Sardinas-Patterson like algorithms in coding theory

Size: px
Start display at page:

Download "Sardinas-Patterson like algorithms in coding theory"

Transcription

1 A.I.Cuza University of Iaşi Facuty of Computer Science Sardinas-Patterson ike agorithms in coding theory Author, Bogdan Paşaniuc Supervisor, Prof. dr. Ferucio Laurenţiu Ţipea Iaşi, September 2003

2 Contents 1 Introduction 2 2 Variabe ength codes Definitions Basic characterization resuts Sardinas-Patterson characterization S-P Agorithm for cassica codes S-P Agorithm for z-codes S-P Agorithm for Time-Varying codes S-P Agorithm for SE-codes Concusions 37 Bibiography 38 1

3 Chapter 1 Introduction Nowadays, with the eponentia growth in the amount of data that the human society deas with, data managing becomes a very important probem. Despite of technoogic deveopment there have aways been a probem in transmitting and storing data. Athough there have been important progresses in the quaity of transmissions one can not say that a certain transmission coud happen without errors. The technoogy of data storage is deveoping quicky, but it fais to keep up with the necessities of today s society. The eponentiay increasing amount of data echanged between computers ed to a rapid deveopment in the technoogy of detecting and correcting errors that can occur in it s transmission. We need to encode data in such a manner that we coud detect as many errors that coud occur or, if we may think that we coud encode data in order to decrease it s size in order to reduce the time of the eposure of data to transmission errors. Usuay these two ideas are combined in order to have a faster and more reiabe transmission. The origins of coding theory are in the theory of information deveoped by Shannon in the 1950s. The are severa fieds in which this theory evoved. One is error-correcting codes which is an important appication of agebra. Another one is the theory of entropy that inks codes to probabiity theory. In this paper we present an important part from the theory of codes, the probem of deciding how and when can we use a given set to encode, decode data. The probem of detecting which sets can be used to encode is an important probem in the theory of codes. This probem is soved in the case of cassica 2

4 codes by the Sardinas-Patterson characterization theorem, resut that eads to en effective agorithm for deciding if a given set is a code or not. The aim of this paper is to present how the origina Sardinas-Patterson characterization theorem evoved from cassica codes to new types of codes ike z-codes, TV-codes and SE-codes. In the first part of this paper we present basic properties and definitions of codes. We present the Shutzenberger criterion for codes, the Sardinass- Patterson criterion for codes, and resuts on codes using probabiity distributions. In the second part we present agorithms that decide for a specified set if it is a code or not. We present here how the Sardinas-Patterson characterization theorem eaded to an effective agorithm that decides if a given set is a code or not. We continue by presenting a resut obtained in [2] resut that generaizes the Sardinas-Patterson characterization theorem to z-codes. This resut aso eads to an effective agorithm for z-codes, agorithm based on an upper bound on words that might have two distinct factorizations. Net we present resut for TV-codes, obtained in [9], and the agorithm corresponding to it. The net section is dedicated to Synchronized Etension codes. The resut presented here is a Sardinas-Patterson theorem ike, resut that unfortunatey does n ead to an effective agorithm for deciding the secode property for the entire cass of se-codes. There are subcasses for which this resut has a corresponding effective agorithm. 3

5 Chapter 2 Variabe ength codes In this chapter we define some basic notions on codes. We concentrate our efforts in presenting ony the main notations and ony the most important characterizations resuts that wi be used in the foowing chapters. This basic resuts on codes are presented here ony for giving an idea on codes, especiay on variabe ength codes. For more detais the reader is directed to [1] Some important characterizations resuts presented here are the Schutzenberg criterion for codes and the Sardinas-Patterson theorem for codes. 4

6 2.1 Definitions We sha ca aphabet a finite and nonempty set A. We sha ca the eements of A etters. For every sets A and B, A B denotes the incusion of A into B and A is the cardinaity of the set A; the empty set is denoted by φ. The set of natura numbers is denoted by N and by N we denote the set N \ {0}. Let A = (A i i 1) be a famiy of sets. We denote by A i the set j i A i A j and by A the set i 1 A i. A word w over the aphabet A is a finite sequence of etters: w = (a 1, a 2,...a n ), i a i A. A word w over the aphabet A can be seen as a mapping w : {1,, n} A, where n is a natura number caed the ength of the word. The ength of the word is aso denoted by w. The empty sequence is caed the empty word and it is denoted by λ. Aso we can define λ as the function λ : A. Evidenty the ength of λ is 0. Furthermore we denote the set of a words over an aphabet A as A. We denote A + as the set A \ λ. We define the operation concatenation (or product) : A + A + by: { w(i), if 1 i w (w v)(i) = v(i w ), if w + 1 i w + v This operation is associative and thus we can write w = a 1 a 2 a n instead of: w = (a 1, a 2,, a n ). The concatenation operation can be easiy etended to A if we consider λ as the neutra eement( w λ = λ w = w ). Then (A, ) is a free monoid generated by A. 5

7 Definition Let A be an aphabet(a finite and nonempty set). A code over the set A is a subset C A such that for any n, y 1 y 2...y m, two sequences over C( i C and y j C, i n, j m) if: it foows that: 1. n = m and 2. i = y i, i n. 1 2 n = y 1 y 2 y m In other words, a set C A is a code if it has the unique descifrabiity property; that is any word in C + can be written uniquey as a product of words from C (it has a unique factorization in words from C). It foows naturay that a code C never contains the empty word λ that is why we usuay say that C is a subset of A + = A \ λ. Eampe Let A = {a, b}. C = {a, ab, ba} is not a code over A. It is easy to see that aba has two distinct factorizations over C. aba = (ab)a = a(ba) thus we can concude that C is not a code. For two sets X, Y A we can define a new set XY in the foowing way: XY = {y X, y Y }. We define inductivey C n in the foowing way: C 0 = λ A ; C n+1 = C n C. Now we introduce the is a factor of reation on words. We say that a word w A is a factor of v if there eist, y A such that v = wy. This reation is a partia order on A. Furthermore we say that w is a eft factor of v (or w is a prefi of v) if w is a factor of v and = λ(v = wy). The factor w is caed proper if w v or 1 There are authors[5] that define a code ony as a subset of A. That impies that there eists codes without the unique descifrabiity property. 6

