Decoding of the Triple-Error-Correcting Binary Quadratic Residue Codes
|
|
- Naomi Wheeler
- 5 years ago
- Views:
Transcription
1 Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc Resdue Codes Hung-Peng Lee *, Hsn-Chu Chang Department of Computer Scence and Informaton Engneerng, Fortune Insttute of echnology, Kaohsung, ROC *Correspondng author: Receved February 4, 0; Revsed January 7, 04; Accepted February 09, 04 Abstract In ths paper, a more effcent syndrome-weght decodng algorthm (SWDA), called the enhanced syndrome-weght decodng algorthm (ESWDA), s presented to decode up to three possble errors for the bnary systematc (,, 7) and (, 6, 7) quadratc resdue (QR) codes. In decodng of the QR codes, the evaluaton of the error-locator polynomal n the fnte feld s complcated and tme-consumng. o solve such a problem, the proposed ESWDA avods evaluatng the complcated error-locator polynomal, and has no need of a look-up table to store the syndromes and ther correspondng error patterns n the memory. In comparson wth the SWDA developed by Ln-Chang-Lee-ruong (00), the smulaton results show that the ESWDA can serve as an effcent and hghspeed decoder. Keywords: syndrome, error pattern, Golay code, quadratc resdue code Cte hs Artcle: Hung-Peng Lee, and Hsn-Chu Chang, Decodng of the rple-error-correctng Bnary Quadratc Resdue Codes. Automatc Control and Informaton Scences, vol., no. (04): 7-. do: 0.69/acs---.. Introducton he trple-error-correctng bnary QR codes nclude (,, 7) QR code and (, 6, 7) QR code, respectvely. he bnary (,, 7) QR code s also called the bnary Golay code, whch s a perfect code. he Golay code s frst ntroduced by Golay n 949 [4]. If an overall party check s used, the rate s exactly /, so that most of the known QR codes are the best-known codes. Among them, the extended (4,, 8) Golay code was utlzed to act as an error control on the Voyager I and II spacecraft msson, provdng clear remote pctures of Jupter and Saturn []. Several algebrac decodng algorthms (ADAs) had been developed to decode the bnary Golay code [,]. he key dea of decodng the Golay code by usng ADA s to compute the unknown syndrome for determnng the coeffcents of the error-locator polynomal. One of the representatve methods s nverse-free Berlekamp-Massey algorthm [0]. In [], Reed et al. developed the ADA of the extended (, 6, 8) QR code wth reducble generator polynomal. However, such an algorthm s quet complcated. Ln et al. [6] thus proposed a modfed ADA to reduce the decodng complexty. For ADAs, once the coeffcents of the error-locator polynomal are obtaned, the error postons can be determned by usng the Chen search algorthm [], whch s an exhaustve search over all the elements n the fnte feld. In the decodng procedure of ADAs, ths step s the most tme-consumng and need plenty of multplcaton and dvson operatons over the fnte feld. Most recently, table-lookup decodng algorthms (LDAs) [,7,9] have played an mportant role n forward error correcton. hese types of decoders are effcent wth mnmum decodng delay; however, the LDAs requre a memory space n the decoder chp and ncrease the decodng cost rapdly when the code length s large. he SWDA proposed by Ln et al. [7] used the refned lookup table (RL) to decode the trple-error-correctng bnary Golay code and (, 6, 7) QR code. For decodng the Golay code, the RL conssts of 4 syndromes and ther correspondng coset leaders, and t only needs 68 bytes memory sze. For decodng the (, 6, 7) QR code, the RL conssts of 7 syndromes and ther correspondng coset leaders, and t only requres 88 bytes memory sze. In ths paper, the proposed ESWDA has faster decodng speed than the SWDA, and t does not need a memory sze to store the lookup table. he key dea of the proposed ESWDA s based on the weght of syndrome dfference between the syndrome of the receved word and the row vector of the transpose of the party-check matrx. herefore, the error cases can be swftly determned. he applcaton of the syndrome weght and the syndrome dfference can consttute a hgh-speed decodng algorthm. Moreover, no complcated computaton n the fnte feld s requred n the proposed ESWDA. wo examples demonstrate the decodng procedure of the proposed ESWDA. he proposed ESWDA s applcable to decode other cyclc codes such as the bnary (,, 7) BCH code; however, the decodng steps of the proposed ESWDA need to make some slght adjustments. he decodng steps of the bnary (,, 7) BCH code are demonstrated n a smple example. Computer smulaton result shows that the decodng tme of the proposed ESWDA s superor to the SWDA.
