Combinatorial Group Testing for DNA Library Screening

Size: px
Start display at page:

Download "Combinatorial Group Testing for DNA Library Screening"

Transcription

1 0-0 Combinatorial Group Testing for DNA Library Screening Ying Miao University of Tsukuba

2 0-1 Contents 1. Introduction 2. An Example 3. General Case 4. Consecutive Positives Case 5. Bayesian Network Pool Result Decoder Algorithm 6. Concluding Remarks

3 Introduction Group Testing R. Dorfman, The detection of defective members of a large population, Ann. Math. Stat. Vol. 14, pp , 1943 Test a large number of blood samples to determine the presence of a rare disease efficiently.

4 0-3 Methods Commonsense Method Test all items one by one. Advanced Method (group testing) Combine several items into groups (or pools) and then test them. Assumption: The tests always give the correct answer, unless otherwise stated. A negative result ensures that none of the items are positive. A positive result reveals that at least one of the items is positive. Further tests are required to reveal which particular items are in fact positive.

5 0-4 Objectives Minimizing the number of tests Limiting number of pools Limiting pool sizes Tolerating a few errors etc. These objectives are often contradicting, thus testing strategies are applicant dependent.

6 0-5 Probabilistic Group Testing Some probability p of having a defective is fixed, and a probabilistic model is used to describe the probability distribution of positive items. Goal: Minimize the expected number of tests to identify the defective set. Combinatorial Group Testing It is often assumed that the number of defectives is d for some fixed positive integer d, and a deterministic model is used. Goal: Minimize the number of tests under a worst-case scenario.

7 0-6 Adaptive Algorithm Tests are conducted one by one. The outcomes of previous tests are assumed known at the time of determining the current test. Non-Adaptive Algorithm No such information is available in determining a test. Multi-stage algorithm: Tests are divided into several stages where the stages are considered adaptive but all tests in the same stage are treated as non-adaptive. Error Tolerant group testing algorithm can detect or correct some errors in test outcomes.

8 0-7 DNA Library Screening (pooling designs, mapping genomes.) A DNA sequence is a sequence with four alphabets A, C, G, T, called nucleotides. A DNA sequence is stored in a library by cutting into shorter segments called clones. Basic problem of DNA library screening Determine, in an efficient fashion, whether a particular DNA segment, called a probe, is contained in a clone. A clone is positive for a probe if it contains the probe, and negative otherwise.

9 0-8 DNA library screening introduces several new constraints to group testing: The population of clones is usually large, so collecting a pool of clones and preparing it for probing is not easy. DNA screening is error prone, hence error-tolerant capability is desirable. Most large libraries intend to automate this process by employing robots, and preprogramming the pools, where non-adaptive algorithms are preferred. In practice, s-stage algorithms with small s (e.g. preferable. 2) are often

10 0-9 Other Applications 1. Superimposed Codes: Codes for satellite communication. 2. Frameproof Codes: Codes which avoid coalitions of users forging the signature of a user not in the coalition.

11 An Example A non-adaptive group testing algorithm can be modeled as a pooling design. Let C = {c 1,..., c n } be a set of clones (or items, samples), and let G = {G 1,..., G m } be a set of m subsets of X called pools (or groups). We refer to (C, G) as an (n, m)-nagta. An (n, m)-nagta (C, G) can be represented by an m n incidence matrix H = (h ij ), where the columns correspond to n clones, and the rows to m pools: { 1, if cj G h ij = i, 0, otherwise.

12 0-11 We want to identify a positive subset U C efficiently (minimize the number m of tests for a given number n of clones). This can be done by using a test function f : 2 C {0, 1}: f(y ) = { 1, if Y U, 0, if Y U =, for any Y C. The result (or, outcome) vector of (C, G), given U, is R(U) = (f(g i ) : G i G). We say that (C, G) identifies U if U is determined uniquely from R(U). That is, we require R(U) R(V ) if U V. Under the assumption that U d, we require that H to be dseparable: the unions of d columns of H are all distinct.

13 0-12 A Construction from BIBDs Let (X, B) be a (v, k, 1)-BIBD, and (C, G) the dual incidence structure. We use (C, G) as a (b, v)-nagta, where b = v(v 1) k(k 1). (C, G) satisfies the following properties: (1) Each clone occurs in exactly k tests. (2) Each test contains exactly r = v 1 k 1 clones. (3) Every pair of distinct clones is contained in at most one test. Theorem 2.1 If there exists a (v, k, 1)-BIBD, then there exists a (b, v)- NAGTA with threshold d = k 1. Remark: For fixed k, we have m = O(k n).

14 0-13 Theorem 2.1 says that the positive set U can be identified if U k 1. What happens if U k? Suppose that (C, G) is the (b, v)-nagta of Theorem 2.1, where C = {1,..., b} and G = {G 1,..., G v }. Given the result vector R(U), the following algorithm Identify will identify U if U k 1, and report that U k, otherwise.