8 in other words y λ. This reation is eft factor is a partia order on A too. We wi write w pref v whenever w is a factor of v and w < v whenever w is a proper factor of v. In a symmetric manner we define is right factor (or is suffi of) and is proper right factor. Athough we sha present some different casses of codes in a foowing section we wi define now some important casses of codes. Definition Let A φ and C A + be a code. Then: 1. C is caed bock code if a words from C have the same ength; 2. C is caed prefi code if there are not two words from C such that one is prefi of the other; 3. C is caed suffi code if there are not two words from C such that one is suffi of the other; 4. C is caed biprefi code if C is in the same time prefi and suffi code; 5. C is caed binary code if the number of eements in A is 2. There are two main fieds in which codes are used: one is for detecting and correcting errors that appear during the transmission of data and the other is data compression. Bock codes are used especiay for detecting and correcting errors. If the transmission is noiseess, that is no errors can occur in the process, we may concentrate our efforts in encoding the data as efficienty as possibe. Thus we must define a method for comparing efficiency of codes. If we consider that at one time a etter can appear with a certain probabiity we obtain a probabiity distribution for an aphabet. In other words a probabiity distribution for A is a function π : A [0, 1] with the property that a Aπ(a) = 1. In this manner if we associate an aphabet with a probabiity distribution we obtain an information source. The coupe (A, π) where A is an aphabet and π is a probabiity distribution for A is caed information source, Usuay it is convenient to etend π at A in the foowing way: π(w) = { 1, if w = λ, Π n i=1π(a i ), if w = a 1 a 2...a n. 7

9 The probabiity of C A is made up by the sum of the probabiities of the words from C. If C = φ then π(c) = 0. We obtain a vaue(π(c)) between 0 and + for the set C, vaue reative to the probabiity distribution π. This vaue is caed the measure of C reative to π. 1 For eampe the probabiity distribution π(c) =, c C is caed Card(C) the uniform distribution. 8

10 2.2 Basic characterization resuts Given a set C over an aphabet A the main question that we try to answer is: Can we determine if C is a code or not? In this section we wi give some theoretica resuts on codes, resuts that wi answer this question. First of a we wi present two simpe resuts on codes. Proposition Let C A + be a code. Then n 1, C n is a code over A. Proof The proof is very simpe. If we consider two different factorizations for the same word over C n then we can rewrite every word in those two factorizations as a product of n words from C(it foows from the definition of C n ). In this manner we obtain two different factorizations over C. This is not possibe(c has the unique descifrabiity property ). Contradiction. We concude that C n is a code. The other resut aows us to view codes as injective morphisms from an aphabet Σ into A. Thus whenever we want to codify an aphabet (more generay a set of eements) over another aphabet we must consider an injective function. Conversey the injective morphisms h : Σ A are caed codifications of Σ in A because h(σ) is a code. Proposition Let A φ be an aphabet and C A + (C φ. C is a code if and ony if h : Σ A an injective morphism such that C = h(σ), with Σ a we chosen set. Proof The proof is very simpe and it can be found in [1] Theorem The Schutzenberger criterion for codes. Let C A +, where A is an aphabet. C is a code if and ony if: 1. C ( n 2 C n ) φ 2. ( w A + )(C w C φ and wc C φ w C ) Unfortunatey this criterion for determining if a given set is a code or not doesn t ead us to an effectivey appyabe agorithm. It is impossibe to determine C n and A + in an acceptabe time. We sha present net a resut that eads to an acceptabe agorithm for deciding if a given set is a code or not. This resut is aso known as the Sardinas-Patterson theorem for codes. 9

11 First of a we must define inductivey the famiy of sets C n, aso caed the sets of reminders, as: C 1 = { A + c C : c C} C i+1 = { A + c C : c C i } { A + c C i : c C} Theorem The Sardinas-Patterson criterion for codes. Let A be an aphabet and C A +. C is a code if and ony if C C i = φ, i 1. Instead of giving a forma proof 2 we wi epain how and why we must compute C i using an eampe. Let C be a subset of {0, 1} +. C = {010, 0001, 0110, 1100, 00011, 00110, 11110, }. We say that the word w = has two distinct factorizations over C. Let us find these two distinct factorizations. 1. We begin from eft to right and we try to find 2 different words from C that are prefi in w. We have found 1 = 0001 and y 1 = We notice that 1 pref y 1. In order to continue our computation we must remember 1 which is the remainder between 1 and y 1 (y 1 = 1 1). We add the word 1 to C 1. More generay in order to determine a computations that might ead to different factorizations we must add to C 1 a such that c is in C with c C. c 2. In order to continue our computation we wi repeat the foowing step: We suppose that we are at the step i. We make the foowing remark: the reminder r from C i is the ony difference between our two distinct factorizations that we are trying to construct, that is: 2 A compete proof can be found in [1] 10

12 1 2 r = y 1 y 2 y k or 1 2 = y 1 y 2 y k r or We continue our computation by: a) finding words in C that begin with the reminders from C i ; that is continuing our computation with an k ; b) finding words in C that are prefi in the reminders from C i ; that is continuing our computation with an y. If we reach λ as a reminder it means that at that step we have two distinct factorizations ( we have started with different words from C) for the same word(based on the remark made above the ony difference between those two factorizations is λ). In our case we have reached: w = (00011)(010)(11110)(00110) = (0001)(101011)(1100)(0110) This theorem offers a test for codes that consists in a systematic organizations of computations required to verify if a subset of A + is a code or not. Basicay we try to find distinct derivations for the same word by starting from eft to right and trying to match words to the set of reminders. We compute a the reminders in a the attempts to find distinct factorizations. We discover distinct factorizations by finding the empty word as one of the reminders and keeping in mind that the computations have different starting words. Now we can say that for any subset C of A it is effectivey decidabe if C is a code or not. The agorithm suggested by the resut above is caed The Sardinas- Patterson agorithm for codes. We wi describe more of this agorithm in a foowing section. We have previousy defined the probabiity distribution for an aphabet A and we have etended it to words over A. We have defined the measure of sets as the sum of the probabiities for the words in that set. We sha present a resut that inks the measure of a set with the code property for that set. Theorem Let C A + and π a probabiity distribution for the aphabet A. 3 The compete proof can be found in [1] 11

13 1. If C is a code then π(c n ) = π(c n ), n If π is positive (π(a) > 0, a A), if π(c) is finite and if then C is a code. π(c n ) = π(c n ), n 1, Theorem Let A be an aphabet. Then C A + and C a code impies that π(c) 1. We sha discus the case when π is a particuar case of distribution the uniform distribution. The uniform distribution for an aphabet is a function: π : A [0, 1], π(a) = 1, a A. A In the case of A finite and the distribution uniform then we obtain that any code C over the aphabet of k impies that the foowing equation hods: k c 1. c C This theorem has its imitations in determining if a given set is a code or not as shown in the foowing eampe[1] Eampe Let A = a, b and C = {ab, aba, aab}. It is easy to verify that this set is not a code since: (aba)(ab) = (ab)(aab). If we consider any probabiity distribution π over A we obtain π(c) < 1. Indeed, et π(a) = p, π(b) = q, with p + q = 1. Then π(c) = pq + 2p 2 q. It is easy to verify that p + q = 1 impies that we aways have pq 1 4 and p 2 q Then π(c) < 1. 12