2 8 Automatc Control and Informaton Scences he remander of ths paper s organzed as follows: he background of the bnary QR codes s brefly revewed n Secton. he proposed ESWDA s descrbed n Secton. In Secton 4, we use three examples to demonstrate the proposed ESWDA. Computer smulaton results of the proposed ESWDA and the SWDA are gven n Secton. Fnally, ths paper concludes wth a bref summary n Secton 6.. Background of the Bnary QR Codes he bnary QR codes are a nce famly of lnear cyclc codes. Let (n, (n+)/, d) denote the bnary QR codes wth generator polynomal g(x) over GF(). he length of ths code s a prme number of the form n 8l ±, where l s some nteger. Also, let k (n+)/ denote the message length or nformaton length, and d denote the mnmum Hammng dstance of the code. he set Q n of quadratc resdues modulo n s the set of nonzero squares modulo n; that s, Q n {j j x mod n, x n }. If n, then ts quadratc resdue set s Q {,,, 4, 6, 8, 9,,, 6, 8}. If n, then ts quadratc resdue set s Q {,, 4,, 7, 8, 9, 0, 4, 6, 8, 0,, 8}. Let the symbols C and C denote the bnary Golay code and bnary (, 6, 7) QR code, respectvely. Let α be a root of prmtve polynomal p r (x) x +. If α, then the roots of p r (x) are α, α 4, α 6, α 6, α 4 60, α 064, α 6 60, α 7 8, α 8 80, α 9 0, α Let the element β α u be a prmtve rd root of unty n GF( ll ), where u ( ) / 89. herefore, β α 89, where s the decmal representaton of β. he total roots are lsted n able. able. he total roots of x (n decmal number) β 0 β β 74 β 64 β 4 48 β 48 β 6 67 β 7 94 β β 9 8 β 0 β 67 β 0 β 48 β 4 8 β β 6 78 β 7 78 β β 9 9 β 0 β 876 β 08 he generator polynomal of C s defned by g ( ) ( ) Q β () x +. Now let α be a generator of the multplcatve group of all nonzero elements n GF( ). hen, the element β α u, where u ( )/. he x can be factored nto seven prmtve mnmal rreducble polynomals; that s, x (x + )(x 4 + )(x + )(x 4 + )(x + )(x 4 + )(x + ). hen, the generator polynomal of C s reducble, and s defned by g Q ( x ( x x ( x β 4 + )( x ) g g + ) g + ) 7 +, () where g (x), g (x), and g 7 (x) are the mnmal polynomals of x. hat s, g r (x) (x ß r )(x ß r ) (x ß 4r ) and ß r GF( ) for 0 4 are the roots of g r (x), where r,, and 7. If α, then the total roots of x are lsted n able. able. he total roots of x (n decmal number) β 0 β β 4 β 8 β 4 6 β β 6 0 β 7 0 β 8 β 9 6 β 0 7 β 7 β 4 β 8 β 4 9 β β 6 7 β 7 9 β 8 β 9 6 β 0 β 4 β β β 4 0 β β 6 β 7 β 8 β 9 9 β 0 8 Because the mnmum Hammng dstance of C and C s d 7, the nequalty v + 7 s vald, where v s the actual number of errors to be corrected. Hence, the error-correctng capablty s t ( d ) /, where x denotes the greatest nteger less than or equal to x. he codeword s a multple of generator polynomal g(x); n- that s, C C x m( x) g( x, where C GF() 0 ) k 0 for 0 n, and m m x denotes the message polynomal, where m GF() for 0 k. n Let k p 0 p x be the party-check polynomal, where p GF() for 0 n k. Let n k p p x be the party-check polynomal, where 0 p GF() for 0 n k. Let p(x) m(x)x n k mod g(x), then one obtans m(x)x n k q(x)g(x) + p(x). he term (p(x) + m(x)x n k ), whch s a multple of g(x), s a codeword polynomal gven by n- n k cx ( ) cx ( ) ( ), 0 px + mxx () where c GF() for 0 n. In ths paper, the systematc encodng method s utlzed. Now, let a codeword be transmtted through an addtve whte Gaussan nose (AWGN) channel to obtan a receved word wth the form r(x) c(x) + e(x), where e(x) s the polynomal of the receved error pattern expressed as n e 0e x, where e GF() for 0 n. he n-k- syndromes polynomal s expressed as s 0 s x. o smplfy the polynomal expressons mentoned above, let the message, codeword, error pattern, receved