15 Algorithm Identify Input: R(U) = (f(g 1 ),..., f(g v )) 1. U = 2. for i 1 to b do H[i] 1 3. for j 1 to v do if f(g j ) = 0 then for all x A j do H[x] 0 4. for i 1 to b do if H[i] = 1 then U U {i} 5. if U k 1 then output U else output the positive subset has size at least k 0-14

16 0-15 Example 2.2 A (9, 3, 1)-BIBD: X = {1, 2, 3, 4, 5, 6, 7, 8, 9}, B = {{1, 2, 3}, {4, 5, 6}, {7, 8, 9}, {1, 4, 7}, {2, 5, 8}, {3, 6, 9}, {1, 5, 9}, {2, 6, 7}, {3, 4, 8}, {1, 6, 8}, {2, 4, 9}, {3, 5, 7}}. The blocks of the dual incidence structure: {1, 4, 7, 10}, {1, 5, 8, 11}, {1, 6, 9, 12}, {2, 4, 9, 11}, {2, 5, 7, 12}, {2, 6, 8, 10}, {3, 4, 8, 12}, {3, 5, 9, 10}, {3, 6, 7, 11}

17 0-16 Carry out Identify with input R(U) = (0, 1, 0, 0, 1, 0, 1, 1, 1) : G G G G The positive set is thus U = {3, 5}.

18 0-17 Strong Group Testing Algorithms (C, G) is a strong NAGTA if for all U C, U d. Identify(R(U)) = U (C, G) is an l-uniform NAGTA if each clone occurs in exactly l tests. The NAGTAs constructed in Theorem 2.1 are strong (thus d-separable) and k-uniform. In fact, they are optimal. Theorem 2.3 Suppose that (C, G) is a proper (i.e. G G, G 2) strong l-uniform (n, m)-nagta with threshold d. Then d l 1. Furthermore, if d = l 1, then n m(m 1) l(l 1), with equality iff (C, G) is the dual of an (m, l, 1)-BIBD.

19 General Case Assumptions: (1) The number of positives is d; (2) The tests always give the correct answer, unless otherwise stated. The incidence matrix H is d-separable if the unions of d columns are all distinct (The corresponding set system is called d-union free). If H is d-separable, then the outcomes uniquely identify the set U of positives. However, the identification may be somewhat involved, because we may have to examine all unions of d columns.

20 0-19 If the union of any ( ) d columns does not cover any column not in this union, then H is a d(= d)-disjunct matrix (The corresponding set system is called d-cover free). When a disjunct matrix H is employed, any clone contained in a pool with negative outcome can be identified as negative, and all other clones as positive. If after the deletion of negative clones, the number of remaining clones is > d, then the false assumption that the number of positives is d can be automatically detected. Remark: This reduces the time complexity from O(n d ) to O(n).

21 0-20 Du and Hwang (00) collected many known results. Ngo and Du (00): Summarized D yachkov and Rykov (82) and D yachkov, Rykov and Rashad (89) s results. Theorem 3.1 Let m(d, n) denote the minimum number of pools needed for the S( d, n) problem, where S( d, n) is the set of all subsets of n items (or columns) with size d. Then, as n and d, d 2 2 log 2 d (1 + o(1)) log 2 n m(d, n) d 2 log 2 e(1 + o(1)) log 2 n.

22 0-21 Constructions for d-disjunct Matrices Deterministic designs Random designs We only describe constructions for deterministic designs. (1) Packing designs (2) Grid designs (3) Macula s construction (4) Ngo and Du s generalized construction

23 0-22 (1) Packing Designs (Kautz and Singleton (64)) In a t-(m, k, 1)-packing, no two blocks have t points in common. Thus, if k > d(t 1) a d-disjunct matrix H can be constructed from a t-(m, k, 1)-packing by simply indexing H s columns by the blocks and H s rows by points. Moreover, if k = d(t 1) + f + 1 (f 0), then H is f-error detecting and f/2 -error correcting.

24 0-23 Problem 3.2 Find the packing number D(m, k, t), the number of blocks in a maximum t-(m, k, 1)-packing. This problem is difficult in general. Theorem 3.3 Let A(n, d, w) denote the size of a maximum constant w-weight binary (n, d) code, then D(m, k, t) = A(m, 2k 2t + 2, k). Let U(m, k, t) = m k m 1 k 1 m t + 1 k t + 1. Schonheim (66) observed that D(m, k, t) U(m, k, t), where equality holds when the design is a t-(m, k, 1)-design.

25 0-24 (2) Grid Designs Robots are sometimes used to assemble the pools. The clones are arranged into rows and columns of a set of r c grids, where each row and column contributes a pool. If only one grid is used, then ambiguity can occur if there are more than one positive clone. To resolve ambiguity, we use more grids s.t. collinear twice, no two clones are Then Hwang (95) showed that the existence of such grids is equivalent to the existence of certain set of mutually orthogonal Latin squares.

26 0-25 This was extended to transversal design by Balding et al. (96). A pooling design is transversal if the pools can be partitioned into parts, each of which is a partition of the clones. Relations of this problem to Coding Theory is also specified in Balding et al. (96). Jimbo and his students (especially, Mutoh) contributed a lot in this research direction.

27 0-26 (3) Macula s Construction (96, 99) Let H(m, d, k) be a (0, 1)-matrix whose rows are indexed by the d- subsets and columns by the k-subsets of {1, 2,..., m} where m/2 k > d 1. H(m, d, k) ij = 1 the i-th d-subset the j-th k-subset. Then H(m, d, k) is d-disjunt with ( m d ) rows and ( m k ) columns.

