The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

Size: px
Start display at page:

Download "The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes"

Transcription

1 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA. Zinoviev Abstract Binary primitive triple-error-correcting Bose Chadhri Hocqenghem (BCH)codes of length 1 have been the object of intensive stdies for several decades. In the 1970s, their covering radis was determined in a series of papers to be 5. However, one problem for these codes that has been open p to now is to find their coset distribtion. In this paper this problem is solved the nmber of cosets of each weight in any binary primitive triple-error-correcting BCH code is determined. As a conseqence this also gives the coset distribtion of the extended codes of length with minimm distance 8. Index Terms Bose Chadhri Hocqenghem (BCH)codes, coset distribtion, covering radis. I. INTRODUCTION Let GF( m ) denote the finite field with m elements. A binary linear [n; k]-code C is a k-dimensional sbspace of GF() n. The Hamming distance between two vectors is the nmber of components in which they differ. The minimm distance of the code is the smallest Hamming distance between any two distinct codewords in the code. A coset of the code C is the set of vectors a + C forsome a GF() n. The coset leaderfora coset of a linearcode is a vectorof smallest weight in the coset. The weight of a coset is the weight of a coset leader. For an optimal complete decoding algorithm for a linear code, where all codewords are sent eqally often, the errors which are corrected are exactly the coset leaders. An important problem in determining the performance of a linear code is therefore to determine the distribtion of the cosets of the code (i.e., to determine the nmber of cosets of each weight). The family of triple-error-correcting binary primitive Bose Chadhri Hocqenghem (BCH) codes of length n m 0 1 has been thoroghly stdied since the 190s. The weight distribtion of these codes was determined by Kasami [9] for odd m. Foreven m the method of Kasami did not work. Berlekamp [, Table 1.5], [] [] gave the weight distribtion of the extended codes for even vales of m. The covering radis of a code is the maximm weight of a coset leader. In the 1970s, the covering radis of these codes were shown in a series of papers by Assms Mattson [1], van der Horst Berger [8] Helleseth [7] to be 5. However, one problem for the triple-error-correcting binary primitive BCH codes that has been open p to now is to find the coset distribtion of these codes. We will assme throghot the rest of this paper that m 5 since the nmber of cosets of the binary triple-error-correcting code in this case Manscript received Janary 19, 005; revised November 1, 005. This work was spported by INRIA-Rocqencort, by the Norwegian Research Concil, by the Rssian fnd of fndamental research nder Project Nmber The material in this correspondence was presented in part at the 005 IEEE International Symposim on Information Theory, Adelaide, Astralia, September 005. P. Charpin is with INRIA, Codes, Domaine de Volcea-Rocqencort, Le Chesnay 7815, France ( pascale.charpin@inria.fr). T. Helleseth is with The Selmer Center, Department of Informatics, University of Bergen, Bergen N-500, Norway ( tor.helleseth@ii.ib.no). V. A. Zinoviev is with the Institte for Problems of Information ansmission, Rssian Academy of Sciences, Moscow 1017, Rssia ( zinov@iitp.r). Commnicated by A. E. Ashikhmin, Associate EditorforCoding Theory. Digital Object Identifier /TIT is m (cf. MacWilliams Sloane [10, p. ]), while the case m is degenerated in the sense that it only contains 5m cosets, since 5 has a minimm polynomial of degree m. Let K i denote the nmberof cosets of weight i. Since the code is triple-error-correcting the vales of K 0, K 1, K K are immediately given by K 0 1; K 1 n 1 ; K n ; K n : Since the covering radis of the code is known to be 5, it is therefore sfficient to determine K K 5. Some partial reslts were given by van derhorst Berger[8] who came p with the following bonds for K K 5 : K 1 n(5n +10n 0 ) K 5 n(n +) they conjectred that eqality holds for m 8. They were able to prove this conjectre for 8 m 1 sing a comptersearch. They frther verified that the conjectre does not hold for m 5, 7. The main reslt of this paper is to show that their 0-year-old conjectre holds therefore to prove the following theorem. Theorem 1: Let K i denote the nmberof cosets with a coset leader of weight i in a triple-error-correcting binary primitive BCH code of length n m 0 1 where m 8. Then the distribtion of the cosets is given by K 0 1 K 1 n 1 K n K n K 1 n(5n +10n 0 ) K 5 n(n +): One shold observe that an even harder problem is the fll problem to find the weight distribtion of the vectors in any coset of the binary primitive triple-error-correcting codes (or their extended codes). This problem has been stdied in the papers by Charpin Zinoviev [] Charpin, Helleseth, Zinoviev [5]. This problem remains open foreven m while it was solved (i.e., expressed in terms of some exponential sms) forodd m in these papers. II. COSETS OF BCH CODES OF LENGTH n m 0 1 The proof of or main reslt in Theorem 1 will be rather self-contained. We will apply simplify some of the techniqes developed in van derhorst Berger[8] in combination with some new ideas needed to prove their conjectre. The focs of the very long technical paper by van der Horst Berger [8] was to constrct a complete decoding algorithm for the triple-error-correcting BCH code. Their stdies of the complete decoding algorithm was partially motivated by the desire to se the triple-error-correcting BCH code in sorce coding. We will mainly focs on the distribtion of the weights of the cosets in order to prove their conjectre. The binary triple-error-correcting primitive BCH code has paritycheck matrix H defined by H 1... n (n01) (n01) /$ IEEE