word, and syndrome polynomals be expressed as the bnary vector forms m ( m0 m mk ), c ( c0 c cn ), e ( e0 e en ), r c + e ( r 0 r r n ), and s ( s0 s s k ) n, respectvely. he systematc codeword of the vector form s gven by c mg (4) where G s called the systematc generator matrx. Let P be a k (n k) matrx and I k be a k k dentty matrx, and G can be expressed as G P k ( n k ) I k () k n he party-check matrx H can be expressed as H I, where P denotes the (n k) k [ n k P ( n k) k ]( n k) n transpose matrx of P. he vector form of the syndrome s defned by
3 Automatc Control and Informaton Scences 9 s rh, (6) where H denotes the n (n k) transpose matrx of H; that s, H can be expressed as H h0 I n k hn k. Pk ( n k) n ( n k) h n For C, H has the followng form: (7) I H (8) Decodng Algorthm and heorems In ths secton, the proposed ESWDA s used to decode the C and C. For the development of the proposed ESWDA, the followng defnton, theorem and corollary gven n Ln et al. [8] are needed. Defnton : he Hammng weght of a bnary vector a s denoted by w(a), and the Hammng dstance between a and b s denoted by d(a, b) w(a + b). heorem : Let a (a 0 a a n- ) and b (b 0 b b n- ) be two bnary vectors, then n w( a+ b) w( a) + w( b ) ab. (9) Corollary : If a b 0 for n, then ( + ) + ( ). w a b w a w b (0) he followng heorem s useful to compute the syndrome of the receved word when the receved word shfts one bt to the left. For more detaled proof of ths theorem, see [, p8]. heorem : Let s(x) be the syndrome polynomal correspondng to a receved polynomal r(x). Also, let r () (x) be the polynomal obtaned by cyclcally shftng the coeffcents of r(x) one bt to the left. hen the remander obtaned when dvdng xs(x) by g(x) s the syndrome s () (x) correspondng to r () (x). However, for each cyclcal shft of the receved word, we have to dvde xs(x) by g(x). If the syndrome cyclcally shfts many tmes, then the syndrome computaton s rather tme-consumng for dvdng xs(x) by g n (x) many tmes. he followng theorem provdes an effcent method to compute s () for 0 n, and t can save a lot of computatonal tme. heorem : For the bnary QR codes, let r j be an element of r and h j be the jth row vector of H for 0 j n. hen the syndrome s () of r () for 0 n has the form () n- s r 0 jh j, () [ + j] where the suffx [x] of h denotes x mod n. Proof: Let r (r 0,,r n- ) and r () (r,, r n-, r 0,, r - ) for 0 n. By (7), we have s () r () H n- n- r h r h. he proof s thus completed. j 0 [ j ] j j 0 j [ + j] heorem : reveals that the syndrome of r () can be fast computed by the vector addton. heorem 4 also provdes an effcent method to smplfy the decodng step by usng the syndrome weght. For a detaled proof, see [8]. heorem reveals that the syndrome of r () can be fast computed by the vector addton. heorem 4 also provdes an effcent method to smplfy the decodng step by usng the syndrome weght. For a detaled proof, see [8]. heorem 4: For the bnary QR codes, t s assumed that there are v errors n the receved word, where v t. All v errors are n the party-check bts f and only f the weght of syndrome w(s) v. By usng heorem 4, we can develop the followng useful theorem. heorem For the bnary QR codes, f v errors are n the nformaton bts of the receved word, where v t and t ( d )/, then the weght of the correspondng syndrome polynomal or syndrome vector satsfes ( ( )) ( ) ( ) ( ) w s x d v or w s d v. () Proof: Let error polynomal e(x) present the v errors n the nformaton bts; that s, w(e(x)) v. Snce s(x) r(x) e(x) (mod g(x)), we have e(x) + s(x) 0 (mod g(x)). hs mples that e(x) + s(x) s a codeword and hence the codeword must satsfy w(e(x) + s(x)) d. By