On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers

Size: px
Start display at page:

Download "On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers"

Transcription

1 1 On Solving Ambiguity Resolution with Robust Chinese Remainder Theorem for Multiple Numbers Hanshen Xiao and Guoqiang Xiao arxiv: v1 [cs.it] 9 Jun 018 Abstract Chinese Remainder Theorem (CRT) is a powerful approach to solve ambiguity resolution related problems such as undersampling frequency estimation and phase unwrapping which are widely applied in localization. Recently, the deterministic robust CRT for multiple numbers (RCRTMN) was proposed, which can reconstruct multiple integers with unknown relationship of residue correspondence via generalized CRT and achieves robustness to bounded errors simultaneously. Naturally, RCRTMN sheds light on CRT-based estimation for multiple objectives. In this paper, two open problems arising that how to introduce statistical methods into RCRTMN and deal with arbitrary errors introduced in residues are solved. We propose the extended version of RCRTMN assisted with Maximum Likelihood Estimation (MLE), which can tolerate unrestricted errors and bring considerable improvement in robustness. Index Terms Frequency Ambiguity Resolution, Phase Ambiguity Resolution, Robust Chinese Remainder Theorem, Maximum Likelihood Estimation, Remainder Errors. I. INTRODUCTION Localization of nodes [3], [5] and frequency estimation [4] are two fundamental problems in sensor networks. Due to the restriction on precise synchronization and hardware resources such as high-rate analog to digital converters (ADC), the phase detection based ranging methods and sub-nyquist sampling are two important approaches used in these kinds of applications. Especially, the radio interferometric positioning system (RIPS) [13], which receives considerable attraction recently, is also based on the idea to measure the phase of the interference signals generated by two transmitters. However, all of above-mentioned methods are confronted with the ambiguity resolution problems. To be formal, let m l, l = 1,,..., L, denote a group of moduli selected and X i, i = 1,..., N, denote multiple numbers. In the model of undersampling frequency estimation [4], [1], [11], [14] {X i } represent the frequencies to be estimated and the moduli {m l } stand for the sampling frequency used. For a complex waveform f(t) = Hanshen Xiao is with CSAIL and the EECS Department, MIT, Cambridge, USA. hsxiao@mit.edu. Guoqiang Xiao is with the College of Computer and Information Science, Southwest University, Chongqing, China. gqxiao@swu.edu.cn.

2 N i=1 A ie πjxit sampled in frequency m l, the undersampled waveform becomes x ml [n] = N i=1 A ie πjxin m l, n Z. The spectrum of x ml [n] can be obtained via an m l -point Discrete Fourier Transform, i.e., DF T ml (x ml [n])[k] = N i=1 A i1(k X i ml ), where the residue sets, {r il = X i ml i = 1,,..., N}, l = 1,,..., L, can be read from the peaks on spectrum respectively, though the correspondence between X i and r il is unknown. Here X i ml denotes the residue of X i modulo m l and 1 is the indicator function. Similarly, in a localization system [3], [5], {X i } stand for the distances and {m l } denote the wavelengths, respectively. In a nutshell, addressing the ambiguity problems is equivalent to recover X i with the residue sets, {r il }, which is a generalized Chinese Remainder Theorem (CRT) problem. It is well known that CRT describes a closed-form relationship between an integer and its residues modulo given pairwise co-prime moduli. However, even if very small errors are introduced in the residues, it may result in an incredibly large deviation in reconstruction with conventional CRT. In the presence of error il in each residue, which is almost inevitable in practice, the problem turns to estimate X i with X i, which is reconstructed by erroneous residues sets, R l = { r il = X i + il ml i = 1,,..., N}, l = 1,,..., L. To address the problem arising from error sensibility, Robust CRT (RCRT) is formally proposed and studied during last decade. Ideally, RCRT is expected to achieve a reconstruction deviation proportional to the errors in residues. The studies in this area have been elaborated in [10]. Certainly, any improvement over the error bound or the dynamic range max i X i in RCRT will lead to more robust and efficient estimation schemes in many applications. In this paper, trodding the line of research in [9], [6], [3], we initiate the study on RCRT for multiple numbers (RCRTMN) with tolerance of arbitrary errors. Besides presenting the specific algorithms, we show how to sharply reduce the complexity and introduce MLE for further improvement. A. Remainder Codes for Hamming-weight Errors II. PRELIMINARIES Error correction coding is a well-studied field, where most research has concentrated on errors measured with the Hamming weight. Classic remainder code under such scenario was formally proposed during the 1960s. The first polynomial time error correction scheme was constituted by Goldreich et al. [1] based on LLL lattice reduction and further improved by Guruswam et al. in []. We conclude their results as the following lemma. Lemma 1: Given L co-prime integers, M 1, M,..., M L, which are in an ascending order, the residue vector of an integer X within [0, K l=1 M l), K L, is expressed as x = (x 1, x,..., x L ) = ( X M1, X M,..., X ML ). If there exist λ many coordinates that are erroneous in ˆx = (ˆx 1, ˆx,..., ˆx L ), i.e., there exist λ many indexes, l {1,,..., L}, such that coordinate-wise x l ˆx l and λ L K, then X can be uniquely recovered in polynomial time from the residue vector with errors. Before we proceed, we have to stress the fact that when the number of erroneous residues, λ, is no bigger than L K, then x, the error-free residue vector of X, can be uniquely recovered. However, another noteworthy feature is that, when λ > L K, we can still use similar scheme to implement error correction, though it is not guaranteed that there exists a unique code, of which the hamming distance to ˆx is no bigger than λ. It is clear that x is one of candidates when λ L K, i.e., X is possible to be recovered but may not be distinguished due to multiple possible solutions when L K < λ L K. In coding theory, to find all possible codes within a fixed distance