14 This eampe shows that the converse of the Theorem2.2.4 is fase. Theorem Let A be an aphabet and 1 d 1 d 2 d n be a set of natura numbers. There eists a prefi code C consisting of n words with the engths (d 1, d 2,, d n ) if and ony if 1 A d A d A d 1. n This resut is aso known as the Kraft Inequaity and gives an important too for verifying if there eists codes with predetermined word engths. In 1956 McMian etends this inequaity to finite codes not just prefi. McMian Inequaity: Let A be an aphabet. Then C = c 1, c 2,, c n A + code the foowing inequaity hods: 1 A d A d dn A 13

15 Chapter 3 Sardinas-Patterson characterization Usuay it is not easy to verify if a given subset of A has the unique descifrabiity property and thus being a code. The usua test in order to determine if a set of words is a code or not consists in finding two different decompositions for the same w C and thus determining that the given set is not a code. Intuitivey the process of finding different decompositions is usuay easy if the sets C and A have few eements. If we ook at a set C = {a, ab, b} subset of {a, b} + it is very simpe to see that ab has two distinct factorizations. Usuay sets that might be codes have many eements and it is very hard to see two distinct factorizations or to prove that there doesn t eist different factorizations for the same word. If we ook at the set C = {aa, ab, aab, bba} it is not easy to determine two different factorizations or to prove that there aren t such. These simpe eampes show us that it is necessary to find agorithm that effectivey decide if a given set is a code or not. The Sardinas-Patterson agorithm (SP-agorithm for short) suggested by Theorem2.2.2 consists merey in computing a the reminders in a attempts at a doube factorization. It discovers a doube factorization by the fact that the empty word is one of the reminders. 14

16 3.1 S-P Agorithm for cassica codes Theorem2.2.2, aso known as the Sardinas-Patterson theorem for codes, eads us to an effective agorithm that soves the probem if a given set is a code or not. The theorem states that C is a code iff C C i =, for a i i. In other words C is a code iff C i does not contain the empty word for any i 1. It is very easy to see that these two forms of the Sardinas-Patterson theorem are equivaent. Indeed, if C C i = then from the definition of C i+1 it foows that λ C i+1. The converse hods true; that is if λ C i then there C C i. We sha present the agorithm as a proposition. Proposition Let A be an aphabet and C A +, C-finite and different from emptyset.it is effectivey decidabe if C is a code or not. Proof C is a code C C i = φ, i 1. We show that because C is finite then the foowing sequence is cycic: C 1, C 2,, C n Indeed if C is finite then we can effectivey determine a natura number n 1 such that: ( c C)( c n) We wi show net that: ( i 1)( c C i )( c n) We wi prove the statement by induction over i. For i = 1 C 1 = { A + c C : c C} = ( C 1 )( c C)( < c n) For i 1 if we suppose that ( c C i )( c n) then if we consider how C i is constructed: C i+1 = { A + c C : c C i } { A + c C i : c C} it is easy to see that hods. ( c C i+1 )( c n) 15

17 We have proved that the words in C i have engths ess or equa to the words in C. It is easy to see that the sequence: C 1, C 2,, C n is not infinite. Then there eists k, such that: (1 k )(C k = C ) The foowing agorithm decides if C is a code or not: begin i = 1 Compute C 1 whie(c i does not contain empty word) begin i := i + 1 Compute C i if( (eists j < i : C j = C i ) (C i = φ)) return C is a code endwhie return C is not a code end This Agorithm aways ends because the sequence C 1, C 2,, C n is cycic, that is, there eists 1 i j such that C i = C j. This agorithm is aso known as the S-P agorithm for codes. If we consider the same eampe as in Theorem2.2.2 : C is a subset of {0, 1} +. C = {010, 0001, 0110, 1100, 00011, 00110, 11110, } the resuts obtained by appying the Sardinas-Patterson agorithm are shown in Figure 1. If we want to obtain the shortest word w that has two different factorizations over C we must ook in the resut tabe from right to eft. In our case λ is a reminder from 0110 C 7 and 0110 C then w ends in 0110 (w = w ) is obtained as a reminder between 0 C 6 and C. Thus w 1 = w 2 0. Continuing in the same manner we obtain w =

18 010 C C C C C C C C λ... F igure 1 17

19 3.2 S-P Agorithm for z-codes In this section we wi present an agorithm for testing if a given set is a z-code or not. This agorithm that soves the probem in the case that the given set is finite was given in [2] and it is based on a suitabe etension of the Sardinas-Patterson criterion for cassica codes. First of a we sha reca the concept of a z-code and we sha present some basic resuts on z-codes. There are many cases where we need to etend words not ony to the right as in cassica codes but to the eft too by taking in consideration the fina etters of the word. This specia case of a code that generates a word that doesn t necessary increase in size but can decrease the size of the constructed word is caed a zigzag-code or for short a z-code. A factorization over a z- code can continue with a word to the right as in cassica codes but can aso continue with a word on the eft and thus deeting that codeword from the computation and thus decreasing it s size. A more forma definition is given net. Let A be an aphabet and A be the free monoid generated by A. Let X A. We define a reation on A A generated by the set T = {((u, v), (u, v)) u, v A, X}. We define the step reation between the pairs (u, v) and (u, v ) if and ony if ((u, v), (u, v )) T or ((u, v ), (u, v)) T. We denote a step between two pairs by: (u, v) (u, v ). We say that a step is to the right on or to the eft on if (u, v) (u, v), respectivey (u, v) (u, v). A path is defined as a sequence of steps. We define by X the set that contains a words w A such that eists at east one finite path between the pairs (λ, w) and (w, λ) (eists and it is finite (λ, w) + (w, λ)). A z-factorization f of w over X of ength m, where X is a subset of A and w X is a path (u i, v i ) (u i+1, v i+1 ) for i = 0, 1,, m, which verifies the foowing conditions: (1) u 0 = v m+1 = λ, (2) v 0 = u m+1 = w, (3) (u j, v j ) (u k, v k ) for j k. 18

20 Condition (3) is necessary in order to ecude the presence of cyces in the factorization. Definition A set X A is a z-code if and ony if any word w A has at most one z-factorization over X. Remark (1) Any z-code is a code; the converse is fase. There are codes that are not z-codes. Let us consider X = {b, aab, bba, aabba}. X is a code. Indeed, if we appy the Sardinas-Paterson agorithm discussed in the precedent section we obtain the foowing resut: C 1 = {ba}; C 2 = {a}; C 3 = {ab, abba}; C 4 = φ. and thus we concude that X is a code. X is not a z-code. Indeed, the word w = aabba over the aphabet A = {a, b} + has two distinct z-factorizations over X. Let s number the eements of X as foows: 1 = b 2 = aab 3 = bba 4 = aabba. Two distinct factorizations for w are: a) (λ, aabba) right 1 (aabba, λ) b) (λ, aabba) right 2 (aab, ba) eft 1 (aa, bba) right 3 (aabba, λ) We concude that X is not a z-code. (2) Any prefi(suffi) code is a z-code. There are z-codes that are neither prefi or suffi. The foowing agorithm computes a the factorizations in a attempts at a doube factorization for a singe word. First of a we must define the concept of a configuration. If in Sardinas-Patterson agorithm for codes there are produced a sequence of sets of words unti one of this sets contains λ or is 19

