Decoding of the Triple-Error-Correcting Binary Quadratic Residue Codes

Size: px
Start display at page:

Download "Decoding of the Triple-Error-Correcting Binary Quadratic Residue Codes"

Transcription

1 Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc Resdue Codes Hung-Peng Lee *, Hsn-Chu Chang Department of Computer Scence and Informaton Engneerng, Fortune Insttute of echnology, Kaohsung, ROC *Correspondng author: Receved February 4, 0; Revsed January 7, 04; Accepted February 09, 04 Abstract In ths paper, a more effcent syndrome-weght decodng algorthm (SWDA), called the enhanced syndrome-weght decodng algorthm (ESWDA), s presented to decode up to three possble errors for the bnary systematc (,, 7) and (, 6, 7) quadratc resdue (QR) codes. In decodng of the QR codes, the evaluaton of the error-locator polynomal n the fnte feld s complcated and tme-consumng. o solve such a problem, the proposed ESWDA avods evaluatng the complcated error-locator polynomal, and has no need of a look-up table to store the syndromes and ther correspondng error patterns n the memory. In comparson wth the SWDA developed by Ln-Chang-Lee-ruong (00), the smulaton results show that the ESWDA can serve as an effcent and hghspeed decoder. Keywords: syndrome, error pattern, Golay code, quadratc resdue code Cte hs Artcle: Hung-Peng Lee, and Hsn-Chu Chang, Decodng of the rple-error-correctng Bnary Quadratc Resdue Codes. Automatc Control and Informaton Scences, vol., no. (04): 7-. do: 0.69/acs---.. Introducton he trple-error-correctng bnary QR codes nclude (,, 7) QR code and (, 6, 7) QR code, respectvely. he bnary (,, 7) QR code s also called the bnary Golay code, whch s a perfect code. he Golay code s frst ntroduced by Golay n 949 [4]. If an overall party check s used, the rate s exactly /, so that most of the known QR codes are the best-known codes. Among them, the extended (4,, 8) Golay code was utlzed to act as an error control on the Voyager I and II spacecraft msson, provdng clear remote pctures of Jupter and Saturn []. Several algebrac decodng algorthms (ADAs) had been developed to decode the bnary Golay code [,]. he key dea of decodng the Golay code by usng ADA s to compute the unknown syndrome for determnng the coeffcents of the error-locator polynomal. One of the representatve methods s nverse-free Berlekamp-Massey algorthm [0]. In [], Reed et al. developed the ADA of the extended (, 6, 8) QR code wth reducble generator polynomal. However, such an algorthm s quet complcated. Ln et al. [6] thus proposed a modfed ADA to reduce the decodng complexty. For ADAs, once the coeffcents of the error-locator polynomal are obtaned, the error postons can be determned by usng the Chen search algorthm [], whch s an exhaustve search over all the elements n the fnte feld. In the decodng procedure of ADAs, ths step s the most tme-consumng and need plenty of multplcaton and dvson operatons over the fnte feld. Most recently, table-lookup decodng algorthms (LDAs) [,7,9] have played an mportant role n forward error correcton. hese types of decoders are effcent wth mnmum decodng delay; however, the LDAs requre a memory space n the decoder chp and ncrease the decodng cost rapdly when the code length s large. he SWDA proposed by Ln et al. [7] used the refned lookup table (RL) to decode the trple-error-correctng bnary Golay code and (, 6, 7) QR code. For decodng the Golay code, the RL conssts of 4 syndromes and ther correspondng coset leaders, and t only needs 68 bytes memory sze. For decodng the (, 6, 7) QR code, the RL conssts of 7 syndromes and ther correspondng coset leaders, and t only requres 88 bytes memory sze. In ths paper, the proposed ESWDA has faster decodng speed than the SWDA, and t does not need a memory sze to store the lookup table. he key dea of the proposed ESWDA s based on the weght of syndrome dfference between the syndrome of the receved word and the row vector of the transpose of the party-check matrx. herefore, the error cases can be swftly determned. he applcaton of the syndrome weght and the syndrome dfference can consttute a hgh-speed decodng algorthm. Moreover, no complcated computaton n the fnte feld s requred n the proposed ESWDA. wo examples demonstrate the decodng procedure of the proposed ESWDA. he proposed ESWDA s applcable to decode other cyclc codes such as the bnary (,, 7) BCH code; however, the decodng steps of the proposed ESWDA need to make some slght adjustments. he decodng steps of the bnary (,, 7) BCH code are demonstrated n a smple example. Computer smulaton result shows that the decodng tme of the proposed ESWDA s superor to the SWDA.