3 3 away from the erroneous vector ˆx is called list decoding. In [], Guruswam et al. proved that there still exists polynomial time list decoding scheme of remainder code when λ < L KL. For general λ, the corresponding results can be refereed in [7]. We will use the above results in the following proof. B. Framework of conventional RCRTMN with bounded errors In the case of bounded errors, assume δ > max il il. Denote M = {m 1, m,..., m L } as the moduli selected, where m l = M l. Throughout the paper, we always assume that M l are co-prime and = 4Nδ. For the erroneous residues, denote the residue sets as R l = { r il = X + il ml i = 1,,..., N}, l = 1,,..., L. Let r c il = r il, which are termed as common reminders. We arrange the set of common remainders { r il c } in an ascending order represented as R = {γ 1, γ,..., γ κ }, where i = 1,,..., N, l = 1,,..., L, and κ NL. It is not hard to observe that the main difficulty to construct RCRTMN arises from the absence of the correspondence between { r il } and X i, and interference from introduced errors. We first review the techniques in RCRT from the point of macroscopic view. To achieve robustness, the folding number Xi plays a key role. It is noted that X i M l = X i ml X i Ml = r il ri c Ml (1) Unfortunately, we can not trivially replace r il and r c i by r il and r c il in (1) due to presence of errors. For example, if there exist some l 1 and l such that r c i + il 1 < and 0 r c i + il <, we have r il 1 r c il 1 Ml1 = Xi +1 M l1 while r il r c il Ml = Xi M l. However, things are different if the order of index l is known such that {r c i + il} are sorted incrementally, as illustrated in Fig.1, where the order is l 1, l, l 3. Under this situation, combined with the information of r c il = rc i + il on a circle modulo illustrated in Fig., we can recover the relative position of r c i + il represented in the axis in Fig.1, if max il il min il il <. In this example, relative positions of r c i + il on axis is determined since it can be inferred that either < r c 1 + il1 < 0 and 0 r c 1 + ilj <, or 0 r c 1 + il1 < and r c 1 + ilj <, j =, 3. Anyway, the problem raised by residue inconsistence of Xi in (1) is solved naturally. The following lemma is refined from [8]. Lemma : If the error il introduced in each residue satisfies max il il < δ = 4N, there exists j 0 {1,,..., κ 1} such that γ j0+1 γ j0 > δ or j 0 = κ such that γ 1 γ κ + > δ. In addition, for each i {1,,..., N}, the order of l of {ˆr c il } defined in () and (3) in Algorithm 1 below is exactly the same as that of {rc i + il} when both sets {ˆr c il } and {rc i + il} are arranged in an ascending order. 1 We define γ (l)i = r c il = rc i + il, i {1,,..., N}, where (l) i is the index such that il is the l th smallest error introduced in the residues of X i, illustrated in Fig. 3. Corollary 1: In Lemma, j 0 should be (L) i0 and j κ should be (1) i1 for some i 1, i 0 {1,,..., N}. Proof. Revisit the definition of {ˆr il c } in () and (3), which is merely a shift on { rc il }. The ascending order of {ˆr c il } corresponds to that of il for each i based on Lemma. Thus i0l 0 corresponding to γ j0 or r c i 0l 0 should be the maximum for some i 0 {1,,..., N}, since it corresponds to the largest element of {ˆr il c }. As the first 1 Said another way, there exist an empty interval ranging from γ j0 to γ j0 +1 κ on the circle modulo with distance at least δ clockwise. We can cut the circle at γ j0 and stretch it to be a line, where the relative location of ˆr c il on the line is the same as that of rc i + il on the axis in Fig.1.