28 0-27 (4) Ngo and Du s Generalization In packing designs, H was row indexed by all elements and column by selected k-subsets of {1, 2,..., m}, i.e., the rows by all points at rank 1 and columns by selected points at rank k of the Boolean lattice B m. Macula s construction involves taking all points at rank d as rows and rank k as columns. Ngo and Du (99): Take selected points at different ranks of B m.

29 0-28 Let H(m, d, k) be a (0, 1)-matrix whose rows are indexed by the set of all d-matchings (a matching of size d) and columns by the set of all k-matchings on K 2m. H(m, d, k) ij = 1 the i-th d-matching the j-th k-matching. Then H(m, d, k) is d-disjunct. Observe that a k-matching is a k-subset of the set of edges of K 2m. So this construction could be seen as taking from B ( 2m selected points at rank d as rows and selected points at rank k as columns. 2 ) Ngo and Du also showed that H(m, d, k) is d-error detecting and d/2 -error correcting.

30 0-29 Problem 3.4 Besides the Boolean lattice B m, what are other lattices we can use? For example, one candidate is C m,u, the lattice of all m-tuples of Z u, which is a generalization of B m, since B m = C m,2. Ngo ad Du (99): Picking points at levels d and k of the lattice of all subspaces of GF (q) v would also work. Problem 3.5 Can we from the lattice infer some information about the error correcting and detecting capability of the matrix H being constructed?

31 0-30 Error-Tolerant Group Testing A pooling design is e-error detecting (resp. correcting) if it can detect (resp. correct) up to e errors in test outcomes. In other words, if a design is e-error detecting (resp. correcting), then the test outcome vectors form a binary code with min distance at least e + 1 (resp. 2e + 1). For s S( d, n) (the set of all subsets of n clones (or columns) with size at most d), let P (s) denote the union of all columns corresponding to s. Theorem 3.6 Suppose H has the property that s s S( d, n), P (s) and P (s ) have distance k. Then, H is (k 1)-error detecting and (k 1)/2 -error correcting.

32 0-31 Assume the number of errors is f. (C, G) is a solution to the group testing problem with d positives and f-error detection (resp. f/2 -error correction) iff, for any union of d columns, every other column contains at least f + 1 points not in this union. Any t-(m, k, 1)-packing with k d(t 1) + f + 1 is a solution to the group testing problem with at most d positives and f-error detection. Optimal? Allowing for up to f errors, Balding and Torney (96) defined (C, G) to be an optimal solution if it maximizes n (the number of clones) for fixed m (the number of pools) subject to the requirement that whenever the number of errors is f, one can infer from the outcomes either the status of each clone, or that the number of positives is > d.

33 0-32 Let φ(a) denote the set of positive pools when the clones indexed by A are positive and no error occurs. (C, G) is a d-positive, f-error solution, or (d, f)-solution, if from φ(a) we can infer either A or that A > d, even in the presence of up to f errors. This occurs iff d(φ(a), φ(a )) > f A, A 2 {1,2,...,n}, A A, A d, Theorem 3.7 (C, G) σ m d,f (the set of (d, f)-solutions) iff c i \ φ(a) > f A 2 {1,2,...,n}, A d, i {1, 2,..., n} \ A.

34 0-33 Theorem 3.8 If (C, G) σ1,f m, then n = C satisfies n 1 ( ) m, K f m/2 in which K 0 = 1 and, for f even, K f = ( )( ) f/2 m/2 m/2, s=0 s s while for f odd, K f = K f T where T = 2 m/2 /(f + 1). ( )( ) m/2 m/2, (f + 1)/2 (f + 1)/2 Corollary {C 2 {1,2,...,n} : C = m/2 } is optimal in σ m 1,0. 2. If a ( m/2 1)-(m, m/2, 1)-design exists then it is optimal in σ m 1,1.

35 0-34 Theorem 3.10 If (C, G) σ m 2,f, then n ( )( m 2t ) 1 + f 1, t t in which t is the least integer value of t such that m 5t + 2 so that t = (m 2)/5 if f = 0 or 1. f(f 1), t + f Corollary 3.11 If a t -(m, 2t +f 1, 1)-design exists, then it is optimal in σ m 2,f.

36 0-35 In the d = 1 case (Theorem 3.8), For d = 2 (Theorem 3.10), m > log n (1 + o(1)). log 2 m > log n (1 + o(1)). log 5/4 Problem 3.12 Is there any analogue result for σ m d,f with d > 2? In general, we need deeper results and new breakthroughs for errortolerant group testing problems. Problem 3.13 Find bounds similar to those in Theorem 3.1 given the number of clones n, max number of positives d, and max number of errors f.

37 Consecutive Positives Case Bruno et al. (95): Analyzed linear DNA. Various consecutive clones of the DNA have been constructed, which are placed in a linear order corresponding to the order of their appearance in the DNA. Clones are not disjoint, but rather overlap. It may happen that one probe occurs in a relatively large number of clones. We want to know where a particular probe occurs in the linear DNA. Assumption: The probe occurs only once in the DNA. Then positive clones containing this probe are consecutive under the same ordering.