Corollary, w(e(x) + s(x)) w(e(x)) + w(s(x)) d and then w(s(x)) d w(e(x)). hus, the weght of the syndrome polynomal satsfes w(s(x)) d v or w(s) (d v). he proof s thus completed. Gven a receved word r, the syndrome of r () can be fast computed by heorem. Accordng to heorem 4, f w(s), then the error postons are n the partycheck bts of r. If w(s (n-k) ), then the error postons are n the nformaton bts of r. Let h denote the th row vector of H, where 0 n. Also let sd w denote the syndrome dfference between the syndromes of r and h n each decodng step w. By usng the weght of sd w, the error cases can be quckly determned. Let u 0 (, 0,, 0) be a k-tuples unt vector and u j has only one nonzero component at the jth poston, where 0 j k. By usng these propertes, the proposed ESWDA can be constructed. Let upper case P, C, and H denote the error poston n the party-check bts, center bt, and nformaton bts of r, respectvely. For C or C, there are error cases (P, PP, PPP, H, HH, HHH, C, PC, PH, PPC, PPH, PHH, CH, CHH, and PCH), whch cover all ( ) 047 and ( ) 499 error patterns. If w(s) 0, then r has no error. If w(s) or w(s (n-k) ), then there are 6 error cases (P, PP, PPP, H, HH, and HHH). Let the syndrome dfference sd (s h ) for n k n. If 0 w(sd ), then there are error cases (C, PC, PH, PPC, and PPH). Let the syndrome dfference sd 4 (s (n-k) h ) for n k n. If n k n and w(sd 4 ), then there s only error case (PHH). If n and w(sd 4 ),
4 0 Automatc Control and Informaton Scences then there are error cases (CH and CHH). Let the syndrome dfference sd ((s h n-k ) h ) for k n. If w(sd ), then there s only error case (PCH). he decodng steps of the proposed ESWDA work as follows: ). (No error, P, PP, and PPP cases.) By heorem, compute s and w(s). If 0 w(s), then the nformaton vector s m (r n-k,, r n- ). Go to step 6. ). (H, HH, and HHH cases.) By heorem, compute s (n-k) and w(s (n-k) ). If w(s (n-k) ), then the corrected nformaton vector s m (r n-k,, r n- ) + (s (n-k) >>), where >> denotes the logcal rght shft operator n programmng or the extenson by zeros on the rght n mathematcs. Go to step 6. ). (C, PC, PH, PPC, and PPH cases.) Compute the syndrome dfference sd (s h ) for n k n and w(sd ). If 0 w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u -(n-k). Go to step 6. 4). (PHH, CH, and CHH cases) Compute the syndrome dfference sd 4 (s (n-k) h ) for n k n and w(sd 4 ). If n k n- and w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + (sd 4 >>). If n and w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + u 0 + (sd 4 >> ). Go to step 6. ). (PCH case.) Compute the syndrome dfference sd ((s h n-k ) h ) for k n and w(sd ). If w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u 0 + u -(n-k). Go to step 6. 6). Stop. able lsts all the error cases and the number of error patterns n each decodng steps of the proposed ESWDA. he flowchart of the proposed ESWDA s shown n Fgure. able. he number of error patterns n each decodng step of C and C Number of error patterns Steps Cases C C 4 P ( ) PP ( ) PPP ( ) 6 H ( ) HH ( ) HHH ( ) 6 C PC ( ) PPC ( ) PH ( )( ) PPH ( )( ) 60 PHH ( )( ) 60 CH ( ) CHH ( ) PCH ( )( ) ( ) ( ) ( ) ( ) Examples Fgure. Flowchart of the proposed ESWDA In ths secton, three examples are presented to llustrate the proposed ESWDA. Example and show the decodng steps for the bnary systematc Golay code. Example shows the decodng steps for the bnary systematc (,, 7) BCH code, denoted by C ; however, the decodng steps of the proposed ESWDA have to make some slght adjustments. Example : Let a message m ( ) be encoded nto a C codeword c ( ). If the receved word r ( ), then the error pattern e ( ), whch means a HHH error case. he decodng steps are shown below. ). Compute s (000000) and w(s). Snce w(s) >, go to step. ). Compute s () ( ) and w(s () ). he corrected nformaton word m (000000) + ( ) ( ). Go to stop. Example : hs example demonstrates the worst decodng case. Let a message m ( ) be encoded nto a C codeword c