4 4 Fig. 1. Positions of r c i + il on the axis Fig.. Positions of r c il = rc i + il on the circle modulo. element of {ˆr c il } sorted incrementally, γ j 0+1 κ or r c i 1l 1 corresponding to i1l 1, should be the smallest for some i 1 {1,,..., N}. Substituting the notations above, j 0 = (L) i0 and j = (1) i1. Done. The rest work is to apply Generalized CRT for multiple numbers (GCRTMN) reconstruction in the error-free case [8] on q il = r il ˆr c il Ml to uniquely recover q i for each i, where q i Ml = q il. The reconstruction of q i also naturally determines the correspondence between X i and r il c. To deal with bounded errors, no redundant moduli are required. Finally, we conclude the algorithms in [8] as follows with K moduli. III. RCRTMN WITH ARBITRARY ERRORS We divide the construction of RCRTMN for arbitrary errors into two parts, the estimation of folding number Xi and the common residues X i, respectively. Throughout the rest of the paper we consider a system formed by L moduli, where (L K) moduli are redundant. We merely assume that K l=1 M l is big enough, where the specific lower bound of K l=1 M l given X i to apply GCRTMN on q il to uniquely recover q i can be referred in [8]. Based on Lemma 1, we can correct up to L K errors. Following the notations given before, for each γ j, j {1,,..., κ}, let I j denote the interval (γ j, γ j + δ], if γ j + δ < ; otherwise, I j = (γ j, ) [0, γ j + δ ]. For each γ j = r c il, it is assigned with a label [l], the index of the residue set it belongs to. In the following, we divide the index set {1,,..., L} into two parts G and B: R l, l G, are called Good residue sets, in which the errors are bounded by δ; while R l, l B, are called Bad residue sets, in which the errors can be arbitrary and unbounded. Throughout the paper, we always assume B L K. Let R j denote the set of labels in I j. For example, in Fig.4, R (1)i1 for the interval I (1)i1 satisfied and the label of γ j is not in R j. is {[l ], [l 3]}. Let N denote the index set for those j such that, for I j, R j L K is

5 5 Algorithm 1 RCRTMN with bounded errors in [8] Input. Moduli: {m 1 = M 1, m = M,..., m K = M K }. Residue Sets: R l = { r il i = 1,,..., N}, l = 1,,..., K. Step 1. Calculate the common residues γ j = r il, j = 1,,..., κ, arranged in an ascending order. Step. Find out j 0 {1,,..., κ 1} such that γ j0+1 γ j0 > δ or j 0 = κ such that γ 1 γ κ + > δ Step 3. When j 0 κ, for each i and l, if r c il > γ j 0, define else if r c il γ j 0, When j 0 = κ, ˆr c il = r il for each i and l. Step 4. Let ˆr c il = r il. () ˆr c il = r il. (3) q il = r il ˆr il c Ml (4) and apply GCRTMN on q il to recover q i, i = 1,,..., N, q il = q i Ml, and correspondence between X i and r il. Output. Xi = q i + [ K l=1 ˆrc il K ], X i X i < δ, as the estimation of X i, where [ ] is the round operation of R. A. Folding Number Estimation In the presence of arbitrary errors, Lemma and Corollary 1 both are no longer tenable since there may exist an r c il, l B, between rc i 0l 0 and r c i 1l 1 on the circle modulo. Neverless, if there does exits an empty I j, then j here can certainly be such j 0 in Lemma and with the same definition on ˆr c il and q il, the problem is easy to solve. In order to find two successive elements in { r il c, l G } with distance at least δ over the circle, we will construct such an interval without any r c il. To this end, for an I t, t N, we remove all residues, γ j, where γ j = r c il, l R t. Let {γ j } denote the left κ many common residues in an ascending order. Since the label of γ t is not within R t, γ t will be kept and denote γ t as γ t in {γ j }. Let G = G R t and B = B R t, where R t = {1,,..., L}/R t. Since the number of residue sets removed, R t, is upper bounded by L K, thus G G R t K. We will show in the following that we can always find such an I t on the circle and consequently, by applying Lemma on the rest residues, q i can be uniquely recovered similar to Algorithm 1 with list decoding of errors in Hamming weights up to L K. Lemma 3: For an I t, t N, let γ t = γ t after residues are removed. In the case of t κ, let ˆr il c = rc il, when r il c = r il > γ t0 ; let ˆr il c = rc il, when ˆrc il γ t 0. In the case of t = κ, let ˆr il c = rc il. Then for each i {1,,..., N} and l G, the relative location of ˆr c il is exactly the same as that of rc i + il on axis. Proof. With the notations above, now we can find two successive γ t and γ t +1 κ such that γ t +1 κ γ t + 1(t = κ ) > δ, where 1(t = κ ) = 1 iff t = κ, otherwise it equals 0. We search two elements r c il, l G, say γ α and γ β, closest