38 0-37 Let C = {c 1, c 2,..., c n } be a set of clones, equipped with the linear order c i c i+1 for 1 i < n. C has the d-consecutive positives property if the set of positive clones is a consecutive set (under the ordering ), and contains at most d clones. Colbourn s Result (99) Theorem 4.1 Non-adaptive group testing for at most d consecutive positives in a linearly ordered n-set of clones can be accomplished with log 2 n + 2d + 1 = O(log 2 n + d) pools. Colbourn (99) noticed all cases d 2 can be reduced to the case d = 2.

39 0-38 Muller and Jimbo s Improvements (04, 06) The incidence matrix H is required to be 2-consecutive positive detectable (2CPD). Let H = [x 0, x 1,..., x n 1 ] be an (0, 1)-matrix. Define y i = x i x i+1, 0 i n 2. Then H is called a 2CPD-matrix iff consist of pairwise distinct vectors. x 0, y 0, x 1, y 1,..., x n 2, y n 2, x n 1 Define y n 1 = x n 1 x 0. Then H is a cyclic 2CPD-matrix iff x 0, y 0, x 1, y 1,..., x n 2, y n 2, x n 1, y n 1 consist of pairwise distinct vectors.

40 0-39 In other words, they considered cyclic sequences with distinct unions. Let P(m) denote the set of all subsets of {0, 1,..., m 1}, and let X = {x 0, x 1,..., x n 1 } P(m). A cyclic sequence of X is a sequence S = (x 0, x 1,..., x n 1 ), x i X, s.t. each x i appears exactly once in S, and the indices of x i S are considered modulo n. S is a cyclic sequence with distinct (consecutive) unions (CSDU) if y i = x i x i+1, 0 i n 1, are pairwise distinct. Remark: In the case d = 2, we can distinguish up to any two consecutive positive clones.

41 0-40 Muller and Jimbo (04) established the existence of m n 2CPDmatrices having a maximum number of columns n = 2 m 1 for any m 3. Then for any n clones, we need only m = log 2 n + 1 pools to distinguish them. Remark: Colbourn (99) needs log 2 n + 3 pools. Muller and Jimbo (04) also investigated 2CPD-matrices having the maximum number of columns where each clone appears the same number of times in the pools. Theorem 4.2 m and 1 w m/2, an optimal non-adaptive group testing strategy for clones having the 2-consecutive positives property with m pools of size ( ( m 1 w 1) and n = m w) clones, where each clone appears in exactly w pools.

42 0-41 Error-Tolerant Group Testing for Consecutive Positives X P(m), let CSDU(X) denote the class of all cyclic sequences with distinct consecutive unions of the element of X. We are interested in the case X = P(m, w), the set of all w-subsets of {0, 1,..., m 1}, where we simply write CSDU(m, w). We may further require any y i = x i x i+1 to be in some prescribed set Y P(m). The sub-class of CSDU(X) with consecutive unions in Y is denoted by CSDU(X Y ). We write CSDU(m, w Y ) for X = P(m, w). We focus on Y = P w (mod 2) (m): The resulting group testing strategy can detect up to one error.

43 0-42 Obviously, any S CSDU(m, w) corresponds to a cyclic 2CPDmatrix with m rows and n = ( m w) columns of weight w. Finding CSDU(X Y ) is very difficult in general, including many unsolved problems such as the middle two levels problem. The middle two levels problem asks whether there is a Hamiltonian cycle in the middle two ranks P(2k + 1, k) and P(2k + 1, k + 1) of the Boolean lattice B 2k+1. Obviously, such Hamiltonian cycles correspond to the elements of CSDU(2k + 1, k k + 1). Shields and Savage (99): The largest value for which a Hamiltonian cycle is known to exist is k = 15.

44 0-43 Muller and Jimbo s Result (06) Theorem 4.3 Suppose m 3 m 4 s.t. CSDU(m w, w w + 2). Then m m w, CSDU(m, w w + 2). It is not difficult to see that the smallest possible m w are given by m w = 2w + 2. Problem 4.4 Is CSDU(2w + 2, w w + 2) for any w 2? This problem seems to be as hard as the middle two levels problem.

45 0-44 We can relax the problem by either increasing m w or by enlarging Y of admissible unions. Problem 4.5 Is CSDU(2w + 2, w P w (mod 2) (2w + 2)) for any w 2? If yes, is there a sequence in each CSDU(2w + 2, w P w (mod 2) (2w + 2)) s.t. at least one consecutive union is of size w + 2? Lemma 4.6 CSDU(m, w P w (mod 2) (m)) for any m m w for the following w and m w : w m w Problem 4.7 Find a general construction principle for infinitely many w.

46 0-45 To obtain group testing strategies with higher error-tolerant ability, we could start with some error-correcting code C of min distance d. Problem 4.8 Find a partition C = X Y s.t. CSDU(X Y ). Any such cyclic sequence would define a group testing strategy which detects up to d 1 errors. Unfortunately, Muller and Jimbo (06) noticed, in general, that this problem seems to be very difficult. Problem 4.9 Derive lower bounds on the length of the longest cyclic sequence with distinct consecutive unions of codewords of C.

47 0-46 Momihara s Result (06) m, Momihara (06) showed the existence of a maximal CSDU(m, 3 3) by applying some sufficient conditions for the existence of a Hamiltonian cycle to the block 0-intersection graph of an optimal (m, 3, 1)- packing.