2 8 Automatc Control and Informaton Scences he remander of ths paper s organzed as follows: he background of the bnary QR codes s brefly revewed n Secton. he proposed ESWDA s descrbed n Secton. In Secton 4, we use three examples to demonstrate the proposed ESWDA. Computer smulaton results of the proposed ESWDA and the SWDA are gven n Secton. Fnally, ths paper concludes wth a bref summary n Secton 6.. Background of the Bnary QR Codes he bnary QR codes are a nce famly of lnear cyclc codes. Let (n, (n+)/, d) denote the bnary QR codes wth generator polynomal g(x) over GF(). he length of ths code s a prme number of the form n 8l ±, where l s some nteger. Also, let k (n+)/ denote the message length or nformaton length, and d denote the mnmum Hammng dstance of the code. he set Q n of quadratc resdues modulo n s the set of nonzero squares modulo n; that s, Q n {j j x mod n, x n }. If n, then ts quadratc resdue set s Q {,,, 4, 6, 8, 9,,, 6, 8}. If n, then ts quadratc resdue set s Q {,, 4,, 7, 8, 9, 0, 4, 6, 8, 0,, 8}. Let the symbols C and C denote the bnary Golay code and bnary (, 6, 7) QR code, respectvely. Let α be a root of prmtve polynomal p r (x) x +. If α, then the roots of p r (x) are α, α 4, α 6, α 6, α 4 60, α 064, α 6 60, α 7 8, α 8 80, α 9 0, α Let the element β α u be a prmtve rd root of unty n GF( ll ), where u ( ) / 89. herefore, β α 89, where s the decmal representaton of β. he total roots are lsted n able. able. he total roots of x (n decmal number) β 0 β β 74 β 64 β 4 48 β 48 β 6 67 β 7 94 β β 9 8 β 0 β 67 β 0 β 48 β 4 8 β β 6 78 β 7 78 β β 9 9 β 0 β 876 β 08 he generator polynomal of C s defned by g ( ) ( ) Q β () x +. Now let α be a generator of the multplcatve group of all nonzero elements n GF( ). hen, the element β α u, where u ( )/. he x can be factored nto seven prmtve mnmal rreducble polynomals; that s, x (x + )(x 4 + )(x + )(x 4 + )(x + )(x 4 + )(x + ). hen, the generator polynomal of C s reducble, and s defned by g Q ( x ( x x ( x β 4 + )( x ) g g + ) g + ) 7 +, () where g (x), g (x), and g 7 (x) are the mnmal polynomals of x. hat s, g r (x) (x ß r )(x ß r ) (x ß 4r ) and ß r GF( ) for 0 4 are the roots of g r (x), where r,, and 7. If α, then the total roots of x are lsted n able. able. he total roots of x (n decmal number) β 0 β β 4 β 8 β 4 6 β β 6 0 β 7 0 β 8 β 9 6 β 0 7 β 7 β 4 β 8 β 4 9 β β 6 7 β 7 9 β 8 β 9 6 β 0 β 4 β β β 4 0 β β 6 β 7 β 8 β 9 9 β 0 8 Because the mnmum Hammng dstance of C and C s d 7, the nequalty v + 7 s vald, where v s the actual number of errors to be corrected. Hence, the error-correctng capablty s t ( d ) /, where x denotes the greatest nteger less than or equal to x. he codeword s a multple of generator polynomal g(x); n- that s, C C x m( x) g( x, where C GF() 0 ) k 0 for 0 n, and m m x denotes the message polynomal, where m GF() for 0 k. n Let k p 0 p x be the party-check polynomal, where p GF() for 0 n k. Let n k p p x be the party-check polynomal, where 0 p GF() for 0 n k. Let p(x) m(x)x n k mod g(x), then one obtans m(x)x n k q(x)g(x) + p(x). he term (p(x) + m(x)x n k ), whch s a multple of g(x), s a codeword polynomal gven by n- n k cx ( ) cx ( ) ( ), 0 px + mxx () where c GF() for 0 n. In ths paper, the systematc encodng method s utlzed. Now, let a codeword be transmtted through an addtve whte Gaussan nose (AWGN) channel to obtan a receved word wth the form r(x) c(x) + e(x), where e(x) s the polynomal of the receved error pattern expressed as n e 0e x, where e GF() for 0 n. he n-k- syndromes polynomal s expressed as s 0 s x. o smplfy the polynomal expressons mentoned above, let the message, codeword, error pattern, receved word, and syndrome polynomals be expressed as the bnary vector forms m ( m0 m mk ), c ( c0 c cn ), e ( e0 e en ), r c + e ( r 0 r r n ), and s ( s0 s s k ) n, respectvely. he systematc codeword of the vector form s gven by c mg (4) where G s called the systematc generator matrx. Let P be a k (n k) matrx and I k be a k k dentty matrx, and G can be expressed as G P k ( n k ) I k () k n he party-check matrx H can be expressed as H I, where P denotes the (n k) k [ n k P ( n k) k ]( n k) n transpose matrx of P. he vector form of the syndrome s defned by