6 6 Fig. 3. An example for positions of r c i + il on the axis where N = and L = 3. Fig. 4. Continuing example for positions of r c il (γ j) on the circle modulo. to γ t counterclockwise and to γ t +1 κ clockwise, respectively. Then ˆr c il, l G, defined in Lemma 3 is the same as those obtained in () and (3) when j 0 = α. Furthermore, the clockwise distance between γ α and γ β is at least δ. Thus based on Lemma, for l G, the claim holds and the relative location of r c i + il on axis is determined. Done. With Lemma 3, we can similarly define q il = r il ˆr c il Ml. After removing all residue sets with same labels in I t, t N, there exist at most L K many erroneous q il, l B, which are not the residue of q i. Here q i is the same notation as Algorithm 1 and satisfies q il = q i Ml for l G. However, in the worst case that all labels of γ j in I t are from G and B = R t = L K, after residue sets removed, it is reduced to a system with L L K moduli, where B = B = L K and G = L L K. As there are merely L K L K redundant moduli left, based on Lemma 1, the number of errors exceeds the unique correction capability (L K L K )/. When we apply list decoding [7], [] to correct up to L K errors in each step of GCRTMN [8] on q il, it is not guaranteed that q i can be uniquely recovered from q il. Nevertheless, q i should be in the decoding list since G K and B L K. On the other hand, based on Lemma, there exists γ j0 = r c il, l G, such that I j 0 does not contain any r c il, l G. Therefore, j 0 N and the labels of elements in I j0 must be all from B if they exist. Assuming that R j0 is τ, then the number of residue sets or moduli left is L τ and B = L K τ. Therefore the error correction capacity is L τ K, which is no less than L K τ. Thus we enumerate the operation on each I t, t N, with list decoding based error correction until q i can be distinguished with the unique solution. We formally conclude the scheme as follows. In section II, we give the notation (j) i. In the rest of the paper, let γ (j)i = r c il only for l G. It is clear that (j) i N for j = 1,,..., K 1, since γ (K)i, γ (K+1)i,...γ (K+ L K ) i are all within I (j)i, i.e., there exist at least ( L K + 1) labels in such I (j)i for j = 1,,..., K 1. Thus N (L K + 1)N and the complexity of