21 equa to empty set, this agorithm produces a sequence of sets with eements from A A {1, 2,, n} 3. In the origina S-P agorithm it is sufficient to take in account ony the different reminders from the right side because the factorization ony continues to the right. For z-codes it is not sufficient because an z-factorization can continue with a step to the eft, and thus decreasing the ength of the word to have doube factorization; in order to continue a z-factorization to the eft we must know the eft side of a computation (usuay denoted by ), not ony the different reminders. We define a configuration for a set X any tupe A A {1, 2,, n} 3. A configuration is any tupe q = (, r, i, j, k), where is the eft part in the attempt at a doube configuration and r is the reminder at that step. At that moment we have constructed two different z-factorizations: one for, and one for r. It is obvious that if we reach a configuration q = (, λ, i, j, k ) we have found two distinct z-factorizations for the same word. The agorithm proposed in [2] constructs sets of configurations unti reaches a set that contains configuration q = (, λ, i, j, k ) or unti the ength of a possibe doube z-factorization reaches the maimum vaue K. It is shown that for a given set X it is possibe to determine the ength K of the shortest words that might have a doube factorization. The agorithm finds two distinct z-factorizations with the property that these different z-factorizations are the shortest that we can find. First of a we must define how we can obtain the sets of configurations. This is an iterative process beginning with the set: Q 1 = {( h, r, h, 0, k) h, h X : k = k r} and continuing with the set Q n which is the set of a configurations produced from configurations from Q n 1. The configurations are obtained according to the actua step in the derivation. The configuration q = (, r, i, j, k) produces a configuration q = (, r, i, j, k ) according to the foowing three cases: 1. we continue our derivation to the right with an h which is an prefi of the reminder r: 20

22 h r r Case 1 2. we continue our derivation to the right with an h such that the reminder r is a prefi of h : r h r Case we continue our derivation to the eft with an h : h r r Case 3. The configuration q = (, r, i, j, k ) is defined formay as foowing: Definition We say that a configuration q = (, r, i, j, k) produces on X a configuration q = (, r, i, j, k ) if there eists h X such that: or h j, r = h r, = h, i = h, j = 0 k = k; h j, h = rr, = r, 21

23 or i = k, j = 0 k = h; h i, r = h r, = 1 h, i = 0, j = h k = k. After defining how a set of configurations produces another set of configurations we present an agorithm given in [2] that decides if a given set X is a z-code or not. The vaue K that occurs is the upper bound on the ength of the shortest words in A that might have two distinct factorizations. We define two famiies of sets in order to hep us see better the computations that we are processing. These famiies of sets are obtained from the sets of configurations and have no computationa vaue. and C n = {r A (, r, i, j, k) Q n } W n = {r A (, r, i, j, k) Q n } W n is aso caed the set of remainders of n th eve. The Agorithm begin n = 1; Compute Q 1, C 1, W 1 whie (λ is not in W n ) and ( Q n φ ) and( r < K, for any r C n ) begin n := n + 1 Compute Q n, C n, W n endwhie if (λ is in W i ) then X is not a z-code ese X is a z-code end 22

24 Remark The agorithm aways ends because of the imit imposed on the shortest word that might have two distinct factorizations. In [2] it is shown that K can be computed before the eecution of the agorithm. If we consider X a subset of A that is not a z-code (there are words with distinct factorizations), and w a word with two distinct factorizations with the property that the ength of w is minimum then: K = a A p a i=1 C X a 2i, where for any w A, w a denotes the number of occurrences of the etter a in w and for any X = { 1, 2,, n } and a A we denote by: n X a = i a. i=1 23

25 3.3 S-P Agorithm for Time-Varying codes Time-Varying codes(tv-codes for short) have been introduced in [9] as a proper etension of L-codes[3]. We sha reca these two concepts and present the etension of the Sardinas-Patterson agorithm to TV-codes. L-codes are introduced in [3] as functions g : Σ Σ such that g : Σ Σ given by: g(λ) = λ, and g(σ 0 σ 1 σ n 1 ) = g 1 (σ 0 )g 2 (σ 1 ) g n (σ n 1 ) for a σ 1, σ 2,, σ n Σ +, is injective. g i denotes the i th iteration of the unique homomorphic etension of g, for a i 1 (g 1 = g and g i+1 = g i g for a i 1, where is the function composition). A TV-code over an aphabet A is any function h : Σ N A +, where Σ is an aphabet, such that the function h : Σ A given by: h(λ) = λ, and h(σ 1 σ 2 σ n ) = h(σ 1, 1)h(σ 2, 2) h(σ n, n) for a σ 1, σ 2,, σ n Σ +, is injective. The main idea behind a TV-code is to encode a etter by considering it s position in the word to be coded. Because each symbo is coded by taking in consideration it s position in the word to be encoded we can view any TV-code as a matri with Σ rows and an infinite number of coumns: Σ \ N σ 1 h(σ 1, 1) h(σ 1, 2) h(σ 1, 3) σ 2 h(σ 2, 1) h(σ 2, 2) h(σ 2, 3) σ Σ h(σ Σ, 1) h(σ Σ, 2) h(σ Σ, 3) 24

26 For any TV-code h : Σ N Σ + we define the sets H i (the i th coumn in the matri above) in the foowing manner: H i = {h(σ, i) σ Σ} and we denote by H the famiy of sets (H i i 1). The set H i is caed the i th section of h. In [9] there have been presented some resuts concerning reations eisting between TV-codes, cassica codes and L-codes. We wi present briefy some of these resuts. Any code g : Σ : A + is a TV-code. Indeed we can define h : Σ N A + as h(σ, i) = g(σ) for a σ Σ and i N. It is obvious that g = h. Any L-code g : Σ Σ + is a TV-code. Indeed, we can define h : Σ N Σ + by h(σ, i) = g i+1 (σ), for a σ Σ and i N. It is obvious that g = h. A major resut on TV-codes is that there are TV-codes that are not L-codes. This assures us that TV-codes are a proper etension of L-codes. The Schutzenberger criterion for codes has been etended to TV-codes in the foowing manner: Theorem A function h : Σ N A + is a TV-code if and ony if h is reguar, H is catenativey independent, and the foowing property hods true: ( w A + )(w not in H = ( i, j 1)(H 1 H i w H 1 H j = φ wh i+1 wh j+1 = φ)) We are going to present a Sardinas-Patterson characterization theorem for TV-codes 2. First of a we are going to anayze the cases where we can get different factorizations. As seen in the Sardinas-Patterson theorem for cassica codes we begin by growing two strings by different code words. First of a we begin by constructing a set of reminders such that any word member of this set is a reminder from two different codewords, in fact codewords from H 1. H 1 1,1 = H 2 1,1 = { A + σ σ Σ : h(σ, 1) = h(σ, 1)} 1 More detais and the compete proof can be found in [9] 2 The compete proof can be found in [9] 25