2 178 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 where is an element of order n m 0 1 in GF( m ), i.e., the code consists of all binary codewords c (c 0 ;c 1 ;...;c n01) GF() n sch that ch tr 0. The syndrome s of a received vector r is s rh tr ( ;S ;S 5 ) where r (r 0 ;r 1 ;...;r n01) H tr denotes the transpose of the matrix H. The decoding starts by compting the syndrome of the received vector then finding a coset leaderin the coset with the same syndrome s (;S ;S 5). The vectors in a coset all have the same syndrome or problem is to find a coset leader, i.e., a vector of smallest possible weight with this syndrome. Therefore we need to find nonzero distinct elements X 1;X ;...;X w (the error-locations) in GF( m ) with the smallest possible w sch that w S i Xj i (1) j1 for i 1; ; 5. Eqivalently, we need to determine a locator polynomial (X) w (X + X i)x w + 1X w w of minimal weight w, sch that (1) holds with nonzero distinct X i s in GF( m ). The Newton identities give a relation between the coefficients of the locatorpolynomial (X) the error-locations via S S + 1 S S i + 1 S i01 + S i i i 0 for i w. Fori>wthen 111 S i + 1S i w01s i0w+1 + ws i0w 0: We se the convention that i 0when i>w. The Newton identities imply 1; S 1 S ; S 5 1 S 1 + S + S : Throghot this correspondence, we define the trace fnction from GF( m ) to GF() by (x) A. The Cosets of Weight w 1 m01 i0 x : The locatorpolynomial of a coset leaderof weight 1 is (X) X + since the syndrome ( ;S ;S 5 ) is given by S j X j 1 for j 1; ; 5. The cosets of weight 1 are therefore the n cosets with syndromes of the form ;S 1;S 5 1 where 0. B. The Cosets of Weight w The locatorpolynomial of a coset leaderof weight corresponding to the error-locations X 1 X leads to a syndrome given by S j X j 1 + Xj for j 1; ; 5. Note that 0since the error-locations are distinct. We obtain by simple direct calclations from the Newton identities that S S 1 + S 5 S S. Comparing the two expressions for,wehave (S + S 1 ) S 5 + S 5 1 S : Since 1, the locatorpolynomial in the case of a coset leader of weight is given by (X) X + X + S + S 1 : () This polynomial has two distinct nonzero zeros in GF( m ) when 0, S S 1 S + S 1 S 1 0. Note that the two expressions for lead to the following relations between the syndrome components M S + S 1S + S 5 + S 1 0: Observe that there are n choices of 0 (n 0 1) choices of S sch that S + 0. Therefore the cosets with syndromes ( ;S ;S 5 ) where 0, S, S + 0 S 5 is sch that the condition M 0 holds are all the n cosets of weight. C. The Cosets of Weight w In this case, the Newton identities lead to 1 the following two expressions for : S + S 1 + S 1 S 5 + S S : Note that if S the first expression sbstitted into the second one implies S 5, 5 contradicting that w. Therefore, S comparing the expressions above leads to S 5 + S 1S S + S 1 sbstitting for in the expression for gives where S + S 1 + S + S 1 + S 5 + S 1S S + S 1 M S + S 1 M S + S 1S + S 5 + S 1: Hence, the locatorpolynomial in the case w is (X) X + X + S5 + S 1S X M S + + : () S + Note that M 0since X 1 X X 0(all X i are nonzero elements) for the case of an error corresponding to a coset leader of weight. Even thogh we do not need this fact in this paperit is sefl forthe decoding algorithm of these codes to observe that it follows from well