3 Automatc Control and Informaton Scences 9 s rh, (6) where H denotes the n (n k) transpose matrx of H; that s, H can be expressed as H h0 I n k hn k. Pk ( n k) n ( n k) h n For C, H has the followng form: (7) I H (8) Decodng Algorthm and heorems In ths secton, the proposed ESWDA s used to decode the C and C. For the development of the proposed ESWDA, the followng defnton, theorem and corollary gven n Ln et al. [8] are needed. Defnton : he Hammng weght of a bnary vector a s denoted by w(a), and the Hammng dstance between a and b s denoted by d(a, b) w(a + b). heorem : Let a (a 0 a a n- ) and b (b 0 b b n- ) be two bnary vectors, then n w( a+ b) w( a) + w( b ) ab. (9) Corollary : If a b 0 for n, then ( + ) + ( ). w a b w a w b (0) he followng heorem s useful to compute the syndrome of the receved word when the receved word shfts one bt to the left. For more detaled proof of ths theorem, see [, p8]. heorem : Let s(x) be the syndrome polynomal correspondng to a receved polynomal r(x). Also, let r () (x) be the polynomal obtaned by cyclcally shftng the coeffcents of r(x) one bt to the left. hen the remander obtaned when dvdng xs(x) by g(x) s the syndrome s () (x) correspondng to r () (x). However, for each cyclcal shft of the receved word, we have to dvde xs(x) by g(x). If the syndrome cyclcally shfts many tmes, then the syndrome computaton s rather tme-consumng for dvdng xs(x) by g n (x) many tmes. he followng theorem provdes an effcent method to compute s () for 0 n, and t can save a lot of computatonal tme. heorem : For the bnary QR codes, let r j be an element of r and h j be the jth row vector of H for 0 j n. hen the syndrome s () of r () for 0 n has the form () n- s r 0 jh j, () [ + j] where the suffx [x] of h denotes x mod n. Proof: Let r (r 0,,r n- ) and r () (r,, r n-, r 0,, r - ) for 0 n. By (7), we have s () r () H n- n- r h r h. he proof s thus completed. j 0 [ j ] j j 0 j [ + j] heorem : reveals that the syndrome of r () can be fast computed by the vector addton. heorem 4 also provdes an effcent method to smplfy the decodng step by usng the syndrome weght. For a detaled proof, see [8]. heorem reveals that the syndrome of r () can be fast computed by the vector addton. heorem 4 also provdes an effcent method to smplfy the decodng step by usng the syndrome weght. For a detaled proof, see [8]. heorem 4: For the bnary QR codes, t s assumed that there are v errors n the receved word, where v t. All v errors are n the party-check bts f and only f the weght of syndrome w(s) v. By usng heorem 4, we can develop the followng useful theorem. heorem For the bnary QR codes, f v errors are n the nformaton bts of the receved word, where v t and t ( d )/, then the weght of the correspondng syndrome polynomal or syndrome vector satsfes ( ( )) ( ) ( ) ( ) w s x d v or w s d v. () Proof: Let error polynomal e(x) present the v errors n the nformaton bts; that s, w(e(x)) v. Snce s(x) r(x) e(x) (mod g(x)), we have e(x) + s(x) 0 (mod g(x)). hs mples that e(x) + s(x) s a codeword and hence the codeword must satsfy w(e(x) + s(x)) d. By Corollary, w(e(x) + s(x)) w(e(x)) + w(s(x)) d and then w(s(x)) d w(e(x)). hus, the weght of the syndrome polynomal satsfes w(s(x)) d v or w(s) (d v). he proof s thus completed. Gven a receved word r, the syndrome of r () can be fast computed by heorem. Accordng to heorem 4, f w(s), then the error postons are n the partycheck bts of r. If w(s (n-k) ), then the error postons are n the nformaton bts of r. Let h denote the th row vector of H, where 0 n. Also let sd w denote the syndrome dfference between the syndromes of r and h n each decodng step w. By usng the weght of sd w, the error cases can be quckly determned. Let u 0 (, 0,, 0) be a k-tuples unt vector and u j has only one nonzero component at the jth poston, where 0 j k. By usng these propertes, the proposed ESWDA can be constructed. Let upper case P, C, and H denote the error poston n the party-check bts, center bt, and nformaton bts of r, respectvely. For C or C, there are error cases (P, PP, PPP, H, HH, HHH, C, PC, PH, PPC, PPH, PHH, CH, CHH, and PCH), whch cover all ( ) 047 and ( ) 499 error patterns. If w(s) 0, then r has no error. If w(s) or w(s (n-k) ), then there are 6 error cases (P, PP, PPP, H, HH, and HHH). Let the syndrome dfference sd (s h ) for n k n. If 0 w(sd ), then there are error cases (C, PC, PH, PPC, and PPH). Let the syndrome dfference sd 4 (s (n-k) h ) for n k n. If n k n and w(sd 4 ), then there s only error case (PHH). If n and w(sd 4 ),