27 It is obvious that if H 2 H 1 1,1 φ then we can find two distinct factorizations thus h not being a TV-code. After constructing H 1,1 we continue by adding a new codeword to the first(second) string. We encounter two cases. Case 1: The codeword from H 2 is shorter than the reminder w H 1,1 (h(σ, 2)w = w, where w is the new reminder). In this manner we define two the sets H 1 2,1 by taking in consideration if we catenate the new codeword to the first string: H 1 2,1 = { A + σ Σ : h(σ, 2) H 1 1,1}, and H 2 1,2 if we catenate to the second string: H 2 1,2 = { A + σ Σ : h(σ, 2) H 2 1,1}. Case 2: The codeword from H 2 is onger than the reminder w H 1,1 (h(σ, 2) = ww, where w is the new reminder). In this manner we define two the sets H2,1 2 by taking in consideration if we catenate the new codeword to the first string: H2,1 2 = { A + y H1,1 1 : y H 2 }, and H 1 1,2 if we catenate to the second string: H 1 1,2 = { A + y H 2 1,1 : y H 2 }. In this manner we define inductivey, for any k 1, the famiy of sets H k = {H 1 i,j, H 2 i,j i, j k}: H k,k = H 1 k,k = H 2 k,k = { A + σ σ Σ : h(σ, k) = h(σ, k)}; H 1 i,j = { A + (i > k H i H 1 i 1,j φ) (j > k H 2 i,j 1 H j φ)}, for a i, j k with either i > k or j > k; H 2 i,j = { A + (j > k H j H 2 i,j 1 φ) (i > k H 1 i 1,j H i φ)}, for a i, j k with either i > k or j > k. 26

28 Let us see en eampe[9]. Let h be the function given in the tabe beow. Σ \ N σ 1 a baa ab ab ab σ 2 baa b aab aab aab σ 3 aba bab a a a We compute the foowing sets members of the famiy H 1 : H 1,1 = {a, b}, H 1 2,1 = {a} = H 2 1,2, H 2 2,1 = {a, b} = H 1 1,2; H 1 3,1 = φ = H 2 1,3, H 2 3,1 = {b, ab} = H 1 1,3, H 1 2,2 = {aa, ab} = H 2 2,2; H 1 4,1 = H 2 4,1 = H 1 1,4 = φ, H 1 3,2 = {a, b} = H 2 2,3, H 2 3,2 = {b} = H 1 2,3. Theorem Sardinas-Patterson criterion for TV-codes 3 A function h : Σ N A + is a TV-code if and ony if h is reguar and the foowing property hods true: ( k 1)( i, j k)(h 1 i,j H i+1 = φ = H 2 i,j H j+1 ) This resut eads to en effective agorithm for deciding if a given reguar function h is a code or not. 3 A compete proof can be found [9] 27

29 The Agorithm begin i = 1; j = 1 whie(true) begin Compute H 1 i,j Compute H 2 i,j, if(h 1 i,j H i+1 φ H 2 i,j H j+1 φ) return C is a not code endwhie end 28

30 3.4 S-P Agorithm for SE-codes Synchronized Etension systems (SE-systems for short) are powerfu generative toos, a new and eegant approach in forma anguage theory and combinatorics on word. Introduced in [6], those are very usefu when deaing with non-standard generative devices as time-varying mechanisms, conditiona grammars or monadic string rewriting systems [6, 9, 8, 10]. Those can aso be used to define a new concept of a code(section 5 in [6],[4]). A Synchronized Etension system (SE-system, for short) [6] is a 4-tupe G = (V, L 1, L 2, S), where V is an aphabet and L 1, L 2 and S are anguages over V. L 1 is caed the initia anguage, L 2 the etending anguage, and S the synchronization set of G. Let G = (V, L 1, L 2, S) be an SE-system. We define the binary reation G,r on V as foows: u G,r v iff ( w L 2 )( s S)(, y V )(u = s w = sy v = y). s y s As seen in the picture the word s S acts as a synchronizing word between u and w. The reation G,r is defined in such a manner that the synchronizing word from S is negected in the fina resut. The anguage generated by an SE-system G and G,r is defined as: L r (G) = {w v L 1 such that v G,r w} If we want the synchronizing word to appear in the fina resut we must define a new reation G,r + in the foowing manner: u G,r + v iff ( w L 2 )( s S)(, y V )(u = s w = sy v = sy). s y s 29

31 Aso we can etend word to the eft by defining in a simiar manner the reations G, and G, +. The reation between these reation is that by etending to the eft we obtain the mirror image of what we obtain by etending to the right: L (G) = L r ( G), where L (G) is the anguage generated by an SE-system G etending to the eft and L r ( G) is the anguage generated by the SE-system G etending to the right. A derivation can be considered as word π over the aphabet L 2 S (a sting containing pairs ike:the word used in the current derivation step, the synchronization used). If L 2 and S are indeed sets, a derivation can aso be considered as a sting of pairs of indees. In this case we say that π in an r -derivation of u into v, and we write u π r v. A derivation u r v is caed an r -derivation of u into v. Two r - derivations u 1 r u 2 r r u n and u 1 r u 2 r r u m are caed distinct if n m or there is an i such that u i u i. An SE-system G is caed r -ambiguous if there is a word v having at east two distinct r -derivations in G. An r -derivation u 1 r u 2 r r u n is caed reduced if it does not contain cyces, that is, there are no i and j such that i j and u i = u j. If an SE-system has the property that for any word v there is at most a reduced r -derivation of v, then it is caed r -nonambiguous or an r -code. It is aso genericay caed an SE-code. Furthermore on we sha use ony r derivations because any resut obtained for this kind of derivations can be easiy transated to the other three types of derivations. Definition A SE-system G = (V, L 1, L 2, S) is caed k-bounded directed if S = V k and the derivation reation is defined as foow: u G,r v iff ( w L 2 )( s S)(, y V )(u = s w = sy v = y), such that s is the ongest word in S, suffi in u and prefi in w. 30