3 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL known properties of cbic polynomials that a necessary condition for three distinct zeros of the locator polynomial is that S 5 + S 5 1 (S : )5 D. The Cosets of Weight w 5 We will stdy the conditions forcosets of weight w 5with a locator polynomial with nonzero distinct zeros X 1, X, X, X X 5. The following theorem characterizes some particlar cosets of weight 5 in the triple-error-correcting codes with a syndrome (;S ;S 5) where 0. These will laterbe shown to be all cosets of weight w 5 with 0. Theorem : Let D be a coset with syndrome ( ;S ;S 5 ) sch that 0, M S + S + S 5 + 0; S + 1. Then D is a coset of weight 5. Proof: Since the covering radis of the triple-error-correcting BCH code is known to be 5, it is sfficient to show that the weight w of the coset D is at least 5. Since 0 the coset has weight at least 1. By the trace condition in the theorem it follows that S therefore the coset has weight at least. Frther, since S + 1 it follows that w since the locator polynomial () for w does not have its zeros in m GF( ) nless S + 0. The coset cannot have weight either, since the locatorpolynomial () fora vectorof weight has constant term 0 when M 0 therefore cannot have three distinct nonzero zeros. It follows that the coset has weight at least. We therefore assme that the coset has weight we will show that this is impossible. From the Newton identities, we obtain S + + S5 + S5 1 + S + S 1 : Sbstitting for in the expression for gives S 5 + S S 1 + (S + S 1 ) : Hence, the locatorpolynomial is (X) X + X + X + S + S 1 + X + S5 + SS 1 + S + : () Since this polynomial has fordistinct zeros in m GF( ) it can be factored as (X) (X + ax + b)(x +(a + )X + d): (5) Comparing coefficients, we obtain d + b + a(a + ) ad + b(a + ) bd: From the first identity, we obtain from the second, we get Hence, d + b + a(a + ) ad + b(a + ) a + ab + a (a + )+ab + b a + a (a + )+b: b + a + a (a + ) sbstitting the vale for b in the expression for d above gives +(a + ) + a(a + ) d : The third identity now gives +a +a (a + ) +(a+) +a(a+) S 1: Sbstitting S + S 1 + S5 + SS 1 + S + S 1 into this expression, we obtain (a + ) + S + S 1 + a (a + ) a + S + S 1 + a(a + ) S 5 + S S 1 + S + S 1 : Collecting the coefficients of, the constant term dividing the reslting expression by a(a + )S 1 gives where + S 1 k S + S 1 + S 5 + S S 1 S 1 a(a + ) + k 0 () + S + S 1 S 1 M S a(a + ) a (a + ) + a (a + ) S 1 MS 1 S x (x +1) (7) x a. The trace of k is given by (k) M + S + + x + x M S + + : (8) Since M 0, the trace condition in the theorem gives S + (k) 1: This contradicts () which only has a soltion in m GF( ) when (k) 0, therefore a coset weight of w for D is impossible. Since the code has covering radis 5, we conclde that the coset D has weight 5. Remark1: Note that the nmberof cosets of weight w 5of this form is n(n +1). This follows since there are n choices of 0 foreach nonzero, there are (n +1) choices of S sch that S + S 1 S 1 1. Observe that S 5 is niqely determined by S since M 0. The following reslt can be fond in [8]. We inclde a simpler more direct proof for the sake of completeness. Lemma 1: There are (5n +1n) cosets of weight 5 with 0. Proof: Note that, for m >, there are (n +1) cosets with 0. Frther, observe that all nonzero cosets with 0mst have odd weight. Indeed, as we saw above, it is impossible forcosets of weight, since X 1 X. That cosets of weight with 0 are impossible can be seen from the following simple argments. Assme that some coset D has syndrome ( 0;S ;S 5 ) assme that X 1, X, X, X are error-locations of some vector of D. Recall, that X 1, X, X, X are mtally distinct nonzero elements in GF( m ). Now we see from (1) that for any h GF( m ) a -tple (X 1 + h; X + h; X + h; X + h) forms the error-locations for a