4 0 Automatc Control and Informaton Scences then there are error cases (CH and CHH). Let the syndrome dfference sd ((s h n-k ) h ) for k n. If w(sd ), then there s only error case (PCH). he decodng steps of the proposed ESWDA work as follows: ). (No error, P, PP, and PPP cases.) By heorem, compute s and w(s). If 0 w(s), then the nformaton vector s m (r n-k,, r n- ). Go to step 6. ). (H, HH, and HHH cases.) By heorem, compute s (n-k) and w(s (n-k) ). If w(s (n-k) ), then the corrected nformaton vector s m (r n-k,, r n- ) + (s (n-k) >>), where >> denotes the logcal rght shft operator n programmng or the extenson by zeros on the rght n mathematcs. Go to step 6. ). (C, PC, PH, PPC, and PPH cases.) Compute the syndrome dfference sd (s h ) for n k n and w(sd ). If 0 w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u -(n-k). Go to step 6. 4). (PHH, CH, and CHH cases) Compute the syndrome dfference sd 4 (s (n-k) h ) for n k n and w(sd 4 ). If n k n- and w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + (sd 4 >>). If n and w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + u 0 + (sd 4 >> ). Go to step 6. ). (PCH case.) Compute the syndrome dfference sd ((s h n-k ) h ) for k n and w(sd ). If w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u 0 + u -(n-k). Go to step 6. 6). Stop. able lsts all the error cases and the number of error patterns n each decodng steps of the proposed ESWDA. he flowchart of the proposed ESWDA s shown n Fgure. able. he number of error patterns n each decodng step of C and C Number of error patterns Steps Cases C C 4 P ( ) PP ( ) PPP ( ) 6 H ( ) HH ( ) HHH ( ) 6 C PC ( ) PPC ( ) PH ( )( ) PPH ( )( ) 60 PHH ( )( ) 60 CH ( ) CHH ( ) PCH ( )( ) ( ) ( ) ( ) ( ) Examples Fgure. Flowchart of the proposed ESWDA In ths secton, three examples are presented to llustrate the proposed ESWDA. Example and show the decodng steps for the bnary systematc Golay code. Example shows the decodng steps for the bnary systematc (,, 7) BCH code, denoted by C ; however, the decodng steps of the proposed ESWDA have to make some slght adjustments. Example : Let a message m ( ) be encoded nto a C codeword c ( ). If the receved word r ( ), then the error pattern e ( ), whch means a HHH error case. he decodng steps are shown below. ). Compute s (000000) and w(s). Snce w(s) >, go to step. ). Compute s () ( ) and w(s () ). he corrected nformaton word m (000000) + ( ) ( ). Go to stop. Example : hs example demonstrates the worst decodng case. Let a message m ( ) be encoded nto a C codeword c