5 Automatc Control and Informaton Scences ( ). If the receved word r ( ), then the error pattern e ( ), whch means a PCH error case. he decodng steps are shown below. ). Compute s (0000) and w(s) 7. Snce w(s) >, go to step. ). Compute s () (000000) and w(s () ). Snce w(s () ) >, go to step. ). Compute sd (s h ) for and w(sd ). sd (s h ) (0000) (00000) (000000). w(sd ). sd (s h ) (0000) (00000) (000000). w(sd ). sd (s h ) (0000) (0000) ( ). w(sd ) 4. sd (s h ) (0000) (00000) (000000). w(sd ). Snce every w(sd ) >, go to step 4. 4). Compute sd 4 (s () h ) for and w(sd 4 ). sd 4 (s () h ) (000000) (00000) (000000). w(sd 4 ). sd 4 (s () h ) (000000) (00000) (000000). w(sd 4 ). sd 4 (s () h ) (000000) (0000) (00000). w(sd 4 ) 6. sd 4 (s () h ) (000000) (00000) (0000). w(sd 4 ) 7. Snce every w(sd 4 ) >, go to step. ). Compute sd ((s h ) h ) (000000) h for and w(sd ). sd (s h ) h (000000) (00000) (0000). w(sd ) 7. sd (s h ) h (000000) (0000) (00000). w(sd ) 6. sd (s h ) h (000000) (0000) (00000). w(sd ) 6. sd (s h ) h (000000) (00000) ( ). w(sd ). Snce w(sd ), the corrected nformaton word m (r,, r ) + u 0 + u - (00000) + ( ) + ( ) ( ). Go to stop. PCH case s the worst case; however, only error patterns, namely.9%, wll enter step. Example : Let a message m (000) be encoded nto a codeword of C wth g(x) x , and obtan the codeword c ( ). If the receved word r (00000), then the error pattern e ( ), whch means a PHH error case. Frst, the decodng steps of the proposed ESWDA mentoned n Secton can be slghtly adjusted as follows: ). (No error, P, PP, and PPP cases.) By heorem, compute s and w(s). If 0 w(s), then the nformaton vector s m (r n-k,, r n- ), and go to step. ). (H, HH, HHH, PH, PPH, and PHH cases.) By heorem, compute s (n-k) and w(s (n-k) ). If w(s (n-k) ), then the corrected nformaton vector s m (r n-k,, r n- ) + (s (n-k) & ()), where the notaton & denotes the btwse AND operator, and go to step. ). (PH and PPH cases.) Compute the syndrome dfference sd (s h ) for n k n and w(sd ). If 0 w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u -(n-k), and go to step. 4). (PHH case) Compute the syndrome dfference sd 4 (s (n-k) h ) for n k n and w(sd 4 ). If w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + (sd 4 & ()), and go to step. ). Stop. For ths code, there are 9 error cases. able 4 lsts all the 9 error cases and the number of error patterns n each decodng steps. able 4. he number of error patterns n each decodng step of C Number of error patterns Steps Cases C 0 P ( ) 0 ( ) PP 0 4 ( ) PPP 0 0 H ( ) HH ( ) 0 ( ) HHH 0 PH ( )( ) ( )( ) PPH 0 ( )( ) PHH 0 0 PH ( )( ) ( )( ) 0 PPH ( )( ) ( )( ) 0 4 PHH ( )( ) ( )( ) 7 0 he decodng steps are shown below. ). Compute s (00000) and w(s). Snce w(s) >, go to step. ). Compute s () (00) and w(s () ) 8. Snce w(s () ) >, go to step. ). Compute sd (s h ) for 0 4 and w(sd ). sd (s h ) (00000) (0000) (00000). w(sd ). sd (s h ) (00000) (000) (0000). w(sd ) 6. sd (s h ) (00000) (000) (000000). w(sd ) 4. sd (s h 4 ) (00000) (0000) (00000). w(sd ). sd (s h ) (00000) (0000) (000). w(sd ) 7. Snce every w(sd ) >, go to step 4. 4). Compute sd 4 (s () h ) for 0 4 and w(sd 4 ). sd 4 (s () h ) (00) (0000) ( ). w(sd 4 ). Snce w(sd 4 ), the corrected nformaton word m (r 0,, r 4 ) + (sd 4 & ()) (0) + (( ) & ()) (000). Go to stop.