4 170 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 vectorwith the same syndrome ( 0;S ;S 5). This can easily be verified by checking the syndrome of this -tple sing that similarly Xi X i X i X i S 1 S 1: Now take h X 1, which is not forbidden. Then we obtain a -tple (X + X 1;X + X 1;X + X 1) which has this syndrome. Bt this means that D is a coset of weight. The nmberof nonzero cosets of weight with 0 are the nmber of (nordered) ways to select nonzero distinct X 1, X X sch that X 1 +X +X 0 is therefore eqal to n(n 0 1). This means that the nmberof cosets of weight 5 with 0therefore is ((n +1) 0 1) 0 n(n 0 1) (since we cannot choose S S 5 both eqal to zero), which eqals (5n +1n). Remark: Note that adding the nmberof cosets in Lemma 1 with 0to the nmberof cosets with 0in Remark 1 obtained from Theorem we obtain the following sefl bond n(n +1) K 5 n(n +): E. The Cosets of Weight w + 5n +1n To prove the conjectre by van der Horst Berger [8] it is sfficient to show that all cosets with 0, except forthe ones in Theorem, have weight at most. In order to prove Theorem, we need the following crcial lemma which is proved by Moreno Moreno [11]. Lemma : Let F be the algebraic closre of F GF( m ). Let f (x);g(x) F [x] where deg f < r deg g g(x) is a polynomial with t distinct zeros in F. Let L denote the set of zeros of g(x) in F.If f(x) g(x) h(x) + h(x) forany rational fnction h(x) F (x), then xf nl p (01) (t + r 0 ) m +1: Based on this lemma we are able to prove the following theorem. This is a key reslt in order to complete the determination of the coset distribtion. Lemma : Let 0, F GF( m ).Form 10 for given i 0or1 there exists an element x F nf0; 1g sch that i x (x +1) 0: Proof: Let T be the nmberof elements in F 0 F nf0; 1g, obeying the conditions in the theorem. Frther, let e(f) (01) (f). Then stard methods give 8T xf 1+e 1+ 1+e x (x +1) xf xf xf xf 1+ e xf e + x (x +1) + xf x (x +1) + xf e xf (x + x +1) x (x +1) : x (x +1) (x +1) x In order to apply the bond of Lemma, we have to check that all fnctions a(x)b(x) which appearin the sms above satisfy the condition of the lemma. We take, forexample, the fnction x(x +1). We have to show that there is no rational h(x) F (x) sch that x (x +1) h(x) + h(x): (9) Sppose, on the contrary, that there is a rational fnction h(x) a(x)b(x) which satisfies (9). We can assme withot loss of generality that gcd (a(x);b(x)) 1. We obtain xb(x) (x +1) a(x)(a(x)+b(x)): This is a polynomial eqality. So, the left-h side of this eqality is divisible by (x +1). This means that b(x) is divisible at least by (x +1). Bt then, the right h side of this eqality is divisible by (x +1), which is impossible, since a(x) cannot be divisible by x +1 when b(x) is divisible by x+1. We therefore conclde that the eqality (9) is impossible. Hence we can apply Lemma to this sm. The other fnctions in all the sms above are treated in the same way. Using the bonds forthe exponential sms given in the lemma above implies that all the last seven sms are pper bonded by c p m + 1, where c takes the vales ; ; ; ; ; ;, respectively, starting from p the first sm after 1. It follows therefore that 8T m 0 0 m 0 7 so T is strictly positive for m 10. Theorem : Let m 10 let D be a coset sch that 0 which does not obey both the conditions M S + S 1S + S 5 + S 1 0 S + S 1 S 1 1. Then D is a coset of weight at most. Proof: We will show that we can find a polynomial (X) of degree with for zeros (not necessarily distinct) in GF( m ) with the reqired syndrome. We will show that we can select the coefficient of X in the polynomial (X) in () sch that it has all zeros in GF( m ). This implies that (1) holds therefore that the coset has weight at most. If some of the zeros of (X) are 0 orrepeated this leads to a coset of weight less than. Set x to be an element of GF( m ) nf0; 1g, sch that x (x +1) S + S 1 S 1 0: This can be done by Lemma. Set to be a soltion in GF( m ) of the qadratic eqation where + S 1 + k 0 k MS 1 + S + + x (x +1):

5 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL This can be done since (k) 0, by the choice of x in the previos step. Then set 1 S + S 1 + S5 + SS 1 + (S + S 1 ) a x b + a + a (a + ) d +(a + ) + a(a + ) (X) (X + ax + b)(x +(a + )X + d): Note that since x f0; 1g 0, we cannot have a 0nor a. Frther, observe that (ba ) Since a x, then we obtain (ba ) 0: Similarly we obtain d (a + ) + a + a (a + ) a S + S 1 +(a + ) + a (a + ) a S + S 1 a + a + a + a +1 S + a + a + a a + +1 : S + + S 1 + x + x +1 (S + ) + k x + x +1 x (x +1) + x +1+x +1 x (x +1) +(a + ) + a(a + ) (a + ) S + S 1 + a + a(a + ) (a + ) : Note that this is the same formla as for (ba ) with a+ replaced by a oreqivalently x replaced by x +1. Therefore we have d (a + ) 0: Then note that (X) factors into linear factors (X) X + X +(a(a + )+b + d)x rotine calclations show that +(ad +(a + )b)x + bd (X) X + 1 X + X + X + : Foreach i let T i be the sm of the ith powers of the roots of (X) (repeating roots according to their mltiplicity in sch sms). Then it remains to show that T i Si for i 1; ; 5. The Newton identities give s T 1 1 T 1 T 1 + T 1 + T 5 1T 1 + T + T 1 + T 1 since 1,wehaveT 1. Then T 1 S S by the definitions of 1. Frther, T 5 1 S 1 + S + S 1 + S 5 by the definitions of 1,. We conclde that the zeros of (X) obey the syndrome eqations in (1). Note that if some of the zeros of (X) are 0 oreqal, it means that the coset has a coset leaderof weight less than. In any case, the coset D has weight at most. Proof of Theorem 1: The theorem was shown to be tre for 8 m 1 by a compter search de to van der Horst Berger [8]. From Remark 1 following Theorem we know that the nmber of cosets of weight w 5 with 0 is at least n(n +1). Frther, from Remark following Lemma 1 we know that the nmber of cosets of weight w 5with 0eqals (5n +1n), which implies that K 5 n(n +). According to Theorem all cosets with 0otherthan those in Theorem have weight at most. It follows therefore that K 5 n(n +) therefore, since the total nmber of cosets is (n +1), that K 1 n(5n +10n0 ). III. THE COSET DISTRIBUTION OF EXTENDED BCH CODES OF LENGTH n m WITH MINIMUM DISTANCE d 8 In this section we determine the coset distribtion of the extended codes of the triple-error-correcting BCH codes. Denote by B the extended binary primitive BCH code of length N m with minimm distance 8. The parity-check matrix H ext of B is defined by H ext n (n01) (n01) where is an element of order n m 0 1 in GF( m ). Note that the syndrome in this case is a -tple (S 0 ; ;S ;S 5 ). Denote by 0 i the nmberof cosets of B of weight i. Since B is an extended binary [N m ;k N 0 m 0 1]-code with covering radis at most, we have immediately that 0 i N i0 i0 0 i 0 i01: Using that that clearly 0 i N i for i 1; ;, we dedce that 0 +0 N N 0 5 N N N N (N 0 1)(5N +8): 1 Hence, to find the complete coset distribtion we have to find the nmber 0 or 0. From the previos sections we know the coset