5 Automatc Control and Informaton Scences ( ). If the receved word r ( ), then the error pattern e ( ), whch means a PCH error case. he decodng steps are shown below. ). Compute s (0000) and w(s) 7. Snce w(s) >, go to step. ). Compute s () (000000) and w(s () ). Snce w(s () ) >, go to step. ). Compute sd (s h ) for and w(sd ). sd (s h ) (0000) (00000) (000000). w(sd ). sd (s h ) (0000) (00000) (000000). w(sd ). sd (s h ) (0000) (0000) ( ). w(sd ) 4. sd (s h ) (0000) (00000) (000000). w(sd ). Snce every w(sd ) >, go to step 4. 4). Compute sd 4 (s () h ) for and w(sd 4 ). sd 4 (s () h ) (000000) (00000) (000000). w(sd 4 ). sd 4 (s () h ) (000000) (00000) (000000). w(sd 4 ). sd 4 (s () h ) (000000) (0000) (00000). w(sd 4 ) 6. sd 4 (s () h ) (000000) (00000) (0000). w(sd 4 ) 7. Snce every w(sd 4 ) >, go to step. ). Compute sd ((s h ) h ) (000000) h for and w(sd ). sd (s h ) h (000000) (00000) (0000). w(sd ) 7. sd (s h ) h (000000) (0000) (00000). w(sd ) 6. sd (s h ) h (000000) (0000) (00000). w(sd ) 6. sd (s h ) h (000000) (00000) ( ). w(sd ). Snce w(sd ), the corrected nformaton word m (r,, r ) + u 0 + u - (00000) + ( ) + ( ) ( ). Go to stop. PCH case s the worst case; however, only error patterns, namely.9%, wll enter step. Example : Let a message m (000) be encoded nto a codeword of C wth g(x) x , and obtan the codeword c ( ). If the receved word r (00000), then the error pattern e ( ), whch means a PHH error case. Frst, the decodng steps of the proposed ESWDA mentoned n Secton can be slghtly adjusted as follows: ). (No error, P, PP, and PPP cases.) By heorem, compute s and w(s). If 0 w(s), then the nformaton vector s m (r n-k,, r n- ), and go to step. ). (H, HH, HHH, PH, PPH, and PHH cases.) By heorem, compute s (n-k) and w(s (n-k) ). If w(s (n-k) ), then the corrected nformaton vector s m (r n-k,, r n- ) + (s (n-k) & ()), where the notaton & denotes the btwse AND operator, and go to step. ). (PH and PPH cases.) Compute the syndrome dfference sd (s h ) for n k n and w(sd ). If 0 w(sd ), then the corrected nformaton vector s m (r n-k,, r n- ) + u -(n-k), and go to step. 4). (PHH case) Compute the syndrome dfference sd 4 (s (n-k) h ) for n k n and w(sd 4 ). If w(sd 4 ), then the corrected nformaton vector s m (r n-k,, r n- ) + (sd 4 & ()), and go to step. ). Stop. For ths code, there are 9 error cases. able 4 lsts all the 9 error cases and the number of error patterns n each decodng steps. able 4. he number of error patterns n each decodng step of C Number of error patterns Steps Cases C 0 P ( ) 0 ( ) PP 0 4 ( ) PPP 0 0 H ( ) HH ( ) 0 ( ) HHH 0 PH ( )( ) ( )( ) PPH 0 ( )( ) PHH 0 0 PH ( )( ) ( )( ) 0 PPH ( )( ) ( )( ) 0 4 PHH ( )( ) ( )( ) 7 0 he decodng steps are shown below. ). Compute s (00000) and w(s). Snce w(s) >, go to step. ). Compute s () (00) and w(s () ) 8. Snce w(s () ) >, go to step. ). Compute sd (s h ) for 0 4 and w(sd ). sd (s h ) (00000) (0000) (00000). w(sd ). sd (s h ) (00000) (000) (0000). w(sd ) 6. sd (s h ) (00000) (000) (000000). w(sd ) 4. sd (s h 4 ) (00000) (0000) (00000). w(sd ). sd (s h ) (00000) (0000) (000). w(sd ) 7. Snce every w(sd ) >, go to step 4. 4). Compute sd 4 (s () h ) for 0 4 and w(sd 4 ). sd 4 (s () h ) (00) (0000) ( ). w(sd 4 ). Snce w(sd 4 ), the corrected nformaton word m (r 0,, r 4 ) + (sd 4 & ()) (0) + (( ) & ()) (000). Go to stop.

