Coding over an Erasure Channel with a Large Alphabet Size

Size: px
Start display at page:

Download "Coding over an Erasure Channel with a Large Alphabet Size"

Transcription

1 1 Codng over an Erasure Channel wth a Large Alphabet Sze Shervan Fashand, Shahab Oves Gharan and Amr K. Khandan ECE Dept., Unversty of Waterloo, Waterloo, O, Canada, 2L3G1 emal: sfashand,shahab,khandan}@cst.uwaterloo.ca Abstract An erasure channel wth a fxed alphabet sze, where 1, s studed. It s proved that over any erasure channel wth or wthout memory, Maxmum Dstance Separable codes acheve the mnmum probablty of error assumng maxmum lkelhood decodng. Assumng a memoryless erasure channel, the error exponent of codes are compared wth that of random codes. It s shown that the envelopes of these two exponents are dentcal for rates above the crtcal rate. otng the optmalty of codes, t s concluded that random codng s exponentally optmal as long as the block sze satsfes < I. ITRODUCTIO Erasure channels wth large alphabet szes have recently receved sgnfcant attenton n networkng applcatons. Dfferent erasure channel models are adopted to study the performance of end-to-end connectons over the Internet [1], [2]. In such models, each packet s seen as a 2 b -ary symbol where b s the packet length n bts. In ths work, a memoryless erasure channel wth a fxed but large alphabet sze s consdered. The error probablty over ths channel assumng maxmumlkelhood decodng for and random codebooks are compared and shown to be exponentally dentcal for rates above the crtcal rate. Shannon [3] was the frst who observed that the error probablty for maxmum lkelhood decodng of a random code rand can be upper-bounded by an exponentally decayng functon wth respect to the code block length. Ths exponent s postve as long as the rate stays below the channel capacty R < C. Followng ths result, tghter bounds were proposed n the lterature [4], [5]. Interestngly, ths upper-bound on rand remans vald regardless of the alphabet sze, even n the case where s larger than the block sze e.g. see the steps of the proofs n [6]. There s also a lower-bound on the probablty of error usng random codng whch s known as the sphere packng bound [7]. For channels wth a relatvely small alphabet sze, both the sphere packng bound and the random codng upper-bound on the error probablty are exponentally tght for rates above the crtcal rate. However, the sphere packng bound s not tght f the alphabet sze,, s comparable to the codng block length. For rates below the crtcal rate, modfcatons of random codng are proposed to acheve tghter bounds [8]. 1 Fnancal support provded by ortel and the correspondng matchng funds by the atural Scences and Engneerng Research Councl of Canada SERC, and Ontaro Centres of Excellence OCE are gratefully acknowledged. Maxmum Dstance Separable [9] codes are optmum n the sense that they acheve the largest possble mnmum dstance, d mn, among all block codes of the same sze. Indeed, any [, K] code can be successfully decoded from any subset of ts coded symbols of sze K or more. Ths property makes codes sutable for use over the erasure channels lke the Internet [1], [2], [10]. However, the practcal encodng-decodng algorthms for such codes have uadratc tme complexty n terms of the code block length [11]. Theoretcally, more effcent O log 2 codes can be constructed based on evaluatng and nterpolatng polynomals over specally chosen fnte felds usng Dscrete Fourer Transform [12]. However, n practce these methods can not compete wth the uadratc methods except for extremely large block szes. Recently, a famly of almost- codes wth low encodng-decodng complexty lnear n length s proposed and shown to provde a practcal alternatve for codng over the erasure channels lke the Internet [13]. In these codes, any subset of symbols of sze K1 + ɛ s suffcent to recover the orgnal K symbols wth hgh probablty [13]. Dgtal Fountan codes, based on the dea of almost- codes, are proposed for nformaton multcastng to many users over an erasure channel [14], [15]. In ths work, a memoryless erasure channel wth a fxed but large alphabet sze s studed. Frst, t s proved that block codes offer the mnmum probablty of decodng error over any erasure channel. Then, error exponents of and random codes for a memoryless erasure channel are analyzed and shown to be dentcal at rates above the crtcal rate. Combnng the two results, we conclude that random codes are exponentally as good as codes exponentally optmal over a wde range of rates. The rest of ths paper s organzed as follows. In secton II, the erasure channel model s ntroduced, and the assumpton of large alphabet szes s justfed. Secton III proves that codes are optmum over any erasure channel. Error exponents of codes and random codes over a memoryless erasure channel are compared n secton IV. Fnally, secton V concludes the paper. II. ERASURE CHAEL MODEL The memoryless erasure channel studed n ths work has the alphabet sze and the erasure probablty π see Fg. 1. The alphabet sze s assumed to be fxed and large,.e., 1. ote that all the known codes have alphabets of