6 17 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 TABLE I COSET DISTRIBUTION OF BCH CODES TABLE II COSET DISTRIBUTION OF EXTENDED BCH CODES distribtion for the code of length n m 0 1. Frther, we observe that 0 K 5 : This can be seen since any coset of weight of the code B of length N m is redced to a coset of weight 5 of the corresponding code of length n m 01, vice versa, when we do overall parity checking. In other words, more precisely, a coset with syndrome ( ;S ;S 5 ) has weight 5 in the binary triple-error-correcting BCH code of length n m 0 1 if only if (S 0 0;;S ;S 5) is the syndrome of a coset of weight in the extended code. Therefore, 0 K 5 the coset distribtion of the extended code follows directly from the coset distribtion of the binary primitive triple-error-correcting BCH code this gives the final reslt below. Theorem : Let 0i denote the nmberof cosets with a coset leader of weight i in the extended triple-error-correcting binary primitive BCH code of length N m where m 8. Then the distribtion of the cosets is given by N 1 REFERENCES [1] E. F. Assms Jr H. F. Mattson Jr, Some -error-correcting BCH codes have covering radis 5, IEEE ans. Inf. Theory, vol. IT-, pp. 8 9, May 197. [] E. R. Berlekamp, Algebraic Coding Theory. New York: McGraw-Hill, 198. [], The weight enmerators for certain sbcodes of the second-order Reed-Mllercodes, Inf. Contr., vol. 17, pp , [], Weight enmeration theorems, in Proc. Sixth Allerton Conf. Circit Systems Theory, Urbana, IL, 198, pp [5] P. Charpin, T. Helleseth, V. A. Zinoviev, On cosets of weight of binary BCH codes with minimal distance 8 exponential sms, Prob. Inf. ans., vol. 1, no., pp. 01 0, 005. [] P. Charpin V. A. Zinoviev, On coset weight distribtions of the -error-correcting BCH-codes, SIAM J. Discr. Math., vol. 10, no. 1, pp , Feb [7] T. Helleseth, All binary -error-correcting BCH codes of length 1 have covering radis 5, IEEE ans. Inf. Theory, vol. IT-, pp , Mar [8] J. A. van der Horst T. Berger, Complete decoding of triple-errorcorrecting binary BCH codes, IEEE ans. Inf. Theory, vol. IT-, pp , Mar [9] T. Kasami, Weight distribtions of Bose-Chadhri-Hocqenghen codes, in Combinatorial Mathematics Its Applications, R. Bose T. Dowling, Eds. Chapel Hill, NC: University of North Carolina Press, 199, ch. 0. [10] F. J. MacWilliams N. Sloane, The Theory of Error-Correcting Codes. Amsterdam, The Netherls: North-Holl, 199. [11] C. Moreno O. Moreno, Exponential sms Goppa codes: I, in Proc. Amer. Math. Soc., vol. 111, 1991, pp On Qasi-Cyclic Interleavers for Parallel bo Codes Joseph J. Botros, Member, IEEE Gilles Zémor, Member, IEEE 0 N 0 N 0 1 (N 0 1)(N 0 5N 0 ) N (N 0 1)(5N +8) 0 (N 0 1)(N +1): Forcompleteness sake, the nmberof cosets with a coset leaderof weight i in the triple-error-correcting binary primitive BCH code of length n m 0 1 in the extended code are given in the Tables I II when m 5; ; 7. IV. CONCLUSION We have determined the distribtion of cosets in the binary primitive triple-error-correcting BCH codes of length n m 0 1. This solves the conjectre from 197 by van der Horst Berger. As an easy conseqence this also gives the coset distribtion of the extended codes of length N m minimm distance d 8. ACKNOWLEDGMENT The athors wold like to thank the anynomos reviewers for their very detailed carefl comments that considerably improved the presentation of this paper. Abstract In this correspondence, we present an interleaving scheme that yields qasi-cyclic trbo codes. We prove that romly chosen members of this family yield with probability almost 1 trbo codes with asymptotically optimm minimm distance, i.e., growing as a logarithm of the interleaver size. These interleavers are also very practical in terms of memory reqirements their decoding error probabilities for small block lengths compare favorably with previos interleaving schemes. Index Terms Convoltional codes, iterative decoding, minimm distance, qasi-cyclic codes, trbo codes. I. INTRODUCTION It is now well known that the behavior of trbo codes, althogh very powerfl nder high noise, exhibits an error floor phenomenon that can be explained by poor minimm distance properties. More specifically, it can be shown that for romly chosen interleavers, the expected minimm distance of a classical two-level trbo code remains constant [1], [19], i.e., does not grow with block length. Can the error floor behavior of trbo codes be improved by designing the interleaver in a way that differs from pre rom choice? Manscript received Janary 1, 005; revised December 0, 005. The material in this correspondence was presented in part at the 00 IEEE International Symposim on Information Theory, Chicago, IL, Jne/Jly 00. The athors are with École Nationale Spériere des Télécommnications, 75 Paris 1, France ( botros@enst.fr; zemor@enst.fr). Commnicated by M. P. Fossorier, Associate Editor for Coding Techniqes. Digital Object Identifier /TIT /$ IEEE