48 Bayesian Network Pool Result Decoder Algorithm The incidence relation of C and G can also be represented by its Tanner graph E = {{c, G} C G : c G}, which has been studied when investigating low-density parity-check (LDPC) codes. Let X c be a random variable s.t. X c = { 0, if clone c is negative, 1, if clone c is positive. Let Z G be the random variable defined as Z G = c G X c. Then: (1) If G contains only negative clones, then Z G = 0. (2) If G contains at least one positive clone, then Z G = 1.

49 0-48 G. Let S G be a random variable representing the test outcome of pool We should take into account of the error probabilities P (S G = s Z G = z), i.e. P (S G 0 Z G = 0) is the probability of false positive, while P (S G = 0 Z G = 1) is that of false negative. Let X = (X c1,..., X cn ) and S = (S G1,..., S Gm ). Assumption: X c s are independent, each S G depends only on Z G, and S G s are independent. In an experiment, when S is observed, then P (X = x S = s) = P (X = x, S = s)/p (S = s) = KP (X = x, S = s) = KP (X = x)p (S = s X = x) = K c C P (X c = x c ) G G P (S G = s G Z G = z G ) where K = P (S = s) 1 is a constant.

50 0-49 Therefore, P (X c = x S = s) = K P (X d = x d ) P (S G = s G Z G = z G ), x c =x d C G G where x c =x means the sum of all x {0, 1}n with x c = x. Moreover, we assume that P (S G = s G Z G = z G ) are empirically known from previous experiments. We need 2 n 1 = {x {0, 1} n : x c = x} summations to calculate P (X c = x S = s), which is exponential in n. Therefore, an efficient algorithm is needed. Uehara and Jimbo (06) proposed an algorithm based on Bayesian network (graphical model that encodes probabilistic relationships among variables of interest) related to the sum-product algorithm for decoding LDPC codes.

51 0-50 Bayesian Network Pool Result Decoder (BNPD) Algorithm Step 0 For each c G, set P (X c = x). Step 1 (Initialization of Q): For each c G, let Q x (c, G) = P (X c = x), x = 0, 1. Step 2 (Computation of R): For each G c, compute R 0 (G, c) = P (s G 1) + (P (s G 0) P (s G 1)) c G\{c} Q 0 (c, G) and R 1 (G, c) = P (s G 1), where P (s G z) = P (S G = s G Z G = z). Normalize R x as follows: R x (G, c) = R x (G, c), x = 0, 1. R 0 (G, c) + R 1 (G, c)

52 0-51 Step 3 (Computation of Q): For each c G, compute Q x (c, G) = P (X c = x) G (c)\{g} R x (G, c), x = 0, 1, where (c) denotes a set of pools which include c. Normalize Q x as follows: Q x (c, G) = Q x (c, G), x = 0, 1. Q 0 (c, G) + Q 1 (c, G) Step 4 (Iteration): Iterate Step 2 and Step 3 for several times until the values Q x converges.

53 0-52 Step 5 (Computation of marginal probability): For each c G, compute Q x (c) = P (X c = x) G (c) R x (G, c), x = 0, 1. Normalize Q x as follows: Q x (c) = Q x (c), x = 0, 1. Q 0 (c) + Q 1 (c)

54 0-53 Uehara and Jimbo s simulation result (06) shows the positive detecting ability is getting higher when the replication number r becomes larger, and the difference of ability has a big gap between r = 3 and r = 4, so they claimed the desired replication number r is at least 4. MacKay s simulation result (99) for LDPC codes shows the best decoding performance when each bit is checked 3 times (i.e. r = 3). Problem 5.1 How to explain Mackay s and Uehara and Jimbo s simulation results?

55 0-54 If a Tanner graph has no cycle, it is known that each Q x (c) converges to the correct marginal probability P (X c = x S = s) after enough iterations. If it has cycles, we can not say any theoretical result for convergence. However, intuitively, if there are cycles in a Tanner graph, it is desirable that it does not have short cycles.

56 0-55 From a design (X, B), we can construct a Tanner graph by defining B to be the set of vertices representing clones, and X to be that representing pools, and an edge between x X and B B if x B. A packing is -free if non-colinear points P 1, P 2, P 3, if there are two blocks containing P 1, P 2 and P 1, P 3 respectively, then there is no block containing P 2, P 3. Clearly, the Tanner graphs obtained from -free packings are free of 4-cycles and 6-cycles simultaneously, and therefore their girths are 8.

57 0-56 Theorem 5.2 -free (v, 3, 1)-packing (X, B), B v(v + 3)/18. The -free packing number F D(v) is the maximum number of blocks in any -free (v, 3, 1)-packing. Example 5.3 F D(v) = v(v + 3)/18 for 1 v < 10, v 6, and F D(v) = v(v + 3)/18 1 for v = 6. Problem 5.4 Construct infinite series of -free (v, 3, 1)-packings with maximum number of blocks. Problem 5.5 What we can say about -free (v, 4, 1)-packings?

58 Concluding Remarks 1. We described the framework of combinatorial group testing for DNA library screening. 2. We described how to deal the case when there are d positives, and possibly f errors. 3. We described how to deal with consecutive positive clones, and possibly errors. 4. We describe the BNDP algorithm closely related to the decoding of LDPC codes. 5. We mentioned a lot of open problems. Try to solve these problems, and develop more combinatorial methods for DNA library screening.