2 2 Fg. 1. Erasure memoryless channel model wth the alphabet sze, probablty of erasure π, and the erasure symbol ξ. a large sze growng at least lnearly wth the block length. Indeed, a conjecture on codes states that for every lnear [, K] code over the Galos feld F, f 1 < K <, then + 1, except when s even and K 3 or K 1, for whch + 2 [16]. To have a feasble code over a channel wth the alphabet sze, the block sze should satsfy + 1. Thus, throughout ths paper, wherever we refer to large block szes, t means can grow large as long as t satsfes the constrant + 1. The descrbed channel model occurs n many practcal scenaros such as the Internet. From an end to end protocol s perspectve, performance of the lower layers n the protocol stack can be modeled as a random channel called an Internet channel. Snce each packet usually ncludes an nternal error detecton mechansm for nstance a Cyclc Redundancy Check, the Internet channel can be modeled as an erasure channel wth packets as symbols [17]. If each packet contans b bts, the correspondng channel wll have an alphabet sze of 2 b whch s huge for typcal packet szes. Therefore, n practcal networkng applcatons, the block sze s usually much smaller than the alphabet sze. Algebrac computatons over Galos felds F of such large cardnaltes s now practcally feasble wth the ncreasng processng power of electronc crcuts. ote that network codng schemes, recently proposed and appled for content dstrbuton over large networks, have a comparable computatonal complexty [18] [20]. III. OPTIMALITY OF CODES OVER ERASURE CHAELS Maxmum Dstance Separable codes are optmum n the sense of achevng the largest possble mnmum dstance, d mn, among all block codes of the same sze [9]. The followng proposton shows that codes are also optmum over any erasure channel n the sense of achevng the mnmum probablty of decodng error. Proposton I. Consder an erasure channel memoryless or wth memory wth the nput vector x X, X, the output vector y X ξ}, and the transton probablty p y x satsfyng: 1 p y j / x j, ξ} x j 0, j. 2 Defnng the erasure dentfer vector e as 1 yj ξ e j 0 otherwse pe x s ndependent of x. Consder a block code of sze [, K] wth euprobable codewords over an erasure channel and an optmum maxmum lkelhood decoder. The code has the mnmum probablty of decodng error among all the [, K] block codes f t s Maxmum Dstance Separable. Proof. Consder a [, K, d] codebook C wth the -ary codewords of length, number of code-words K, and mnmum dstance d. The dstance between two codewords s defned as the number of postons n whch the correspondng symbols are dfferent Hammng dstance. A codeword x C s transmtted and a vector y X ξ} s receved. The number of erased symbols s eual to the Hammng weght of e denoted by we. An error occurs f the decoder decdes for a codeword dfferent from x. Let us assume that the probablty of havng a specfc erasure pattern e s Pe} whch s ndependent of the transmtted codeword depends only on the channel. We assume a specfc erasure vector e of weght m. The decoder decodes the transmtted codeword based on the m correctly receved symbols. We partton the code-book, C, nto m bns, each bn representng a specfc receved vector satsfyng the erasure pattern e. The number of codewords n the th bn s denoted by b e for 1,..., m. Knowng the erasure vector e and the receved vector y, the decoder selects the bn correspondng to y. The set of possble transmtted codewords s eual to the set of codewords n bn all the codewords n bn are euprobable to be transmtted. If b e 1, the transmtted codeword x can be decoded wth no ambguty. Otherwse, the optmum decoder randomly selects one of the b e > 1 codewords n the bn. Thus, the probablty of error s 1 1 b e when bn s selected. Bn s selected f one of the codewords t contans s transmtted. Hence, probablty of selectng bn s eual to be. Based on the above arguments, probablty K of decodng error for the maxmum lkelhood decoder of any codebook,c, s eual to C a b e:wem e:wem e:wem e:wem Pe}Perror e} Pe} Pe} Pe} m, b e>0 1 b+ e K 1 m K 1 1 be b e K where b + e ndcates the number of bns contanng one or more codewords. a follows from the fact that the transmtted 1