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Admissibility under the LINEX loss function in non-regular case. Hidekazu Tanaka. Received November 5, 2009; revised September 2, 2010

Admissibility under the LINEX loss function in non-regular case. Hidekazu Tanaka. Received November 5, 2009; revised September 2, 2010 Scientiae Mathematicae Japonicae Online, e-2012, 427 434 427 Admissibility nder the LINEX loss fnction in non-reglar case Hidekaz Tanaka Received November 5, 2009; revised September 2, 2010 Abstract. In

More information

STEP Support Programme. STEP III Hyperbolic Functions: Solutions

STEP Support Programme. STEP III Hyperbolic Functions: Solutions STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh

More information

Weight Distributions of a Class of Cyclic Codes with Arbitrary Number of Zeros II

Weight Distributions of a Class of Cyclic Codes with Arbitrary Number of Zeros II 1 Weight Distribtions of a Class of Cyclic Codes with Arbitrary Nmber of Zeros II Jing Yang, Lingli Xia, Maosheng Xiong arxiv:1405.656v1 [math.nt] 4 May 014 Abstract Cyclic codes are an important class

More information

Some extensions of Alon s Nullstellensatz

Some extensions of Alon s Nullstellensatz Some extensions of Alon s Nllstellensatz arxiv:1103.4768v2 [math.co] 15 Ag 2011 Géza Kós Compter and Atomation Research Institte, Hngarian Acad. Sci; Dept. of Analysis, Eötvös Loránd Univ., Bdapest kosgeza@szta.h

More information

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1 OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIEL OF A POLYHERAL BOY WITH LINEARLY INCREASING ENSITY 1 V. POHÁNKA2 Abstract The formla for the comptation of the gravity field of a polyhedral body

More information

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup L -smoothing for the Ornstein-Uhlenbeck semigrop K. Ball, F. Barthe, W. Bednorz, K. Oleszkiewicz and P. Wolff September, 00 Abstract Given a probability density, we estimate the rate of decay of the measre

More information

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size

More information

The Heat Equation and the Li-Yau Harnack Inequality

The Heat Equation and the Li-Yau Harnack Inequality The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with

More information

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Qadratic Optimization Problems in Continos and Binary Variables Naohiko Arima, Snyong Kim and Masakaz Kojima October 2012,

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

On oriented arc-coloring of subcubic graphs

On oriented arc-coloring of subcubic graphs On oriented arc-coloring of sbcbic graphs Alexandre Pinlo Alexandre.Pinlo@labri.fr LaBRI, Université Bordeax I, 351, Cors de la Libération, 33405 Talence, France Janary 17, 2006 Abstract. A homomorphism

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

The Brauer Manin obstruction

The Brauer Manin obstruction The Braer Manin obstrction Martin Bright 17 April 2008 1 Definitions Let X be a smooth, geometrically irredcible ariety oer a field k. Recall that the defining property of an Azmaya algebra A is that,

More information

Math 263 Assignment #3 Solutions. 1. A function z = f(x, y) is called harmonic if it satisfies Laplace s equation:

Math 263 Assignment #3 Solutions. 1. A function z = f(x, y) is called harmonic if it satisfies Laplace s equation: Math 263 Assignment #3 Soltions 1. A fnction z f(x, ) is called harmonic if it satisfies Laplace s eqation: 2 + 2 z 2 0 Determine whether or not the following are harmonic. (a) z x 2 + 2. We se the one-variable

More information

Approximate Solution for the System of Non-linear Volterra Integral Equations of the Second Kind by using Block-by-block Method

Approximate Solution for the System of Non-linear Volterra Integral Equations of the Second Kind by using Block-by-block Method Astralian Jornal of Basic and Applied Sciences, (1): 114-14, 008 ISSN 1991-8178 Approximate Soltion for the System of Non-linear Volterra Integral Eqations of the Second Kind by sing Block-by-block Method