32 Remark Codes are particuar cases of SE-codes. Indeed, a set C A + is a code if and ony if the SE-system is r -nonambiguous. (A, C, C, {λ}) Z-codes are not particuar cases of SE-codes. If the SE-system: G = (A {#}, X{#}, {#}X{#} X{##}, {#} X{#}) associated to the set of words X is r -nonambiguous then X is a z-code, but not conversey 5. This happens because in the case of a z-code the words removed by eft derivations must be kept because they are used for right derivations. In the case of SE-codes these words are not kept and the right derivations do not depend on the eft derivations made before. The Sardinas-Patterson characterization theorem for codes can be etended to SE-codes but it doesn t ead to an effective agorithm for testing the SEcode property. It has been pointed in [6] (Remark 4.1) that this property is undecidabe in genera. In order to deveop a Sardinas-Patterson theorem ike we must compute a the reminders in a attempts at a doube factorization. In order to do that we must define a structure that describes a step from a computation. It is not sufficient to describe ony the reminders as in the origina theorem because an derivations can decrease or increase the ength of the computation. Definition A configuration of G is a structure [(, s 1 ), (r, s 2 )] (z,s),f where, r V, s 1, s 2, s S {λ}, z L 1 L 2 {λ}, and f {0, 1}. We denote by Config(G) the set of a configurations of the SE-system G. A configuration [(, s 1 ), (r, s 2 )] (z,s),f describes a possibe anaysis step of two distinct r derivations of the same word, as it is pictoriay represented in the foowing figure: 4 For more detais see [6] 5 For more detais the reader is directed to [4] 31

33 s 1 r s 2 The fag f is 0 if both r -derivations are etended in the same way, and 1 otherwise. The pair (z, s) is used to avoid identic r -derivations when f = 1. We have defined a possibe anaysis step of two distinct r derivations. We must define a way for a configuration to produce another configurations stricty depending on how can we continue these two distinct derivations. This passing from a configuration to another is given by a binary reation on Config(G). Definition The passing from a configuration to another one is given by a binary reation on Config(G). We define this reation by considering a generic configuration [(, s 1 ), (r, s 2 )] (z,s),f and showing a possibe steps from it: 1. [(, s 1 ), (λ, s 1 )] (λ,λ),0 s 1 [(, s 1 ), (r, s 2)] (,s 2 ),0, where = r s 2. This case is pictoriay represented in the foowing figure: s 1 s 1 r s 2 s 1 s 1 2. [(, s 1 ), (λ, s 1 )] (λ,λ),0 s 1 [(, s 1), (r, s 1 )] (,s 2 ),0, where = r and s 1 = r. This case is pictoriay represented in the foowing figure: s 1 s 1 r s 1 s 1 s 1 3. [(, s 1 ), (r, s 2 )] (z,s),0 s 2 [(, s 1 ), (r, s 2)] (z,s ),f, where r = r s 2 and { ((λ, λ), 0), if r ((z, s ), f ) = = λ and s 1 = s 2 ((z, s), 1), otherwise This case is pictoriay represented in the foowing figure: 32

34 s 1 s 1 r s 2 r s 1 r s 2 s 4. [(, s 1 ), (r, s 2 )] 2 (z,s),0 [(, s 1), (r, s 1 )] (z,s ),f, where = r, s 1 = r r and { ((λ, λ), 0), if r ((z, s ), f ) = = λ and s 1 = s 1 ((z, s), 1), otherwise This case is pictoriay represented in the foowing figure: s 1 r s 2 r s 1 r s 2 s 1 5. [(, s 1 ), (r, s 2 )] (z,s),0 s 1 [(, s 2 ), (r, s 2)] (z,s ),f, where = rr s 2, = r and { ((λ, λ), 0), if r ((z, s ), f ) = = λ and s 2 = s 2 ((z, s), 1), otherwise This case is pictoriay represented in the foowing figure: s 1 s 1 r s 2 r r r s 2 s 1 s 6. [(, s 1 ), (r, s 2 )] 1 (z,s),0 [(, s 1), (r, s 2 )] (z,s ),f, where = s 1, r = r = and { ((λ, λ), 0), if r ((z, s ), f ) = = λ and s 1 = s 2 ((z, s), 1), otherwise This case is pictoriay represented in the foowing figure: s 1 s 1 s 1 r s 2 r r s 2 7. [(, s 1 ), (r, s 2 )] (z,s),0 s 1 [(, s 1), (r, s 2 )] (z,s),1, where =,s 1 =, r = r. This case is pictoriay represented in the foowing figure: 33

35 s 1 s 1 s 1 r s 2. r s 2 r 8. [(, s 1 ), (r, s 2 )] (z,s),1 s 1 [(, s 2 ), (r, s 2)] (λ,λ),1, where(z, s) (, s 2), = r and = rr s 2. This case is pictoriay represented in the foowing figure: s 1 s 1 r r r s 2 r s 2 s 2 9. [(, s 1 ), (r, s 2 )] (z,s),1 s 1 [(, s 1), (r, s 2 )] (λ,λ),1, where (z, s) (, s 1), = r and = rr s 2. This case is pictoriay represented in the foowing figure: s 1 s 1 r s 2 r r s 2 s [(, s 1 ), (r, s 2 )] (z,s),1 s 1 [(, s 1), (r, s 2 )] (λ,λ),1, where (z, s) (, s 1), =, r = r and s 1 =. This case is pictoriay represented in the foowing figure: s 1 s 1 r s 1. s 2. r r s [(, s 1 ), (r, s 2 )] (z,s),1 s 2 [(, s 1 ), (r, s 2)] (λ,λ),1, where (z, s) (, s 2), r = r s 2. This case is pictoriay represented in the foowing figure: s 1 r s 2 s 1 r s 2 r s 2 34

36 12. [(, s 1 ), (r, s 2 )] (z,s),1 s 2 [(, s 1), (r, s 2 )] (λ,λ),1, where (z, s) (, s 1), = r and s 1 = r r. This case is pictoriay represented in the foowing figure: s 1 r s 2 s 2 r. s 1. r s 1 After describing how a configuration can produce another configurations we define the sets Q i Config(G),for a i 0, for any SE-system G = (V, L 1, L 2, S), as foows: Q 0 = {[(λ, λ), (r, s 2 )] (r,s2 ),0 rs 2 L 1, s 2 S}, Q i+1 = {[(, s 1), (r, s 2)] (z,s ),f [(, s 1), (r, s 2 )] (z,s),f Q i [(, s 1 ), (r, s 2 )] (z,s),f [(, s 1), (r, s 2)] (z,s ),f }. Theorem Let G = (V, L 1, L 2, S) be an SE-system. G is an r code if and ony if for any i 0, Q i does not contain configurations [(, s 1 ), (λ, s 1 )] (z,s),1. This theorem eads us to an agorithm for verifying that a given set is a SE-code or not. Unfortunatey we can t give a hating condition for this agorithm. If it stops the answer is that the given set is not a SE-code. Thus the SE-code property is semi-decidabe. 6 The proof can be found in [4] 35

37 The Agorithm begin i = 1; Compute Q 1 whie ([(, s 1 ), (λ, s 1 )] (z,s),1 not in Q i ) and ( Q i φ ) begin i := i + 1 if ([(, s 1 ), (λ, s 1 )] (z,s),1 in Q i ) then X is not SE-code stop; Compute Q i endwhie end The SE-code property is semi-decidabe in genera but there are particuar subcasses of SE-system for which this property is decidabe. Indeed for the k-bounded directed SE-systems 7 this property is decidabe. 7 See Definition