7 7 Algorithm RCRTMN for arbitary errors Input. Moduli: {m 1 = M 1, m = M,..., m L = M L }. Residue Sets: R l = { r il i = 1,,..., N}, l = 1,,..., L. Step 1. Calculate the common residues γ j = r il, j = 1,,..., κ, arranged in an ascending order. Step. For each t N, do the following steps. Step 3. Delete all the residues with the same labels in I t. Step 4. For the rest κ many residues γ j, γ t = γ t. Case 1: t κ. When r c il > γ t, define ˆr c il = rc il ; Otherwise, ˆr c il = rc il. Case : t = κ. Let ˆr c il = rc il. Step 5. Calculate q il = r il ˆr c il Ml and apply Generalized CRT with list decoding based error corrections on each step for q il to obtain q i, i = 1,,..., N. Step 6. For each error correction step, if the solution is unique, output Xi = q i + [ L Rt l=1 ˆr c il L R t ]. Algorithm is upper bounded by (L K + 1)N times using GCRTMN to recover integers. In the following, we proceed to present further optimization to reduce the complexity of Algorithm to N times accessing GCRTMN. Let P denote the index set for those j such that the number of labels in I j is no less than K + L K. ζ and ζ in P are called consecutive index if γ ζ I ζ or γ ζ I ζ. Theorem 1: P can be divided into at most N disjoint subsets, within which the index are consecutive. Moreover, in Step of algorithm, j only needs to enumerate the element in N, which is clockwise closet to the first element of a subset. Proof. Clearly, for each i {1,,..., N}, (1) i P. We claim that for each subset in P, at least one (1) i should be within it. If the claim is true, then the number of such subsets is upper bounded by N. Assume there exists a ζ P, ζ (1) i, which is not successive to (1) i for any i. Since I ζ contains at least K + L K labels, which is much bigger than L K, it must contain some labels from G. Supposing r c i l I ζ, l G, then γ ζ I (1)i or γ (1)i I ζ, which leads to a contradiction. Next we prove the rest half of the theorem. Recalling Corollary 1 and Lemma 3, there exists j 0 N and clearly j 0 P such that γ j0 = γ ( G )i0. Moreover, after removing all r c il, l R j 0, there exists γ (1)i1, which is closest to γ j0 counterclockwise for all r c il, l G. Therefore, γ j0 is counterclockwise before the first element, denoted by γ ζ, of the consecutive subset containing γ (1)i1. Anyway, γ ζ is lying in the interval ranging from γ j0 to γ (1)i1 clockwise. In Algorithm, when we set t = j 0, q il can be uniquely recovered. On the other hand, it is clear that ˆr c il defined in Step 4 of Algorithm keeps the same for all l G when we set either t = ζ or t = j 0 in Step of Algorithm. Done. Based on Theorem 1, the complexity of Algorithm is reduced to N times accessing GCRTMN. Especially when N = 1, the complexity in [9] is L K times higher than that of ours. Moreover, the analysis above is based on reconstruction of multiple integers, but it can be generalized trivially to the real number case [6]. B. Maximum Likelihood Estimation Based Common Residue Estimation In Algorithm, we briefly give an estimation of ˆr i c = X i q i by the average of ˆr il c, while it is not the maximumlikelihood estimation (MLE). The residue errors, { il }, are random variables and may have different variances due

8 8 to different sampling frequencies in practice. In the following, it is assumed that, for a given i, { il } are in wrapped normal distribution with mean 0 and a variance σ l for l = 1,,..., L, separately. In [6], a generic framework on MLE based RCRT for one integer is proposed. Following the idea, we proceed to introduce MLE in our scenario for multiple integers. Assume that after recovering q i, the correspondence between q i and q il for each l {1,,..., L}/R t = R t is determined, which further yields the correspondence between X i and r il. Therefore, the left work is to estimate each X i separately. According to [6], the MLE of r c i is MLE( r c i ) = arg min 0 x< l R t 1 σ l d ( r c il, x) (5) where d (X, Y ) = min z Z X Y + z, i.e., the minimal distance between the residues of X and Y over the circle modulo. In [6], it proved that there are R t candidates which can be the optimal solution of (5). In the following, we will derive a simpler closed-form MLE of ˆr c i in our case. With the assumption of il given at the start of Section III, since the relative position of elements in {ˆr c il } is proved to be the same as that in {rc i + il}, for any l 1, l G, ˆr c il 1 ˆr c il il1 + il δ. In the following, we assume K > L, i.e., the number of redundant moduli is smaller than that of information moduli. It is noted that G L L K K. There exists min l G ˆr c il = ˆrc il 0 [, ], such that at least K out of L elements in {ˆr il c } are within [ˆrc il 0, ˆr il c 0 + δ]. However, if there exists ˆr il c, which does not belong to any interval [y, y + δ], y [, ], which contains at least K many ˆr c il, then clearly l G. After removing such ˆr c il, denote the set of label l of the rest residues as H, we will show that: Lemma 4: max l1,l H ˆr c il 1 ˆr c il 4δ Proof. Assuming the smallest element in {ˆr c il }, l H, is just ˆrc il 1, then there are at least K elements ˆr c il, l H, within [ˆr il c 1, ˆr il c 1 + δ]. Otherwise, there is no interval [y, y + δ], y ˆr il c 1, that contains both ˆr il c 1 and at least other K 1 many ˆr c il. On the other hand, the number of rest ˆrc il, l H, beyond [ˆrc il 1, ˆr c il 1 + δ], is at most L K, which is smaller than K. Hence, the rest residues should all be within [ˆr c il 1 + δ, ˆr c il 1 + 4δ]. Done. From the above lemma, it also indicates that the reconstruction error is upper bounded by 3δ. Especially, when N = 1, i.e., = 4δ, after removing all ˆr il c with the same label as those in an I t of length δ, the rest ˆr il c are all within an interval no bigger than δ = δ. Substituting = 4Nδ, max l1,l H ˆr c il 1 ˆr c il N N. Moreover, noticing that d (X, Y ), therefore, ˆrc il 1 ˆr c il = d (ˆr c il 1, ˆr c il ) = d ( r c il 1, r c il ), when for any l 1, l H, as ( r il c ˆrc il ). Therefore referring to (5), the MLE of ˆrc il, l H, can be expressed as MLE(ˆr i c 1 ) = arg min σ (ˆrc il x) (6) l min ˆr il c x max ˆrc il l H It is easy to get the conclusion that the right hand of (6) is minimized when x = MLE(ˆr c i ) = ˆr c il l H σ l l H 1 σ l ˆr il c l H σ l l H 1 σ l With the closed form proposed, the complexity of determining MLE(ˆr i c ) is reduced to O(1). and thus (7)