3 3 codeword can be unuely decoded f the number of erasures n the channel s less than the mnmum dstance of the codebook and b follows from the fact that m b e K. Accordng to 1, C s mnmzed for a code-book C f two condtons are satsfed. Frst, the mnmum dstance of C should acheve the maxmum possble value,.e., d K + 1. Second, we should have b + e m for all possble erasure vectors e wth any weght d m. Any code satsfes the frst condton by defnton. Moreover, t s easy to show that for any code, we have b e K +m. We frst prove ths for the case of m K. Consder the bns of an code for any arbtrary erasure pattern e, we K. From the fact that d K + 1 and K b e K, t s concluded that each bn contans exactly one codeword. Therefore, there exsts only one codeword whch matches any K correctly receved symbols. ow, consder any general erasure pattern e, we m > K. For the th bn, concatenatng any K +m arbtrary symbols to the m correctly receved symbols results n a dstnct codeword of the codebook. Havng K +m possbltes to expand the receved m symbols to K symbols, we have b e K +m. Ths completes the proof. A. codes wth Suboptmal Decodng In the proof of proposton I, t s assumed that the receved codewords are decoded based on maxmum lkelhood decodng whch s optmum n ths case. However, n many practcal cases, codes are decoded by smpler decoders [21]. Such suboptmal decoders can perfectly reconstruct the codewords of a [, K] codebook f they receve K or more symbols correctly. In case more than K symbols are erased, a decodng error occurs. Let P denote the probablty of ths event. P s obvously dfferent from the decodng error probablty of the maxmum lkelhood decoder denoted by. Theoretcally, an optmum maxmum lkelhood decoder of an code may stll decode the orgnal codeword correctly wth a postve, but small probablty, f t receves less than K symbols. More precsely, accordng to the proof of Proposton I, such a decoder s able to correctly decode an code over F wth the probablty of 1 after recevng K correct symbols. Of course, for Galos felds wth large cardnalty, ths probablty s usually neglgble. The relatonshp between P and can be summarzed as follows E,ML Hence, E,ML K 1 1 PK symbols receved correctly} K PK symbols receved correctly}. 2 s bounded as 1 1 E,ML. 3 IV. ERROR EXPOETS OF AD RADOM CODES A. Error Exponent of Codes over a Memoryless Erasure Channel Consder a block code of sze [, K] over the memoryless erasure channel of Fg. 1. Let α K defne the codng overhead. For a -ary [, K] code, the rate per symbol, R, s eual to R K log 1 α log. 4 In a block code of length, the number of lost symbols would be e where e s defned n Proposton I. Thus, the probablty of decodng error for the suboptmal decoder of subsecton III-A can be wrtten as } P 1 K 1 P e > α P 5 where P denotes the probablty that packets are receved correctly. Snce e s are..d random varables wth Bernoull dstrbuton, we have P 1 π π. It s easy to see that 0 P + 11 π > 1 for 1,, K 1 P 1 π f α K > π. Accordng to euaton 4, the condton α > π can be rewrtten as R < 1 π log C where C s the capacty of the memoryless erasure channel. Therefore, the summaton terms n euaton 5 are always ncreasng, and the largest term s the last one. ow, we can bound P as P K 1 P KP K 1. The term K 1 n PK 1 can be bounded usng the fact that for any > K > 0, we have [22] eh K e H K K where the entropy, H K, s computed n nats. Thus, P s bounded as π1 αe uα 1 π + 1α + 1 P π1 α2 2 e uα 1 πα where uα s defned as 0 for α π α1 π uα α log π1 α 1 π log 1 α for π < α 1. wth the log functons computed n the eperan base. Usng euaton 4, the codng error exponent, u., can be expressed n terms of R nstead of α. In 4, K should be an nteger, and we should have + 1 for a feasble code. Thus, the fnest resoluton of rates achevable by a sngle codebook would be R +1 log for 1, 2,...,. Of course, t s also possble to acheve the rates +1 n the ntervals +1 log < R < +1 log by tme sharng between two codebooks of szes [+1, ] and [+1, +1]. However, n such cases, the smaller error exponent belongng 7