6 Automatc Control and Informaton Scences. Smulaton Results he proposed ESWDA has been programmed n C++ language. On an Intel Q6600 PC wth XP operatng system, all k n codewords wth all ( ) error patterns were created to check every possble error pattern of C, C, and C, respectvely. In other words, the error, patterns of C, C, and C are ( ) 7 ( ) 047, and ( ) 499, respectvely. he decodng tmes of the proposed ESWDA and the SWDA are shown n the able, able 6, and able 7, respectvely. For v, t means that one error of that code nput to the decoder, and for the average decodng tme, t means that all the error patterns of that code nput to the decoder. In these three tables, the average decodng tme of the proposed ESWDA s about 0.6 tmes, 9.6 tmes, and 4 tmes faster than the SWDA, respectvely. he memory requrements of the two algorthms are also shown n able, able 6, and able 7, respectvely. It s obvous that the proposed ESWDA sgnfcantly reduces decodng tme wth the ncrease of the code length. able. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the Golay code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA able 6. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the (, 6, 7) QR code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA able 7. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the (,, 7) BCH code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA Conclusons Bnary QR codes are well known for ther good features. A hgh-speed and effcent ESWDA s developed to decode C, C, and C. he proposed ESWDA nether stores large lookup table n the memory nor computes complcated algebrac computatons. By usng heorem, heorem 4, heorem, and the weght of sd w, the error cases can be quckly dentfed and corrected. herefore, the proposed ESWDA s a very effcent and low-cost decoder for decodng the trple-error-correctng QR codes. he proposed ESWDA can be extended to decode other QR codes or BCH codes; however, the decodng steps of the proposed ESWDA need to make some slght adjustments. References [] Chen, R.., Cyclc decodng procedure for the Bose-Chaudhur- Hocquenghem codes, IEEE rans. Inform. heory, 0(4) Oct [] Chen, Y.H., Chen, C.H., Huang, C.H., ruong,.k., and Jng, M.H., Effcent decodng of systematc (,, 7) and (4,, 9) quadratc resdue codes, J. Inform. Sc. and Eng., 6() Sept. 00. [] Ela, M., Algebrac decodng of the (,, 7) Golay codes, IEEE rans. Inform. heory, (). 0-. Jan [4] Golay, M.J.E., Notes on dgtal codng, Proc. IRE, 7, [] Lee, C.D., Weak general error locator polynomals for trpleerror-correctng bnary Golay code, IEEE Comm. Letters, (8) Aug. 0. [6] Ln,.C., Chang, H.C., Lee, H.P., Chu, S.I, and ruong,.k., Decodng of the (, 6, 7) quadratc resdue code, J. Chnese Insttute of Engneers, (4) June 00. [7] Ln,.C., Chang, H.C., Lee, H.P., and ruong,.k., On the decodng of the (4,, 8) Golay code, Inform. Sc., 80() Dec. 00. [8] Ln,.C., Lee, H.P., Chang, H.C., Chu, S.I, and ruong,.k., Hgh speed decodng of the bnary (47, 4, ) quadratc resdue code, Inform. Sc., 80(0) Oct. 00. [9] Ln,.C., Lee, H.P., Chang, H.C., and ruong,.k., A cyclc weght algorthm of decodng the (47, 4, ) quadratc resdue code, Inform. Sc., Aug. 0. [0] Reed, I.S., Shh, M.., and ruong,.k., VLSI desgn of nverse-free Berlekamp-Massey algorthm, IEE Proc. Comput. Dgt. ech., 8() Sept. 99. [] Reed, I.S., Yn, X., and ruong,.k., Algebrac decodng of the (, 6, 8) quadratc resdue code, IEEE rans. Inform. heory, 6 (4) July 990. [] Reed, I.S., Yn, X., ruong,.k., and Holmes, J.K., Decodng the (4,, 8) Golay code, IEE Proc. Comput. Dgt. ech., 7() May 990. [] Wcker, S.B. Error control systems for dgtal communcaton and storage, Prentce Hall, New Jersey, 99.