38 Chapter 4 Concusions This paper is dedicated to the study of a very important aspect of the theory of codes: how to determine if a given set is a code or not. This probem is soved, in the case of cassica codes, by the Sardinas-Patterson characterization theorem. This resut eads to an effective agorithm for detecting the code property for a given set. When introducing various casses of codes, the authors have to sove a very important probem: the way of determining how a given set can act as a code or not. This probem is usuay soved etending the Sardinas- Patterson resut for that specific code. This is the case of z-codes, TV-codes and SE-codes. In the case of SE-codes we have deveoped a Sardinas-Patterson characterization theorem but unfortunatey it doesn t ead us to an effective agorithm. We concentrate our efforts in determining specific subcasses of SE-systems for which the SE-code property is decidabe. This remains an interesting open probem. 37

39 Bibiography [1] J. Berste, D. Perrin. Theory of Codes, Academic Press, [2] M. Madonia,S. Saemi T. Sportei. A Generaisation of Sardinas and Pattersons agorithm to z-codes, Theoretica Computer Science 108, 1992, [3] H.A. Maurer, A.Saomaa, D.Wood. L-codes and Number Systems, Theoretica computer Science 22, 1983, [4] I. Popa, B. Paşaniuc. A Sardinas-Patterson Characterization Theorem for SE-codes, 10th Internationa Conference on Automata and Forma Languages - Debrecen Hungary, (Information Processing Letters, submitted). [5] S. Roman. Coding and Information Theory, Springer-Verag, [6] F.L. Ţipea, E. Mäkinen, C. Apachiţe. Synchronized Etensions Systems, Acta Informatica 37, 2001, [7] F.L. Ţipea, E. Mäkinen. A Note on Synchronized Etension Systems, Information Processing Letters 79, 2001, 7-9. [8] F.L. Ţipea, E. Mäkinen. Note on SE-systems and Reguar Canonica Systems, Fundamenta Informaticae 46, 2001, [9] F.L. Ţipea, E. Mäkinen, C. Enea. SE-Systems, Timing Mechanisms, and Time-Varying Codes, Internationa Journa of Computer Mathematics 79,

40 [10] F.L. Ţipea, E. Mäkinen. On the Compeity of a Probem on Monadic String Rewriting Systems, Journa of Automata, Languages and Combinatorics (to appear). 39

A Sardinas-Patterson Characterization Theorem for SE-codes

A Sardinas-Patterson Characterization Theorem for SE-codes A Sadinas-Patteson Chaacteization Theoem fo SE-codes Ionuţ Popa,Bogdan Paşaniuc Facuty of Compute Science, A.I.Cuza Univesity of Iaşi, 6600 Iaşi, Romania May 0, 2004 Abstact The aim of this pape is to

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1 Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1 Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

Secure Information Flow Based on Data Flow Analysis

Secure Information Flow Based on Data Flow Analysis SSN 746-7659, Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp. 5-60 Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege,

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

On generalized quantum Turing machine and its language classes

On generalized quantum Turing machine and its language classes Proceedings of the 11th WSEAS Internationa onference on APPLIED MATHEMATIS, Daas, Texas, USA, March -4, 007 51 On generaized quantum Turing machine and its anguage casses SATOSHI IRIYAMA Toyo University

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Periods and Borders of Random Words

Periods and Borders of Random Words Periods and Borders of Random Words Štěpán Houb and Jeffrey Shait 2 Department of Agebra, Facuty of Mathematics and Physics, Chares University, Prague, Czech Repubic houb@karin.mff.cuni.cz 2 Schoo of Computer

More information

An Operational Semantics for Weak PSL

An Operational Semantics for Weak PSL An Operationa Semantics for Weak PSL Koen Caessen 1,2 and Johan Mårtensson 1,3 {koen,johan}@safeogic.se 1 Safeogic AB 2 Chamers University of Technoogy 3 Gothenburg University Abstract. Extending inear

More information

Appendix of the Paper The Role of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Model

Appendix of the Paper The Role of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Model Appendix of the Paper The Roe of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Mode Caio Ameida cameida@fgv.br José Vicente jose.vaentim@bcb.gov.br June 008 1 Introduction In this

More information

HRL-Local Infinite Triangular Array Languages

HRL-Local Infinite Triangular Array Languages 1 Engineering, echnoogy echniques Vo.59: e16161076, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161076 ISSN 1678-4324 Onine Edition BRAZILIAN ARCHIVES OF BIOLOGY AND ECHNOLOGY A N I N

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

arxiv: v1 [math.ca] 6 Mar 2017

arxiv: v1 [math.ca] 6 Mar 2017 Indefinite Integras of Spherica Besse Functions MIT-CTP/487 arxiv:703.0648v [math.ca] 6 Mar 07 Joyon K. Boomfied,, Stephen H. P. Face,, and Zander Moss, Center for Theoretica Physics, Laboratory for Nucear

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

(Refer Slide Time: 2:34) L C V

(Refer Slide Time: 2:34) L C V Microwave Integrated Circuits Professor Jayanta Mukherjee Department of Eectrica Engineering Indian Intitute of Technoogy Bombay Modue 1 Lecture No 2 Refection Coefficient, SWR, Smith Chart. Heo wecome

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

ADELIC ANALYSIS AND FUNCTIONAL ANALYSIS ON THE FINITE ADELE RING. Ilwoo Cho

ADELIC ANALYSIS AND FUNCTIONAL ANALYSIS ON THE FINITE ADELE RING. Ilwoo Cho Opuscua Math. 38, no. 2 208, 39 85 https://doi.org/0.7494/opmath.208.38.2.39 Opuscua Mathematica ADELIC ANALYSIS AND FUNCTIONAL ANALYSIS ON THE FINITE ADELE RING Iwoo Cho Communicated by.a. Cojuhari Abstract.

