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Ma 530 Introduction to Power Series

Ma 530 Introduction to Power Series Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A. Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Frequentist Inference

Frequentist Inference Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Simulation. Two Rule For Inverting A Distribution Function

Simulation. Two Rule For Inverting A Distribution Function Simulatio Two Rule For Ivertig A Distributio Fuctio Rule 1. If F(x) = u is costat o a iterval [x 1, x 2 ), the the uiform value u is mapped oto x 2 through the iversio process. Rule 2. If there is a jump

More information

Stochastic Simulation

Stochastic Simulation Stochastic Simulatio 1 Itroductio Readig Assigmet: Read Chapter 1 of text. We shall itroduce may of the key issues to be discussed i this course via a couple of model problems. Model Problem 1 (Jackso

More information

Lecture 2: Monte Carlo Simulation

Lecture 2: Monte Carlo Simulation STAT/Q SCI 43: Itroductio to Resamplig ethods Sprig 27 Istructor: Ye-Chi Che Lecture 2: ote Carlo Simulatio 2 ote Carlo Itegratio Assume we wat to evaluate the followig itegratio: e x3 dx What ca we do?

More information

Time-Domain Representations of LTI Systems

Time-Domain Representations of LTI Systems 2.1 Itroductio Objectives: 1. Impulse resposes of LTI systems 2. Liear costat-coefficiets differetial or differece equatios of LTI systems 3. Bloc diagram represetatios of LTI systems 4. State-variable

More information

MA131 - Analysis 1. Workbook 9 Series III

MA131 - Analysis 1. Workbook 9 Series III MA3 - Aalysis Workbook 9 Series III Autum 004 Cotets 4.4 Series with Positive ad Negative Terms.............. 4.5 Alteratig Series.......................... 4.6 Geeral Series.............................

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes 2000 IEEE. Persoal use of this material is permitted. However, permissio to reprit/republish this material for advertisig or promotioal purposes or for creatig ew collective works for resale or redistributio

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1. Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

Filter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and

Filter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and Filter bas Separately, the lowpass ad highpass filters are ot ivertible T removes the highest frequecy / ad removes the lowest frequecy Together these filters separate the sigal ito low-frequecy ad high-frequecy

More information

MA131 - Analysis 1. Workbook 3 Sequences II

MA131 - Analysis 1. Workbook 3 Sequences II MA3 - Aalysis Workbook 3 Sequeces II Autum 2004 Cotets 2.8 Coverget Sequeces........................ 2.9 Algebra of Limits......................... 2 2.0 Further Useful Results........................

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Fortgeschrittene Datenstrukturen Vorlesung 11

Fortgeschrittene Datenstrukturen Vorlesung 11 Fortgeschrittee Datestruture Vorlesug 11 Schriftführer: Marti Weider 19.01.2012 1 Succict Data Structures (ctd.) 1.1 Select-Queries A slightly differet approach, compared to ra, is used for select. B represets

More information

Fall 2013 MTH431/531 Real analysis Section Notes

Fall 2013 MTH431/531 Real analysis Section Notes Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters

More information

Mathematical Methods for Physics and Engineering

Mathematical Methods for Physics and Engineering Mathematical Methods for Physics ad Egieerig Lecture otes Sergei V. Shabaov Departmet of Mathematics, Uiversity of Florida, Gaiesville, FL 326 USA CHAPTER The theory of covergece. Numerical sequeces..

More information

Fixed-Threshold Polar Codes

Fixed-Threshold Polar Codes Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

Lecture 4: April 10, 2013

Lecture 4: April 10, 2013 TTIC/CMSC 1150 Mathematical Toolkit Sprig 01 Madhur Tulsiai Lecture 4: April 10, 01 Scribe: Haris Agelidakis 1 Chebyshev s Iequality recap I the previous lecture, we used Chebyshev s iequality to get a

More information

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code: 6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:

More information

Properties and Hypothesis Testing

Properties and Hypothesis Testing Chapter 3 Properties ad Hypothesis Testig 3.1 Types of data The regressio techiques developed i previous chapters ca be applied to three differet kids of data. 1. Cross-sectioal data. 2. Time series data.

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information