More information

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

Study of the diffusion operator by the SPH method

Study of the diffusion operator by the SPH method IOSR Jornal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-684,p-ISSN: 2320-334X, Volme, Isse 5 Ver. I (Sep- Oct. 204), PP 96-0 Stdy of the diffsion operator by the SPH method Abdelabbar.Nait

More information

ON THE SHAPES OF BILATERAL GAMMA DENSITIES

ON THE SHAPES OF BILATERAL GAMMA DENSITIES ON THE SHAPES OF BILATERAL GAMMA DENSITIES UWE KÜCHLER, STEFAN TAPPE Abstract. We investigate the for parameter family of bilateral Gamma distribtions. The goal of this paper is to provide a thorogh treatment

More information

On Multiobjective Duality For Variational Problems

On Multiobjective Duality For Variational Problems The Open Operational Research Jornal, 202, 6, -8 On Mltiobjective Dality For Variational Problems. Hsain *,, Bilal Ahmad 2 and Z. Jabeen 3 Open Access Department of Mathematics, Jaypee University of Engineering

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

1 The space of linear transformations from R n to R m :

1 The space of linear transformations from R n to R m : Math 540 Spring 20 Notes #4 Higher deriaties, Taylor s theorem The space of linear transformations from R n to R m We hae discssed linear transformations mapping R n to R m We can add sch linear transformations

More information

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students BLOOM S TAXONOMY Topic Following Bloom s Taonomy to Assess Stdents Smmary A handot for stdents to eplain Bloom s taonomy that is sed for item writing and test constrction to test stdents to see if they

More information

Formules relatives aux probabilités qui dépendent de très grands nombers

Formules relatives aux probabilités qui dépendent de très grands nombers Formles relatives ax probabilités qi dépendent de très grands nombers M. Poisson Comptes rends II (836) pp. 603-63 In the most important applications of the theory of probabilities, the chances of events

More information

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational

More information

When are Two Numerical Polynomials Relatively Prime?

When are Two Numerical Polynomials Relatively Prime? J Symbolic Comptation (1998) 26, 677 689 Article No sy980234 When are Two Nmerical Polynomials Relatively Prime? BERNHARD BECKERMANN AND GEORGE LABAHN Laboratoire d Analyse Nmériqe et d Optimisation, Université

More information

MULTICARRIER communications has recently attracted

MULTICARRIER communications has recently attracted IEEE TRANSACTIONS ON INFORMATION, VOL., NO., JANUARY 014 1 On the PMEPR of binary Golay seqences of length n Zilong Wang, Member, IEEE, Matthew G. Parker, Gang Gong, Fellow, IEEE and Gaofei W Abstract

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

The Lehmer matrix and its recursive analogue

The Lehmer matrix and its recursive analogue The Lehmer matrix and its recrsive analoge Emrah Kilic, Pantelimon Stănică TOBB Economics and Technology University, Mathematics Department 0660 Sogtoz, Ankara, Trkey; ekilic@etedtr Naval Postgradate School,

More information

SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR

SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR italian jornal of pre and applied mathematics n. 34 215 375 388) 375 SUBORDINATION RESULTS FOR A CERTAIN SUBCLASS OF NON-BAZILEVIC ANALYTIC FUNCTIONS DEFINED BY LINEAR OPERATOR Adnan G. Alamosh Maslina

More information

MEAN VALUE ESTIMATES OF z Ω(n) WHEN z 2.

MEAN VALUE ESTIMATES OF z Ω(n) WHEN z 2. MEAN VALUE ESTIMATES OF z Ωn WHEN z 2 KIM, SUNGJIN 1 Introdction Let n i m pei i be the prime factorization of n We denote Ωn by i m e i Then, for any fixed complex nmber z, we obtain a completely mltiplicative

More information

System identification of buildings equipped with closed-loop control devices

System identification of buildings equipped with closed-loop control devices System identification of bildings eqipped with closed-loop control devices Akira Mita a, Masako Kamibayashi b a Keio University, 3-14-1 Hiyoshi, Kohok-k, Yokohama 223-8522, Japan b East Japan Railway Company

More information

A Note on Irreducible Polynomials and Identity Testing

A Note on Irreducible Polynomials and Identity Testing A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

CONSIDER an array of N sensors (residing in threedimensional. Investigating Hyperhelical Array Manifold Curves Using the Complex Cartan Matrix

CONSIDER an array of N sensors (residing in threedimensional. Investigating Hyperhelical Array Manifold Curves Using the Complex Cartan Matrix IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (SPECIAL ISSUE), VOL.?, NO.?,???? 1 Investigating yperhelical Array Manifold Crves Using the Complex Cartan Matrix Athanassios Manikas, Senior Member,

More information

An Investigation into Estimating Type B Degrees of Freedom

An Investigation into Estimating Type B Degrees of Freedom An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Solving ECDLP via List Decoding

Solving ECDLP via List Decoding Solving ECDLP via List Decoding Fanggo Zhang 1,2 and Shengli Li 3 1 School of Data and Compter Science, Sn Yat-sen University, Gangzho 510006, China 2 Gangdong Key Laboratory of Information Secrity, Gangzho