High-Speed Decoding of the Binary Golay Code
Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationChapter 6. BCH Codes
Wreless Informaton Transmsson System Lab Chapter 6 BCH Codes Insttute of Communcatons Engneerng Natonal Sun Yat-sen Unversty Outlne Bnary Prmtve BCH Codes Decodng of the BCH Codes Implementaton of Galos
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationDecoding of the Five-Error-Correcting Binary Quadratic Residue Codes
American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic
More informationLow Complexity Soft-Input Soft-Output Hamming Decoder
Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More information} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.
Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and
More informationRefined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationDC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms
Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationCocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map
Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More information2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
-Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationCSE4210 Architecture and Hardware for DSP
4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationFrom the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm
1 / 32 From the Eucldean Algorthm for Solvng a Key Equaton for Dual Reed Solomon Codes to the Berlekamp-Massey Algorthm Mara Bras-Amorós, Mchael E O Sullvan The Claude Shannon Insttute Workshop on Codng
More informationSISO Algorithms for the Nordstrom-Robinson code
SISO Algorthms for the Nordstrom-Robnson code Yannck Saouter, LABSTICC, Brest, France. Insttut Mnes-Télécom 04, August 8th ISTC 04, Bremen, Germany. An hstorcal note Robnson noted, for bnary codes of length
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationEGR 544 Communication Theory
EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationIntroduction to Information Theory, Data Compression,
Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures
More informationTHE SUMMATION NOTATION Ʃ
Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationSection 3.6 Complex Zeros
04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there
More informationTOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION
1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:
More informationThe Geometry of Logit and Probit
The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationMDS Array Codes for Correcting a Single Criss-Cross Error
1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationChapter 8 SCALAR QUANTIZATION
Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar
More informationCyclic Codes BCH Codes
Cycc Codes BCH Codes Gaos Feds GF m A Gaos fed of m eements can be obtaned usng the symbos 0,, á, and the eements beng 0,, á, á, á 3 m,... so that fed F* s cosed under mutpcaton wth m eements. The operator
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationComplex Numbers. x = B B 2 4AC 2A. or x = x = 2 ± 4 4 (1) (5) 2 (1)
Complex Numbers If you have not yet encountered complex numbers, you wll soon do so n the process of solvng quadratc equatons. The general quadratc equaton Ax + Bx + C 0 has solutons x B + B 4AC A For
More informationCOMPLEX NUMBERS AND QUADRATIC EQUATIONS
COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationIRREDUCIBLE POLYNOMIALS OF MAXIMUM WEIGHT OMRAN AHMADI AND ALFRED MENEZES
IRREDUCIBLE POLYNOMIALS OF MAXIMUM WEIGHT OMRAN AHMADI AND ALFRED MENEZES Abstract. We establsh some necessary condtons for the exstence of rreducble polynomals of degree n and weght n over F 2. Such polynomals
More informationAn Interactive Optimisation Tool for Allocation Problems
An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents
More informationLinear Complexity and Correlation of some Cyclotomic Sequences
Lnear Complexty and Correlaton of some Cyclotomc Sequences Young-Joon Km The Graduate School Yonse Unversty Department of Electrcal and Electronc Engneerng Lnear Complexty and Correlaton of some Cyclotomc
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationDepartment of Mathematical Sciences, Clemson University. Some recent developments in permutation decoding
Department of Mathematcal Scences, Clemson Unversty http://www.ces.clemson.edu/ keyj/ Some recent developments n permutaton decodng J. D. Key keyj@ces.clemson.edu 1/32 P Abstract The method of permutaton