9 9 Fig. 5. Performance simulation comparison when N = Fig. 6. Performance simulation comparison when N = 3 IV. SIMULATION RESULTS We have shown that how to generalize conventional CRT to solve the ambiguity resolution problems. The most ideal estimation we can expect is that the reconstruction error is linear to the residue error, since when m l > X i, the samples r il should be of X i itself. In the following simulation, a robust estimation is defined as that X i X i 3 4N are satisfied for i = 1,,..., N. We assume that il are independent and identically distributed and follow a normal distribution N(0, σ ) where SNR = 0 log 10 σ. In the simulation, we set N =, K = 4, L = 6 and N = 3, K = 6, L = 10 respectively where SNR is ranged from 60dB to 10dB. The results are shown in Fig 5 and 6, which verify that the proposed scheme bring considerable improvement in strengthening the robustness. V. CONCLUSION In this paper, the first robust Chinese Remainder Theorem tolerating arbitrary errors for multiple numbers has been proposed. Various optimizations have been developed to both reduce the computational complexity and improve the robustness performance to further widen applications of RCRTMN.

10 10 REFERENCES [1] Oded Goldreich, Dana Ron, and Madhu Sudan. Chinese remaindering with errors. In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pages ACM, [] Venkatesan Guruswami, Amit Sahai, and Madhu Sudan. soft-decision decoding of chinese remainder codes. In Foundations of Computer Science, 000. Proceedings. 41st Annual Symposium on, pages IEEE, 000. [3] Xiaoping Li, Wenjie Wang, Weile Zhang, and Yunhe Cao. Phase-detection-based range estimation with robust chinese remainder theorem. IEEE Transactions on Vehicular Technology, 65(1): , 016. [4] A Maroosi and H Khaleghi Bizaki. Multiple frequencies determination of sinusoidal real waveform by multiple sensors with low sampling rate. Sensors, 18954:1, 017. [5] Chen Wang, Qinye Yin, and Hongyang Chen. Robust chinese remainder theorem ranging method based on dual-frequency measurements. IEEE Transactions on Vehicular Technology, 60(8): , 011. [6] Wenjie Wang, Xiaoping Li, Wei Wang, and Xiang-Gen Xia. Maximum likelihood estimation based robust chinese remainder theorem for real numbers and its fast algorithm. IEEE Transactions on Signal Processing, 63(13): , 015. [7] Hanshen Xiao, Hari Krishna Garg, Jianhao Hu, and Guoqiang Xiao. New error control algorithms for residue number system codes. ETRI Journal, 38():36 336, 016. [8] Hanshen Xiao, Huang Yufeng, Yu Ye, and Guoqiang Xiao. Robustness in chinese remainder theorem for multiple numbers and remainder coding. IEEE Transactions on Signal Processing, accepted( [9] Li Xiao and Xiang-Gen Xia. A new robust chinese remainder theorem with improved performance in frequency estimation from undersampled waveforms. Signal Processing, 117:4 46, 015. [10] Li Xiao and Xiang-Gen Xia. Frequency determination from truly sub-nyquist samplers based on robust chinese remainder theorem. Signal Processing, 018. [11] Li Xiao, Xiang-Gen Xia, and Haiye Huo. Towards robustness in residue number systems. IEEE Transactions on Signal Processing, 65(6): , 017. [1] Li Xiao, Xiang-Gen Xia, and Wenjie Wang. Multi-stage robust chinese remainder theorem. IEEE Transactions on Signal Processing, 6(18): , 014. [13] Yue Zhang, Wangdong Qi, Guangxia Li, and Su Zhang. Performance of ml range estimator in radio interferometric positioning systems. IEEE Signal Processing Letters, ():16 166, 015. [14] Hanshen Xiao and Guoqiang Xiao. Notes on CRT-based robust frequency estimation Signal Processing, 133:13 17, 017.