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model

A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model entropy Article A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model Hyenkyn Woo School of Liberal Arts, Korea University of Technology and Edcation, Cheonan

More information

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS PHAS STRING AND FOCUSING BHAVIOR OF ULTRASOUND IN CMNTITIOUS MATRIALS Shi-Chang Wooh and Lawrence Azar Department of Civil and nvironmental ngineering Massachsetts Institte of Technology Cambridge, MA

More information

FINITE TRAVELING WAVE SOLUTIONS IN A DEGENERATE CROSS-DIFFUSION MODEL FOR BACTERIAL COLONY. Peng Feng. ZhengFang Zhou. (Communicated by Congming Li)

FINITE TRAVELING WAVE SOLUTIONS IN A DEGENERATE CROSS-DIFFUSION MODEL FOR BACTERIAL COLONY. Peng Feng. ZhengFang Zhou. (Communicated by Congming Li) COMMUNICATIONS ON Website: http://aimsciences.org PURE AND APPLIED ANALYSIS Volme 6, Nmber 4, December 27 pp. 45 65 FINITE TRAVELING WAVE SOLUTIONS IN A DEGENERATE CROSS-DIFFUSION MODEL FOR BACTERIAL COLONY

More information

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren Restricted cycle factors and arc-decompositions of digraphs J. Bang-Jensen and C. J. Casselgren REPORT No. 0, 0/04, spring ISSN 0-467X ISRN IML-R- -0-/4- -SE+spring Restricted cycle factors and arc-decompositions

More information

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal

More information

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time Tomas Björk Department of Finance, Stockholm School of Economics tomas.bjork@hhs.se Agatha Mrgoci Department of Economics Aarhs

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

New Multi-User OFDM Scheme: Braided Code Division Multiple Access

New Multi-User OFDM Scheme: Braided Code Division Multiple Access New Mlti-User Scheme: Braided Code Division Mltiple Access Marcos B.S. Tavares, Michael Lentmaier, Kamil Sh. Zigangirov and Gerhard. Fettweis Vodafone Chair Mobile Commnications Systems, Technische Universität

More information

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department

More information

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2 MATH 307 Vectors in Rn Dr. Neal, WKU Matrices of dimension 1 n can be thoght of as coordinates, or ectors, in n- dimensional space R n. We can perform special calclations on these ectors. In particlar,

More information

Mean Value Formulae for Laplace and Heat Equation

Mean Value Formulae for Laplace and Heat Equation Mean Vale Formlae for Laplace and Heat Eqation Abhinav Parihar December 7, 03 Abstract Here I discss a method to constrct the mean vale theorem for the heat eqation. To constrct sch a formla ab initio,

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

3.4-Miscellaneous Equations

3.4-Miscellaneous Equations .-Miscellaneos Eqations Factoring Higher Degree Polynomials: Many higher degree polynomials can be solved by factoring. Of particlar vale is the method of factoring by groping, however all types of factoring

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Optimal Control, Statistics and Path Planning

Optimal Control, Statistics and Path Planning PERGAMON Mathematical and Compter Modelling 33 (21) 237 253 www.elsevier.nl/locate/mcm Optimal Control, Statistics and Path Planning C. F. Martin and Shan Sn Department of Mathematics and Statistics Texas

More information

Solving a System of Equations

Solving a System of Equations Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic

More information

Control Systems

Control Systems 6.5 Control Systems Last Time: Introdction Motivation Corse Overview Project Math. Descriptions of Systems ~ Review Classification of Systems Linear Systems LTI Systems The notion of state and state variables

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

A Single Species in One Spatial Dimension

A Single Species in One Spatial Dimension Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Fixed points for discrete logarithms

Fixed points for discrete logarithms Fixed points for discrete logarithms Mariana Levin 1, Carl Pomerance 2, and and K. Sondararajan 3 1 Gradate Grop in Science and Mathematics Edcation University of California Berkeley, CA 94720, USA levin@berkeley.ed

More information

3 2D Elastostatic Problems in Cartesian Coordinates

3 2D Elastostatic Problems in Cartesian Coordinates D lastostatic Problems in Cartesian Coordinates Two dimensional elastostatic problems are discssed in this Chapter, that is, static problems of either plane stress or plane strain. Cartesian coordinates

More information

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u.

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u. 2005-Ojda International Conference on Nonlinear Analysis. Electronic Jornal of Differential Eqations, Conference 14, 2006, pp. 95 107. ISSN: 1072-6691. URL: http://ejde.math.txstate.ed or http://ejde.math.nt.ed

More information

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS 3. System Modeling Mathematical Modeling In designing control systems we mst be able to model engineered system dynamics. The model of a dynamic system

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Chapter 4 Supervised learning:

Chapter 4 Supervised learning: Chapter 4 Spervised learning: Mltilayer Networks II Madaline Other Feedforward Networks Mltiple adalines of a sort as hidden nodes Weight change follows minimm distrbance principle Adaptive mlti-layer

More information