59 Thank You! 0-58

A class of error-correcting pooling designs over complexes

A class of error-correcting pooling designs over complexes DOI 10.1007/s10878-008-9179-4 A class of error-correcting pooling designs over complexes Tayuan Huang Kaishun Wang Chih-Wen Weng Springer Science+Business Media, LLC 008 Abstract As a generalization of

More information

Protein-Protein Interaction and Group Testing in Bipartite Graphs

Protein-Protein Interaction and Group Testing in Bipartite Graphs Int. J. Bioinformatics Research and Applications, Vol. x, No. x, xxxx 1 Protein-Protein Interaction and Group Testing in Bipartite Graphs Yingshu Li, My T. Thai, Zhen Liu and Weili Wu Department of Computer

More information

Noisy Group Testing and Boolean Compressed Sensing

Noisy Group Testing and Boolean Compressed Sensing Noisy Group Testing and Boolean Compressed Sensing Venkatesh Saligrama Boston University Collaborator: George Atia Outline Examples Problem Setup Noiseless Problem Average error, Worst case error Approximate

More information

Improved Combinatorial Group Testing for Real-World Problem Sizes

Improved Combinatorial Group Testing for Real-World Problem Sizes Improved Combinatorial Group Testing for Real-World Problem Sizes Michael T. Goodrich Univ. of California, Irvine joint w/ David Eppstein and Dan Hirschberg Group Testing Input: n items, numbered 0,1,,

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

Decomposing dense bipartite graphs into 4-cycles

Decomposing dense bipartite graphs into 4-cycles Decomposing dense bipartite graphs into 4-cycles Nicholas J. Cavenagh Department of Mathematics The University of Waikato Private Bag 3105 Hamilton 3240, New Zealand nickc@waikato.ac.nz Submitted: Jun

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

SPA decoding on the Tanner graph

SPA decoding on the Tanner graph SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t

More information

A Proposed Quantum Low Density Parity Check Code

A Proposed Quantum Low Density Parity Check Code arxiv:quant-ph/83v 29 Aug 2 A Proposed Quantum Low Density Parity Check Code Michael S. Postol National Security Agency 98 Savage Road Fort Meade, MD 2755 Email: msposto@zombie.ncsc.mil June 3, 28 2 LOW

More information

Linear Algebra and its Applications

Linear Algebra and its Applications Linear Algebra and its Applications 4 (2010) 118 1147 Contents lists available at ScienceDirect Linear Algebra and its Applications journal homepage: www.elsevier.com/locate/laa Two error-correcting pooling

More information

Almost Cover-Free Codes and Designs

Almost Cover-Free Codes and Designs Almost Cover-Free Codes and Designs A.G. D Yachkov, I.V. Vorobyev, N.A. Polyanskii, V.Yu. Shchukin To cite this version: A.G. D Yachkov, I.V. Vorobyev, N.A. Polyanskii, V.Yu. Shchukin. Almost Cover-Free

More information

Two constructions of new error-correcting pooling designs from orthogonal spaces over a finite field of characteristic 2

Two constructions of new error-correcting pooling designs from orthogonal spaces over a finite field of characteristic 2 DOI 10.1007/s10878-009-9210-4 Two constructions of new error-correcting pooling designs from orthogonal spaces over a finite field of characteristic 2 Zengti Li Suogang Gao Hongjie Du Feng Zou Weili Wu

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

Week 15-16: Combinatorial Design

Week 15-16: Combinatorial Design Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial

More information

Codes on graphs. Chapter Elementary realizations of linear block codes

Codes on graphs. Chapter Elementary realizations of linear block codes Chapter 11 Codes on graphs In this chapter we will introduce the subject of codes on graphs. This subject forms an intellectual foundation for all known classes of capacity-approaching codes, including

More information

MATH 13 SAMPLE FINAL EXAM SOLUTIONS

MATH 13 SAMPLE FINAL EXAM SOLUTIONS MATH 13 SAMPLE FINAL EXAM SOLUTIONS WINTER 2014 Problem 1 (15 points). For each statement below, circle T or F according to whether the statement is true or false. You do NOT need to justify your answers.

More information

Chapter 10 Combinatorial Designs

Chapter 10 Combinatorial Designs Chapter 10 Combinatorial Designs BIBD Example (a,b,c) (a,b,d) (a,c,e) (a,d,f) (a,e,f) (b,c,f) (b,d,e) (b,e,f) (c,d,e) (c,d,f) Here are 10 subsets of the 6 element set {a, b, c, d, e, f }. BIBD Definition

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

Optimal XOR based (2,n)-Visual Cryptography Schemes

Optimal XOR based (2,n)-Visual Cryptography Schemes Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Using Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems

Using Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems Using Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems Jan van den Heuvel and Snežana Pejić Department of Mathematics London School of Economics Houghton Street,

More information

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502) Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

Balanced Nested Designs and Balanced n-ary Designs

Balanced Nested Designs and Balanced n-ary Designs Balanced Nested Designs and Balanced n-ary Designs Ryoh Fuji-Hara a, Shinji Kuriki b, Ying Miao a and Satoshi Shinohara c a Institute of Policy and Planning Sciences, University of Tsukuba, Tsukuba, Ibaraki