More informationOn a direct solver for linear least squares problems
ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationOn the average number of divisors of the sum of digits of squares
Notes on Number heory and Dscrete Mathematcs Prnt ISSN 30 532, Onlne ISSN 2367 8275 Vol. 24, 208, No. 2, 40 46 DOI: 0.7546/nntdm.208.24.2.40-46 On the average number of dvsors of the sum of dgts of squares
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationCHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION
CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr
More information12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product
12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationQuasi-Cyclic LDPC Codes on Latin Squares and the Ranks of their Parity-Check Matrices
uas-cyclc LDPC Codes on Latn quares the Rans of ther Party-Chec Matrces L Zhang, n Huang, hu Ln, K Abdel-Ghaffar Department of Electrcal Computer Eng nversty of Calforna Davs, CA 95616, A Emal: lszhang,qnhuang,shuln,ghaffar
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More information6268 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 11, NOVEMBER 2016
6268 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 11, NOVEMBER 2016 Bnary Lnear Locally Reparable Codes Pengfe Huang, Student Member, IEEE, Etan Yaaob, Member, IEEE, Hronor Uchawa, Member, IEEE,
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationA Comparison between Weight Spectrum of Different Convolutional Code Types
A Comparson between Weght Spectrum of fferent Convolutonal Code Types Baltă Hora, Kovac Mara Abstract: In ths paper we present the non-recursve systematc, recursve systematc and non-recursve non-systematc
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationTHE HARTLEY TRANSFORM IN A FINITE FIELD
THE HARTLEY TRANSFORM IN A FINITE FIELD R. M. Campello de Souza H. M. de Olvera A. N. Kauffman CODEC - Grupo de Pesusas em Comuncações Departamento de Eletrônca e Sstemas - CTG - UFPE C.P. 78 57-97 Recfe
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More informationOn quasiperfect numbers
Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationMODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS
The 3 rd Internatonal Conference on Mathematcs and Statstcs (ICoMS-3) Insttut Pertanan Bogor, Indonesa, 5-6 August 28 MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS 1 Deky Adzkya and 2 Subono
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationOn the Stopping Distance and the Stopping Redundancy of Codes
On the Stoppng Dstance and the Stoppng Redundancy of Codes Moshe Schwartz Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. moosh@everest.ucsd.edu Abstract It s now well known that the performance
More informationSociété de Calcul Mathématique SA
Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc
More informationContents 1 Basics of Convolutional Coding.
Contents 1 Bascs of Convolutonal Codng 1 Φ 11 Relatng G 1 wth the mpulse responses g j 1 ;j 12 TransformAnalyssn ConvolutonalCodes context 4 13 Constructng a convolutonal encoder structure from the generator
More informationUnit 5: Quadratic Equations & Functions
Date Perod Unt 5: Quadratc Equatons & Functons DAY TOPIC 1 Modelng Data wth Quadratc Functons Factorng Quadratc Epressons 3 Solvng Quadratc Equatons 4 Comple Numbers Smplfcaton, Addton/Subtracton & Multplcaton
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationValuated Binary Tree: A New Approach in Study of Integers
Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach
More informationNew Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)
International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic
More informationChapter 7 Channel Capacity and Coding
Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform
More informationDigital Signal Processing
Dgtal Sgnal Processng Dscrete-tme System Analyss Manar Mohasen Offce: F8 Emal: manar.subh@ut.ac.r School of IT Engneerng Revew of Precedent Class Contnuous Sgnal The value of the sgnal s avalable over
More informationEntropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or
Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationInternational Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN
Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More information