4 4 to the codebook of the sze [ +1, +1] domnates. Therefore, ur wll have a stepwse shape of the form 0 for 1 π r ur 1 π 1 r r log 8 rπ π log for 0 < r 1 π 1 r where r s defned as r 1 + 1R log B. Random Codng Error Exponent of a Memoryless Erasure Channel It s nterestng to compare the error exponent n 8 wth the random codng error exponent as descrbed n [6]. Ths exponent, E r R, can be wrtten as E r R max 0 ρ 1 ρr + max Q E 0ρ, Q where Q s the nput dstrbuton, and E 0 ρ, Q euals 1 1+ρ 1 E 0 ρ, Q log QkP j k 1 + ρ. j0 k0 } Due to the symmetry of the channel transton probabltes, the unform dstrbuton maxmzes 10 over all possble nput dstrbutons. Therefore, E 0 ρ, Q can be smplfed as 1 π E 0 ρ, Q log + π. 12 Solvng the maxmzaton 10, gves us E r R as log 1 π + π r log E r R R ρ for 0 r 1 π 1 r r log log rπ for 1 π R c log π 1 r R c log r 1 π 13 where r log, and R c 1 π+π log are the normalzed and the crtcal rates, respectvely. Comparng 8 and 13, we observe that the codes and the random codes perform exponentally the same for rates between the crtcal rate and the capacty. However, for the regon below the crtcal rate, where the error exponent of the random code decays lnearly wth R, codes acheve a larger error exponent. It s worth notng that ths nterval s neglgble for large alphabet szes. Moreover, the stepwse graph of ur meets ts envelope as the steps are very small for large values of. Fgure 2 depcts the error exponents of random codes and codes for the alphabet szes of 128 and 1024 over an erasure channel wth π As observed n Fg. 2a, ur can be approxmated by ts envelope very a b Fg. 2. Error exponents of random codng E rr and codng ur for a memoryless erasure channel wth π 0.015, and a: 128, b: closely even for a relatvely small alphabet sze 128. For a larger alphabet sze Fg. 2b, the graph of ur almost concdes ts envelope whch euals E r R for the regon above the crtcal rate. Moreover, as observed n Fg. 2b, the regon where codes outperform random codes becomes very small even for moderate values of alphabet sze C. Exponental Optmalty of Random Codng Usng the sphere packng bound, t s shown that random codng s exponentally optmal for the rates above the crtcal rate over channels wth relatvely small alphabet szes [7]. However, the sphere packng bound s not tght for the channels whose alphabet sze,, s comparable to the block length. Here, based on Proposton I and the results of secton IV, we prove the exponental optmalty of random codng for erasure channels satsfyng + 1 >. Decodng error probablty for a random codebook wth the maxmum-lkelhood decodng can be upper bounded as rand a ErR b e e ur 14