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Antipodal Gray Codes

Antipodal Gray Codes Antipodal Gray Codes Charles E Killian, Carla D Savage,1 Department of Computer Science N C State University, Box 8206 Raleigh, NC 27695, USA Abstract An n-bit Gray code is a circular listing of the 2

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

FINITE ABELIAN GROUPS Amin Witno

FINITE ABELIAN GROUPS Amin Witno WON Series in Discrete Mathematics and Modern Algebra Volume 7 FINITE ABELIAN GROUPS Amin Witno Abstract We detail the proof of the fundamental theorem of finite abelian groups, which states that every

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

The Turán number of sparse spanning graphs

The Turán number of sparse spanning graphs The Turán number of sparse spanning graphs Noga Alon Raphael Yuster Abstract For a graph H, the extremal number ex(n, H) is the maximum number of edges in a graph of order n not containing a subgraph isomorphic

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Matchings in hypergraphs of large minimum degree

Matchings in hypergraphs of large minimum degree Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains

More information

New Constructions for De Bruijn Tori

New Constructions for De Bruijn Tori New Constructions for De Bruijn Tori Glenn Hurlbert Garth Isaak Dedicated to the memory of Tony Brewster Abstract A De Bruijn torus is a periodic d dimensional k ary array such that each n 1 n d k ary

More information

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Zigzag Codes: MDS Array Codes with Optimal Rebuilding 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei

More information

Root systems and optimal block designs

Root systems and optimal block designs Root systems and optimal block designs Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk Abstract Motivated by a question

More information

Cost-Constrained Matchings and Disjoint Paths

Cost-Constrained Matchings and Disjoint Paths Cost-Constrained Matchings and Disjoint Paths Kenneth A. Berman 1 Department of ECE & Computer Science University of Cincinnati, Cincinnati, OH Abstract Let G = (V, E) be a graph, where the edges are weighted

More information

Optimal superimposed codes and designs for Renyi s search model

Optimal superimposed codes and designs for Renyi s search model Journal of Statistical Planning and Inference 100 (2002) 281 302 www.elsevier.com/locate/jspi Optimal superimposed codes and designs for Renyi s search model Arkadii G. D yachkov, Vyacheslav V. Rykov Department

More information

Properties and Classification of the Wheels of the OLS Polytope.

Properties and Classification of the Wheels of the OLS Polytope. Properties and Classification of the Wheels of the OLS Polytope. G. Appa 1, D. Magos 2, I. Mourtos 1 1 Operational Research Department, London School of Economics. email: {g.appa, j.mourtos}@lse.ac.uk

More information

Critical Reading of Optimization Methods for Logical Inference [1]

Critical Reading of Optimization Methods for Logical Inference [1] Critical Reading of Optimization Methods for Logical Inference [1] Undergraduate Research Internship Department of Management Sciences Fall 2007 Supervisor: Dr. Miguel Anjos UNIVERSITY OF WATERLOO Rajesh

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and NON-PLANAR EXTENSIONS OF SUBDIVISIONS OF PLANAR GRAPHS Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada and Robin Thomas 1 School of Mathematics

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES The Pennsylvania State University The Graduate School Department of Mathematics STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES A Dissertation in Mathematics by John T. Ethier c 008 John T. Ethier

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

Some V(12,t) vectors and designs from difference and quasi-difference matrices

Some V(12,t) vectors and designs from difference and quasi-difference matrices AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 4 (28), Pages 69 85 Some V(12,t) vectors and designs from difference and quasi-difference matrices R Julian R Abel School of Mathematics and Statistics University

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

1 Basic Combinatorics

1 Basic Combinatorics 1 Basic Combinatorics 1.1 Sets and sequences Sets. A set is an unordered collection of distinct objects. The objects are called elements of the set. We use braces to denote a set, for example, the set

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Discrete Mathematics. Benny George K. September 22, 2011

Discrete Mathematics. Benny George K. September 22, 2011 Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

CSE 190, Great ideas in algorithms: Pairwise independent hash functions

CSE 190, Great ideas in algorithms: Pairwise independent hash functions CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Solving a linear equation in a set of integers II

Solving a linear equation in a set of integers II ACTA ARITHMETICA LXXII.4 (1995) Solving a linear equation in a set of integers II by Imre Z. Ruzsa (Budapest) 1. Introduction. We continue the study of linear equations started in Part I of this paper.

More information

Tutorial: Sparse Signal Recovery

Tutorial: Sparse Signal Recovery Tutorial: Sparse Signal Recovery Anna C. Gilbert Department of Mathematics University of Michigan (Sparse) Signal recovery problem signal or population length N k important Φ x = y measurements or tests:

More information

Hamming Codes 11/17/04

Hamming Codes 11/17/04 Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but

More information

Entropy as a measure of surprise

Entropy as a measure of surprise Entropy as a measure of surprise Lecture 5: Sam Roweis September 26, 25 What does information do? It removes uncertainty. Information Conveyed = Uncertainty Removed = Surprise Yielded. How should we quantify

More information

Cycle lengths in sparse graphs

Cycle lengths in sparse graphs Cycle lengths in sparse graphs Benny Sudakov Jacques Verstraëte Abstract Let C(G) denote the set of lengths of cycles in a graph G. In the first part of this paper, we study the minimum possible value