6 Automatc Control and Informaton Scences. Smulaton Results he proposed ESWDA has been programmed n C++ language. On an Intel Q6600 PC wth XP operatng system, all k n codewords wth all ( ) error patterns were created to check every possble error pattern of C, C, and C, respectvely. In other words, the error, patterns of C, C, and C are ( ) 7 ( ) 047, and ( ) 499, respectvely. he decodng tmes of the proposed ESWDA and the SWDA are shown n the able, able 6, and able 7, respectvely. For v, t means that one error of that code nput to the decoder, and for the average decodng tme, t means that all the error patterns of that code nput to the decoder. In these three tables, the average decodng tme of the proposed ESWDA s about 0.6 tmes, 9.6 tmes, and 4 tmes faster than the SWDA, respectvely. he memory requrements of the two algorthms are also shown n able, able 6, and able 7, respectvely. It s obvous that the proposed ESWDA sgnfcantly reduces decodng tme wth the ncrease of the code length. able. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the Golay code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA able 6. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the (, 6, 7) QR code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA able 7. Comparson of the decodng tme (n µs) and memory requrement (n bytes) for the (,, 7) BCH code between two algorthms Algorthms Number of errors v v v Average Memory sze ESWDA SWDA Conclusons Bnary QR codes are well known for ther good features. A hgh-speed and effcent ESWDA s developed to decode C, C, and C. he proposed ESWDA nether stores large lookup table n the memory nor computes complcated algebrac computatons. By usng heorem, heorem 4, heorem, and the weght of sd w, the error cases can be quckly dentfed and corrected. herefore, the proposed ESWDA s a very effcent and low-cost decoder for decodng the trple-error-correctng QR codes. he proposed ESWDA can be extended to decode other QR codes or BCH codes; however, the decodng steps of the proposed ESWDA need to make some slght adjustments. References [] Chen, R.., Cyclc decodng procedure for the Bose-Chaudhur- Hocquenghem codes, IEEE rans. Inform. heory, 0(4) Oct [] Chen, Y.H., Chen, C.H., Huang, C.H., ruong,.k., and Jng, M.H., Effcent decodng of systematc (,, 7) and (4,, 9) quadratc resdue codes, J. Inform. Sc. and Eng., 6() Sept. 00. [] Ela, M., Algebrac decodng of the (,, 7) Golay codes, IEEE rans. Inform. heory, (). 0-. Jan [4] Golay, M.J.E., Notes on dgtal codng, Proc. IRE, 7, [] Lee, C.D., Weak general error locator polynomals for trpleerror-correctng bnary Golay code, IEEE Comm. Letters, (8) Aug. 0. [6] Ln,.C., Chang, H.C., Lee, H.P., Chu, S.I, and ruong,.k., Decodng of the (, 6, 7) quadratc resdue code, J. Chnese Insttute of Engneers, (4) June 00. [7] Ln,.C., Chang, H.C., Lee, H.P., and ruong,.k., On the decodng of the (4,, 8) Golay code, Inform. Sc., 80() Dec. 00. [8] Ln,.C., Lee, H.P., Chang, H.C., Chu, S.I, and ruong,.k., Hgh speed decodng of the bnary (47, 4, ) quadratc resdue code, Inform. Sc., 80(0) Oct. 00. [9] Ln,.C., Lee, H.P., Chang, H.C., and ruong,.k., A cyclc weght algorthm of decodng the (47, 4, ) quadratc resdue code, Inform. Sc., Aug. 0. [0] Reed, I.S., Shh, M.., and ruong,.k., VLSI desgn of nverse-free Berlekamp-Massey algorthm, IEE Proc. Comput. Dgt. ech., 8() Sept. 99. [] Reed, I.S., Yn, X., and ruong,.k., Algebrac decodng of the (, 6, 8) quadratc resdue code, IEEE rans. Inform. heory, 6 (4) July 990. [] Reed, I.S., Yn, X., ruong,.k., and Holmes, J.K., Decodng the (4,, 8) Golay code, IEE Proc. Comput. Dgt. ech., 7() May 990. [] Wcker, S.B. Error control systems for dgtal communcaton and storage, Prentce Hall, New Jersey, 99.