5 5 where a follows from [6], and b s vald only for rates above the crtcal rate accordng to 8 and 13. We can also lower bound P rand E,ML as rand a b 1 1 P c 1 1 πre ur 1 π r where a follows from Proposton I, b from neualty 3, and c from neualty 6. Combnng 14 and 15 guarantees that both the upperbound and the lower-bound on P rand E,ML and the decayng exponent of rand Moreover, we can wrte a rand b are exponentally tght, versus s ndeed ur. 1 π + 1 r πr E,ML 16 where a follows from Proposton I, and b results from neualtes 14 and 15. Snce the coeffcent of n neualty 16 does not nclude any exponental terms, t can be concluded that for rates above the crtcal rate, random codes perform exponentally the same as codes, whch are already shown to be optmum. V. COCLUSIO Performance of random codes and codes over an erasure channel wth a fxed but large alphabet sze s analyzed. It s shown that codes mnmze the probablty of decodng error usng maxmum-lkelhood decodng, and any erasure channel wth or wthout memory. Then, the decodng error probablty of and random codes are bounded by exponental terms, and the correspondng exponents are compared. It s observed that the error exponents are dentcal over a wde range of rates. Knowng codes are optmum, t s concluded that random codng s exponentally optmal over a memoryless erasure channel as long as the code block length,, does not exceed the alphabet sze of the channel by more than one. [8] G. Forney, Exponental Error Bounds for Erasure, Lst, and Decson Feedback Schemes, IEEE Transactons on Informaton Theory, vol. 14, no. 2, pp , [9] Ron M. Roth, Introducton to Codng Theory, 1st ed. Cambrdge Unversty Press, 2006, pp [10] X. H. Peng, Erasure-control Codng for Dstrbuted etworks, IEE Proceedngs on Communcatons, vol. 152, pp , [11]. Alon, J. Edmonds, and M. Luby, Lnear Tme Erasure Codes wth early Optmal Recovery, n IEEE Symposum on Foundatons of Computer Scence, Proc. IEEE Vol. 3, 1995, pp [12] J. Justesen, On the complexty of decodng Reed-Solomon codes, IEEE transactons on nformaton theory, vol. 22, no. 2, pp , [13] M. G. Luby, M. Mtzenmacher, M. A. Shokrollah, and D. A. Spelman, Effcent Erasure Correctng Codes, IEEE Transactons on Informaton Theory, vol. 47, no. 2, pp , [14] M. G. Luby, LT Codes, n IEEE Symposum on the Foundatons of Computer Scence FOCS, 2002, pp [15] A. Shokrollah, Raptor Codes, IEEE Transactons on Informaton Theory, vol. 52, no. 6, pp , [16] J. L. Walker, A ew Approach to the Man Conjecture on Algebracgeometrc Codes, Journal of Desgns, Codes and Cryptography, vol. 9, no. 1, pp , [17] S. Fashand, S. Ovesgharan, and A.K. Khandan, Path Dversty n Packet Swtched etworks: Performance Analyss and Rate Allocaton, n IEEE Global Telecommuncatons Conference, GLOBECOM 07, 2007, pp [18] R. Koetter and M. Medard, An algebrac approach to network codng, IEEE transactons on etworkng, vol. 11, no. 5, pp , [19] P. A. Chou, Y. Wu, and K. Jan, Practcal etwork Codng, n 51st Allerton Conference on Communcaton, Control and Computng, [20] C. Gkantsds and P. R. Rodrguez, etwork codng for large scale content dstrbuton, n IEEE IFOCOM, Proc. IEEE Vol. 4, 2005, pp [21] Ron M. Roth, Introducton to Codng Theory, 1st ed. Cambrdge Unversty Press, 2006, pp [22] T. Cover and J. Thomas, Elements of Informaton Theory, 1st ed. ew York: Wley, 2006, pp REFERECES [1] W. T. Tan and A. Zakhor, Vdeo Multcast Usng Layered FEC and Scalable Compresson, IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol. 11, no. 3, pp , [2] L. Darane, L. Lancrca, J. Lacan, and J. Fmes, Content-Access QoS n Peer-to-Peer etworks Usng a Fast Erasure Code, Elsever Computer Communcatons, vol. 28, no. 15, pp , [3] C. E. Shannon, A Mathematcal Theory of Communcatons, Bell Systems Techncal Journal, vol. 27, pp , , [4] P. Elas, Codng for osy Channels, IRE Conventon Record, vol. 4, pp , [5] C. E. Shannon, R. G. Gallager, and E. R. Berlekamp, Lower bounds to Error Probablty for Codng on Dscrete Memoryless Channels, Informaton and Control, vol. 10, pp , , [6] R. G. Gallager, Informaton Theory and Relable Communcaton, 1st ed. ew York, Y, USA: John Wley & Sons, 1968, pp [7], Informaton Theory and Relable Communcaton, 1st ed. ew York, Y, USA: John Wley & Sons, 1968, pp