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Separating codes: constructions and bounds

Separating codes: constructions and bounds Separating codes: constructions and bounds Gérard Cohen 1 and Hans Georg Schaathun 2 1 Ecole Nationale Supérieure des Télécommunications 46 rue Barrault F-75634 Paris Cedex, France cohen@enst.fr 2 Department

More information

Cycle Spectra of Hamiltonian Graphs

Cycle Spectra of Hamiltonian Graphs Cycle Spectra of Hamiltonian Graphs Kevin G. Milans, Dieter Rautenbach, Friedrich Regen, and Douglas B. West July, 0 Abstract We prove that every graph consisting of a spanning cycle plus p chords has

More information

Efficient Approximation for Restricted Biclique Cover Problems

Efficient Approximation for Restricted Biclique Cover Problems algorithms Article Efficient Approximation for Restricted Biclique Cover Problems Alessandro Epasto 1, *, and Eli Upfal 2 ID 1 Google Research, New York, NY 10011, USA 2 Department of Computer Science,

More information

Min-Rank Conjecture for Log-Depth Circuits

Min-Rank Conjecture for Log-Depth Circuits Min-Rank Conjecture for Log-Depth Circuits Stasys Jukna a,,1, Georg Schnitger b,1 a Institute of Mathematics and Computer Science, Akademijos 4, LT-80663 Vilnius, Lithuania b University of Frankfurt, Institut

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Linear binary codes arising from finite groups

Linear binary codes arising from finite groups Linear binary codes arising from finite groups Yannick Saouter, Member, IEEE Institut Telecom - Telecom Bretagne, Technopôle Brest-Iroise - CS 83818 29238 Brest Cedex, France Email: Yannick.Saouter@telecom-bretagne.eu

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

arxiv: v1 [math.co] 30 Nov 2016

arxiv: v1 [math.co] 30 Nov 2016 Rounds in a combinatorial search problem arxiv:1611.10133v1 [math.co] 30 Nov 2016 Dániel Gerbner Máté Vizer MTA Rényi Institute Hungary H-1053, Budapest, Reáltanoda utca 13-15. gerbner@renyi.hu, vizermate@gmail.com

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

Limitations of Algorithm Power

Limitations of Algorithm Power Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying

More information

PALINDROMIC AND SŪDOKU QUASIGROUPS

PALINDROMIC AND SŪDOKU QUASIGROUPS PALINDROMIC AND SŪDOKU QUASIGROUPS JONATHAN D. H. SMITH Abstract. Two quasigroup identities of importance in combinatorics, Schroeder s Second Law and Stein s Third Law, share many common features that

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

arxiv: v1 [cs.it] 2 Jul 2016

arxiv: v1 [cs.it] 2 Jul 2016 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 2016, Albena, Bulgaria pp. 145 150 On a Hypergraph Approach to Multistage Group Testing Problems 1 arxiv:1607.00511v1

More information

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 4029 Optimized Design of Finite-Length Separable Circulant-Based Spatially-Coupled Codes: An Absorbing Set-Based Analysis Behzad Amiri,

More information

Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes

Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes Rathnakumar Radhakrishnan, Sundararajan Sankaranarayanan, and Bane Vasić Department of Electrical and Computer Engineering

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

SYMMETRIC CHAIN DECOMPOSITION FOR CYCLIC QUOTIENTS OF BOOLEAN ALGEBRAS AND RELATION TO CYCLIC CRYSTALS

SYMMETRIC CHAIN DECOMPOSITION FOR CYCLIC QUOTIENTS OF BOOLEAN ALGEBRAS AND RELATION TO CYCLIC CRYSTALS SYMMETRIC CHAIN DECOMPOSITION FOR CYCLIC QUOTIENTS OF BOOLEAN ALGEBRAS AND RELATION TO CYCLIC CRYSTALS PATRICIA HERSH AND ANNE SCHILLING Abstract. The quotient of a Boolean algebra by a cyclic group is

More information

On the Classification of Splitting (v, u c, ) BIBDs

On the Classification of Splitting (v, u c, ) BIBDs BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs Colleen M. Swanson Computer Science & Engineering Division University of Michigan Ann Arbor, MI 48109,

More information

Codes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008

Codes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008 Codes on Graphs Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 27th, 2008 Telecommunications Laboratory (TUC) Codes on Graphs November 27th, 2008 1 / 31

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures

More information

Math 42, Discrete Mathematics

Math 42, Discrete Mathematics c Fall 2018 last updated 12/05/2018 at 15:47:21 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,

More information

Introduction to binary block codes

Introduction to binary block codes 58 Chapter 6 Introduction to binary block codes In this chapter we begin to study binary signal constellations, which are the Euclidean-space images of binary block codes. Such constellations have nominal

More information

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

Polynomial-time Reductions

Polynomial-time Reductions Polynomial-time Reductions Disclaimer: Many denitions in these slides should be taken as the intuitive meaning, as the precise meaning of some of the terms are hard to pin down without introducing the

More information

Containment restrictions

Containment restrictions Containment restrictions Tibor Szabó Extremal Combinatorics, FU Berlin, WiSe 207 8 In this chapter we switch from studying constraints on the set operation intersection, to constraints on the set relation

More information