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

STABLE GRAPHS BENJAMIN OYE

STABLE GRAPHS BENJAMIN OYE STABLE GRAPHS BENJAMIN OYE Abstract. In Reguarity Lemmas for Stabe Graphs [1] Maiaris and Sheah appy toos from mode theory to obtain stronger forms of Ramsey's theorem and Szemeredi's reguarity emma for

More information

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997 Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS

THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS ECCM6-6 TH EUROPEAN CONFERENCE ON COMPOSITE MATERIALS, Sevie, Spain, -6 June 04 THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS M. Wysocki a,b*, M. Szpieg a, P. Heström a and F. Ohsson c a Swerea SICOMP

More information

Timed CTL Model Checking in Real-Time Maude

Timed CTL Model Checking in Real-Time Maude Timed CTL Mode Checing in Rea-Time Maude (Extended Version) Daniea Lepri 1, Eria Ábrahám2, and Peter Csaba Öveczy1,3 1 University of Oso, Norway 2 RWTH Aachen University, Germany 3 University of Iinois

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

BALANCING REGULAR MATRIX PENCILS

BALANCING REGULAR MATRIX PENCILS BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems Preprints of the 9th Word Congress The Internationa Federation of Automatic Contro Structura Contro of Probabiistic Booean Networks and Its Appication to Design of Rea-Time Pricing Systems Koichi Kobayashi

More information

Consistent linguistic fuzzy preference relation with multi-granular uncertain linguistic information for solving decision making problems

Consistent linguistic fuzzy preference relation with multi-granular uncertain linguistic information for solving decision making problems Consistent inguistic fuzzy preference reation with muti-granuar uncertain inguistic information for soving decision making probems Siti mnah Binti Mohd Ridzuan, and Daud Mohamad Citation: IP Conference

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Homogeneity properties of subadditive functions

Homogeneity properties of subadditive functions Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

On nil-mccoy rings relative to a monoid

On nil-mccoy rings relative to a monoid PURE MATHEMATICS RESEARCH ARTICLE On ni-mccoy rings reative to a monoid Vahid Aghapouramin 1 * and Mohammad Javad Nikmehr 2 Received: 24 October 2017 Accepted: 29 December 2017 First Pubished: 25 January

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

Intuitionistic Fuzzy Optimization Technique for Nash Equilibrium Solution of Multi-objective Bi-Matrix Games

Intuitionistic Fuzzy Optimization Technique for Nash Equilibrium Solution of Multi-objective Bi-Matrix Games Journa of Uncertain Systems Vo.5, No.4, pp.27-285, 20 Onine at: www.jus.org.u Intuitionistic Fuzzy Optimization Technique for Nash Equiibrium Soution of Muti-objective Bi-Matri Games Prasun Kumar Naya,,

More information

Generalised colouring sums of graphs

Generalised colouring sums of graphs PURE MATHEMATICS RESEARCH ARTICLE Generaised coouring sums of graphs Johan Kok 1, NK Sudev * and KP Chithra 3 Received: 19 October 015 Accepted: 05 January 016 First Pubished: 09 January 016 Corresponding

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF SEVERAL VARIABLES

JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF SEVERAL VARIABLES PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Voume 128, Number 7, Pages 2075 2084 S 0002-99390005371-5 Artice eectronicay pubished on February 16, 2000 JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF

More information

On Some Basic Properties of Geometric Real Sequences

On Some Basic Properties of Geometric Real Sequences On Some Basic Properties of eometric Rea Sequences Khirod Boruah Research Schoar, Department of Mathematics, Rajiv andhi University Rono His, Doimukh-791112, Arunacha Pradesh, India Abstract Objective

More information

Path planning with PH G2 splines in R2

Path planning with PH G2 splines in R2 Path panning with PH G2 spines in R2 Laurent Gajny, Richard Béarée, Eric Nyiri, Oivier Gibaru To cite this version: Laurent Gajny, Richard Béarée, Eric Nyiri, Oivier Gibaru. Path panning with PH G2 spines

More information

Higher dimensional PDEs and multidimensional eigenvalue problems

Higher dimensional PDEs and multidimensional eigenvalue problems Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u

More information

arxiv: v3 [math.ac] 7 Dec 2009

arxiv: v3 [math.ac] 7 Dec 2009 SUPERTROPICAL MATRIX ALGEBRA II: SOLVING TROPICAL EQUATIONS ZUR IZHAKIAN AND LOUIS ROWEN arxiv:0902.2159v3 [math.ac] 7 Dec 2009 Abstract. We continue the study of matrices over a supertropica agebra, proving

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes

Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes Improved Decoding of Reed-Soomon and Agebraic-Geometric Codes Venkatesan Guruswami Madhu Sudan Abstract Given an error-correcting code over strings of ength n and an arbitrary input string aso of ength

More information

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation Robust Sensitivity Anaysis for Linear Programming with Eipsoida Perturbation Ruotian Gao and Wenxun Xing Department of Mathematica Sciences Tsinghua University, Beijing, China, 100084 September 27, 2017

More information

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

arxiv: v1 [math.co] 12 May 2013

arxiv: v1 [math.co] 12 May 2013 EMBEDDING CYCLES IN FINITE PLANES FELIX LAZEBNIK, KEITH E. MELLINGER, AND SCAR VEGA arxiv:1305.2646v1 [math.c] 12 May 2013 Abstract. We define and study embeddings of cyces in finite affine and projective

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Honors Thesis Bounded Query Functions With Limited Output Bits II

Honors Thesis Bounded Query Functions With Limited Output Bits II Honors Thesis Bounded Query Functions With Limited Output Bits II Daibor Zeený University of Maryand, Batimore County May 29, 2007 Abstract We sove some open questions in the area of bounded query function

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

Minkowski sum based lattice construction for multivariate simultaneous Coppersmith s technique and applications to RSA

Minkowski sum based lattice construction for multivariate simultaneous Coppersmith s technique and applications to RSA Minkowski sum based attice construction for mutivariate simutaneous Coppersmith s technique and appications to RSA Yoshinori Aono aono@nict.go.jp Nationa Institute of Information and Communications Technoogy

More information

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential Lecture 6 Povh Krane Enge Wiiams Properties of -nuceon potentia 16.1 4.4 3.6 9.9 Meson Theory of Nucear potentia 4.5 3.11 9.10 I recommend Eisberg and Resnik notes as distributed Probems, Lecture 6 1 Consider

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

A natural differential calculus on Lie bialgebras with dual of triangular type

A natural differential calculus on Lie bialgebras with dual of triangular type Centrum voor Wiskunde en Informatica REPORTRAPPORT A natura differentia cacuus on Lie biagebras with dua of trianguar type N. van den Hijigenberg and R. Martini Department of Anaysis, Agebra and Geometry

More information

An approximate method for solving the inverse scattering problem with fixed-energy data

An approximate method for solving the inverse scattering problem with fixed-energy data J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

1D Heat Propagation Problems

1D Heat Propagation Problems Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI

MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI KLAUS SCHMIDT AND TOM WARD Abstract. We prove that every mixing Z d -action by automorphisms of a compact, connected, abeian group is

More information

Monomial Hopf algebras over fields of positive characteristic

Monomial Hopf algebras over fields of positive characteristic Monomia Hopf agebras over fieds of positive characteristic Gong-xiang Liu Department of Mathematics Zhejiang University Hangzhou, Zhejiang 310028, China Yu Ye Department of Mathematics University of Science

More information

CONGRUENCES. 1. History

CONGRUENCES. 1. History CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

David Eigen. MA112 Final Paper. May 10, 2002

David Eigen. MA112 Final Paper. May 10, 2002 David Eigen MA112 Fina Paper May 1, 22 The Schrodinger equation describes the position of an eectron as a wave. The wave function Ψ(t, x is interpreted as a probabiity density for the position of the eectron.

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information