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Wreless Informaton Transmsson System Lab Chapter 6 BCH Codes Insttute of Communcatons Engneerng Natonal Sun Yat-sen Unversty Outlne Bnary Prmtve BCH Codes Decodng of the BCH Codes Implementaton of Galos

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q. Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period -Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

From the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm

From the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm 1 / 32 From the Eucldean Algorthm for Solvng a Key Equaton for Dual Reed Solomon Codes to the Berlekamp-Massey Algorthm Mara Bras-Amorós, Mchael E O Sullvan The Claude Shannon Insttute Workshop on Codng

More information

SISO Algorithms for the Nordstrom-Robinson code

SISO Algorithms for the Nordstrom-Robinson code SISO Algorthms for the Nordstrom-Robnson code Yannck Saouter, LABSTICC, Brest, France. Insttut Mnes-Télécom 04, August 8th ISTC 04, Bremen, Germany. An hstorcal note Robnson noted, for bnary codes of length

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Section 3.6 Complex Zeros

Section 3.6 Complex Zeros 04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

MDS Array Codes for Correcting a Single Criss-Cross Error

MDS Array Codes for Correcting a Single Criss-Cross Error 1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Cyclic Codes BCH Codes

Cyclic Codes BCH Codes Cycc Codes BCH Codes Gaos Feds GF m A Gaos fed of m eements can be obtaned usng the symbos 0,, á, and the eements beng 0,, á, á, á 3 m,... so that fed F* s cosed under mutpcaton wth m eements. The operator

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Complex Numbers. x = B B 2 4AC 2A. or x = x = 2 ± 4 4 (1) (5) 2 (1)

Complex Numbers. x = B B 2 4AC 2A. or x = x = 2 ± 4 4 (1) (5) 2 (1) Complex Numbers If you have not yet encountered complex numbers, you wll soon do so n the process of solvng quadratc equatons. The general quadratc equaton Ax + Bx + C 0 has solutons x B + B 4AC A For

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

IRREDUCIBLE POLYNOMIALS OF MAXIMUM WEIGHT OMRAN AHMADI AND ALFRED MENEZES

IRREDUCIBLE POLYNOMIALS OF MAXIMUM WEIGHT OMRAN AHMADI AND ALFRED MENEZES IRREDUCIBLE POLYNOMIALS OF MAXIMUM WEIGHT OMRAN AHMADI AND ALFRED MENEZES Abstract. We establsh some necessary condtons for the exstence of rreducble polynomals of degree n and weght n over F 2. Such polynomals

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Linear Complexity and Correlation of some Cyclotomic Sequences

Linear Complexity and Correlation of some Cyclotomic Sequences Lnear Complexty and Correlaton of some Cyclotomc Sequences Young-Joon Km The Graduate School Yonse Unversty Department of Electrcal and Electronc Engneerng Lnear Complexty and Correlaton of some Cyclotomc