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Arbitrary Alphabet Size

Arbitrary Alphabet Size Optimal Coding for the Erasure Channel with Arbitrary Alphabet Size Shervan Fashandi, Shahab Oveis Gharan and Amir K. Khandani ECE Dept., University of Waterloo, Waterloo, O, Canada, 2L3G email: {sfashand,shahab,khandani}@cst.uwaterloo.ca

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Introduction to information theory and data compression

Introduction to information theory and data compression Introducton to nformaton theory and data compresson Adel Magra, Emma Gouné, Irène Woo March 8, 207 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on March 9th 207 for a Data Structures

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Quantum and Classical Information Theory with Disentropy

Quantum and Classical Information Theory with Disentropy Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan. THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Natural Language Processing and Information Retrieval

Natural Language Processing and Information Retrieval Natural Language Processng and Informaton Retreval Support Vector Machnes Alessandro Moschtt Department of nformaton and communcaton technology Unversty of Trento Emal: moschtt@ds.untn.t Summary Support

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Convergence of random processes

Convergence of random processes DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

A Comparison between Weight Spectrum of Different Convolutional Code Types

A Comparison between Weight Spectrum of Different Convolutional Code Types A Comparson between Weght Spectrum of fferent Convolutonal Code Types Baltă Hora, Kovac Mara Abstract: In ths paper we present the non-recursve systematc, recursve systematc and non-recursve non-systematc

More information

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

P R. Lecture 4. Theory and Applications of Pattern Recognition. Dept. of Electrical and Computer Engineering /

P R. Lecture 4. Theory and Applications of Pattern Recognition. Dept. of Electrical and Computer Engineering / Theory and Applcatons of Pattern Recognton 003, Rob Polkar, Rowan Unversty, Glassboro, NJ Lecture 4 Bayes Classfcaton Rule Dept. of Electrcal and Computer Engneerng 0909.40.0 / 0909.504.04 Theory & Applcatons

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

MAXIMUM A POSTERIORI TRANSDUCTION

MAXIMUM A POSTERIORI TRANSDUCTION MAXIMUM A POSTERIORI TRANSDUCTION LI-WEI WANG, JU-FU FENG School of Mathematcal Scences, Peng Unversty, Bejng, 0087, Chna Center for Informaton Scences, Peng Unversty, Bejng, 0087, Chna E-MIAL: {wanglw,

More information

Lecture 17 : Stochastic Processes II

Lecture 17 : Stochastic Processes II : Stochastc Processes II 1 Contnuous-tme stochastc process So far we have studed dscrete-tme stochastc processes. We studed the concept of Makov chans and martngales, tme seres analyss, and regresson analyss

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights ACTA ET COMMENTATIONES UNIVERSITATIS TARTUENSIS DE MATHEMATICA Volume 7, Number 2, December 203 Avalable onlne at http://acutm.math.ut.ee A note on almost sure behavor of randomly weghted sums of φ-mxng

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Communication Complexity 16:198: February Lecture 4. x ij y ij

Communication Complexity 16:198: February Lecture 4. x ij y ij Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD he Gaussan classfer Nuno Vasconcelos ECE Department, UCSD Bayesan decson theory recall that we have state of the world X observatons g decson functon L[g,y] loss of predctng y wth g Bayes decson rule s

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

On the Correlation between Boolean Functions of Sequences of Random Variables

On the Correlation between Boolean Functions of Sequences of Random Variables On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder. PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders)

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders) Entropy of Marov Informaton Sources and Capacty of Dscrete Input Constraned Channels (from Immn, Codng Technques for Dgtal Recorders). Entropy of Marov Chans We have already ntroduced the noton of entropy

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback Bounds on the Effectve-length of Optmal Codes for Interference Channel wth Feedback Mohsen Hedar EECS Department Unversty of Mchgan Ann Arbor,USA Emal: mohsenhd@umch.edu Farhad Shran ECE Department New

More information

Week 5: Neural Networks

Week 5: Neural Networks Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Channel optimization for binary hypothesis testing

Channel optimization for binary hypothesis testing Channel optmzaton for bnary hypothess testng Gancarlo Baldan Munther Dahleh MIT, Laboratory for Informaton and Decson systems, Cambrdge 039 USA emal: gbaldan@mt.edu) MIT, Laboratory for Informaton and

More information