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Department of Mathematical Sciences, Clemson University. Some recent developments in permutation decoding

Department of Mathematical Sciences, Clemson University. Some recent developments in permutation decoding Department of Mathematcal Scences, Clemson Unversty http://www.ces.clemson.edu/ keyj/ Some recent developments n permutaton decodng J. D. Key keyj@ces.clemson.edu 1/32 P Abstract The method of permutaton

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

On the average number of divisors of the sum of digits of squares

On the average number of divisors of the sum of digits of squares Notes on Number heory and Dscrete Mathematcs Prnt ISSN 30 532, Onlne ISSN 2367 8275 Vol. 24, 208, No. 2, 40 46 DOI: 0.7546/nntdm.208.24.2.40-46 On the average number of dvsors of the sum of dgts of squares

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Quasi-Cyclic LDPC Codes on Latin Squares and the Ranks of their Parity-Check Matrices

Quasi-Cyclic LDPC Codes on Latin Squares and the Ranks of their Parity-Check Matrices uas-cyclc LDPC Codes on Latn quares the Rans of ther Party-Chec Matrces L Zhang, n Huang, hu Ln, K Abdel-Ghaffar Department of Electrcal Computer Eng nversty of Calforna Davs, CA 95616, A Emal: lszhang,qnhuang,shuln,ghaffar

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

6268 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 11, NOVEMBER 2016

6268 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 11, NOVEMBER 2016 6268 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 62, NO. 11, NOVEMBER 2016 Bnary Lnear Locally Reparable Codes Pengfe Huang, Student Member, IEEE, Etan Yaaob, Member, IEEE, Hronor Uchawa, Member, IEEE,

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

A Comparison between Weight Spectrum of Different Convolutional Code Types

A Comparison between Weight Spectrum of Different Convolutional Code Types A Comparson between Weght Spectrum of fferent Convolutonal Code Types Baltă Hora, Kovac Mara Abstract: In ths paper we present the non-recursve systematc, recursve systematc and non-recursve non-systematc

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

THE HARTLEY TRANSFORM IN A FINITE FIELD

THE HARTLEY TRANSFORM IN A FINITE FIELD THE HARTLEY TRANSFORM IN A FINITE FIELD R. M. Campello de Souza H. M. de Olvera A. N. Kauffman CODEC - Grupo de Pesusas em Comuncações Departamento de Eletrônca e Sstemas - CTG - UFPE C.P. 78 57-97 Recfe

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS The 3 rd Internatonal Conference on Mathematcs and Statstcs (ICoMS-3) Insttut Pertanan Bogor, Indonesa, 5-6 August 28 MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS 1 Deky Adzkya and 2 Subono

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

On the Stopping Distance and the Stopping Redundancy of Codes

On the Stopping Distance and the Stopping Redundancy of Codes On the Stoppng Dstance and the Stoppng Redundancy of Codes Moshe Schwartz Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. moosh@everest.ucsd.edu Abstract It s now well known that the performance

More information

Société de Calcul Mathématique SA

Société de Calcul Mathématique SA Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc

More information

Contents 1 Basics of Convolutional Coding.

Contents 1 Basics of Convolutional Coding. Contents 1 Bascs of Convolutonal Codng 1 Φ 11 Relatng G 1 wth the mpulse responses g j 1 ;j 12 TransformAnalyssn ConvolutonalCodes context 4 13 Constructng a convolutonal encoder structure from the generator

More information

Unit 5: Quadratic Equations & Functions

Unit 5: Quadratic Equations & Functions Date Perod Unt 5: Quadratc Equatons & Functons DAY TOPIC 1 Modelng Data wth Quadratc Functons Factorng Quadratc Epressons 3 Solvng Quadratc Equatons 4 Comple Numbers Smplfcaton, Addton/Subtracton & Multplcaton

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Digital Signal Processing

Digital Signal Processing Dgtal Sgnal Processng Dscrete-tme System Analyss Manar Mohasen Offce: F8 Emal: manar.subh@ut.ac.r School of IT Engneerng Revew of Precedent Class Contnuous Sgnal The value of the sgnal s avalable over

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through   ISSN Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information