Multi-Stage Robust Chinese Remainder Theorem

Multi-Stage Robust Chinese Remainder Theorem 4772 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 62, NO 18, SEPTEMBER 15, 2014 Multi-Stage Robust Chinese Remainder Theorem Li Xiao, Xiang-Gen Xia, Fellow, IEEE, Wenjie Wang, Member, IEEE Abstract It is

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

Computing over Z, Q, K[X]

Computing over Z, Q, K[X] Computing over Z, Q, K[X] Clément PERNET M2-MIA Calcul Exact Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors

Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors 1 Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors Li Xiao and Xiang-Gen Xia arxiv:1703.07907v1 [cs.it] 23 Mar 2017 Abstract Based on unique

More information

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples

More information

Chinese Remainder Theorem explained with rotations

Chinese Remainder Theorem explained with rotations Chinese Remainder Theorem explained with rotations Reference: Antonella Perucca, The Chinese Remainder Clock, The College Mathematics Journal, 2017, Vol. 48, No. 2, pp. 82-89. 2 One step-wise rotation

More information

Soft-decision Decoding of Chinese Remainder Codes

Soft-decision Decoding of Chinese Remainder Codes Soft-decision Decoding of Chinese Remainder Codes Venkatesan Guruswami Amit Sahai Ý Madhu Sudan Þ Abstract Given Ò relatively prime integers Ô Ô Ò and an integer Ò, the Chinese Remainder Code, ÊÌ É ÔÔÒ,

More information

Research Article Computationally Efficient Robust Chinese Remainder Theorem for Frequency Estimation from Undersampled Waveforms

Research Article Computationally Efficient Robust Chinese Remainder Theorem for Frequency Estimation from Undersampled Waveforms athematical Problems in Engineering Volume 2013, Article ID 413431, 6 pages http://dx.doi.org/10.1155/2013/413431 Research Article Computationally Efficient Robust Chinese Remainder Theorem for Frequency

More information

Asymptotic redundancy and prolixity

Asymptotic redundancy and prolixity Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Notes on Systems of Linear Congruences

Notes on Systems of Linear Congruences MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the

More information

Deterministic Approximation Algorithms for the Nearest Codeword Problem

Deterministic Approximation Algorithms for the Nearest Codeword Problem Deterministic Approximation Algorithms for the Nearest Codeword Problem Noga Alon 1,, Rina Panigrahy 2, and Sergey Yekhanin 3 1 Tel Aviv University, Institute for Advanced Study, Microsoft Israel nogaa@tau.ac.il

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of

More information

Optimization of new Chinese Remainder theorems using special moduli sets

Optimization of new Chinese Remainder theorems using special moduli sets Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

Clearly C B, for every C Q. Suppose that we may find v 1, v 2,..., v n

Clearly C B, for every C Q. Suppose that we may find v 1, v 2,..., v n 10. Algebraic closure Definition 10.1. Let K be a field. The algebraic closure of K, denoted K, is an algebraic field extension L/K such that every polynomial in K[x] splits in L. We say that K is algebraically

More information

Oscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients. Contents

Oscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients. Contents Bol. Soc. Paran. Mat. (3s.) v. 21 1/2 (2003): 1 12. c SPM Oscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients Chuan-Jun Tian and Sui Sun Cheng abstract:

More information

Adaptive decoding for dense and sparse evaluation/interpolation codes

Adaptive decoding for dense and sparse evaluation/interpolation codes Adaptive decoding for dense and sparse evaluation/interpolation codes Clément PERNET INRIA/LIG-MOAIS, Grenoble Université joint work with M. Comer, E. Kaltofen, J-L. Roch, T. Roche Séminaire Calcul formel

More information

Unit 2, Section 3: Linear Combinations, Spanning, and Linear Independence Linear Combinations, Spanning, and Linear Independence

Unit 2, Section 3: Linear Combinations, Spanning, and Linear Independence Linear Combinations, Spanning, and Linear Independence Linear Combinations Spanning and Linear Independence We have seen that there are two operations defined on a given vector space V :. vector addition of two vectors and. scalar multiplication of a vector

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Security Level of Cryptography Integer Factoring Problem (Factoring N = p 2 q) December Summary 2

Security Level of Cryptography Integer Factoring Problem (Factoring N = p 2 q) December Summary 2 Security Level of Cryptography Integer Factoring Problem (Factoring N = p 2 ) December 2001 Contents Summary 2 Detailed Evaluation 3 1 The Elliptic Curve Method 3 1.1 The ECM applied to N = p d............................

More information

Spatial Navigation. Zaneta Navratilova and Mei Yin. March 6, Theoretical Neuroscience Journal Club University of Arizona

Spatial Navigation. Zaneta Navratilova and Mei Yin. March 6, Theoretical Neuroscience Journal Club University of Arizona Theoretical Neuroscience Journal Club University of Arizona March 6, 2008 Based on the observation that dmec stores only modulo information about rat position, we suggest that dmec may be encoding and

More information

The τ-skyline for Uncertain Data

The τ-skyline for Uncertain Data CCCG 2014, Halifax, Nova Scotia, August 11 13, 2014 The τ-skyline for Uncertain Data Haitao Wang Wuzhou Zhang Abstract In this paper, we introduce the notion of τ-skyline as an alternative representation

More information

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we

More information

Fault-Tolerant Consensus

Fault-Tolerant Consensus Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process

More information

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Alexander May, Maike Ritzenhofen Faculty of Mathematics Ruhr-Universität Bochum, 44780 Bochum,

More information

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

The Pros and Cons of Compressive Sensing

The Pros and Cons of Compressive Sensing The Pros and Cons of Compressive Sensing Mark A. Davenport Stanford University Department of Statistics Compressive Sensing Replace samples with general linear measurements measurements sampled signal

More information

Residue Number Systems Ivor Page 1

Residue Number Systems Ivor Page 1 Residue Number Systems 1 Residue Number Systems Ivor Page 1 7.1 Arithmetic in a modulus system The great speed of arithmetic in Residue Number Systems (RNS) comes from a simple theorem from number theory:

More information

The Pros and Cons of Compressive Sensing

The Pros and Cons of Compressive Sensing The Pros and Cons of Compressive Sensing Mark A. Davenport Stanford University Department of Statistics Compressive Sensing Replace samples with general linear measurements measurements sampled signal

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

THE CLOSED-POINT ZARISKI TOPOLOGY FOR IRREDUCIBLE REPRESENTATIONS. K. R. Goodearl and E. S. Letzter

THE CLOSED-POINT ZARISKI TOPOLOGY FOR IRREDUCIBLE REPRESENTATIONS. K. R. Goodearl and E. S. Letzter THE CLOSED-POINT ZARISKI TOPOLOGY FOR IRREDUCIBLE REPRESENTATIONS K. R. Goodearl and E. S. Letzter Abstract. In previous work, the second author introduced a topology, for spaces of irreducible representations,

More information

Perfect Sorting by Reversals and Deletions/Insertions

Perfect Sorting by Reversals and Deletions/Insertions The Ninth International Symposium on Operations Research and Its Applications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 512 518 Perfect Sorting by Reversals

More information

On the Complexity of Error Detection Functions for Redundant Residue Number Systems

On the Complexity of Error Detection Functions for Redundant Residue Number Systems On the Complexity of Error Detection Functions for Redundant Residue Number Systems Tsutomu Sasao 1 and Yukihiro Iguchi 2 1 Dept. of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka

More information

Geometric Optimization Problems over Sliding Windows

Geometric Optimization Problems over Sliding Windows Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Testing Problems with Sub-Learning Sample Complexity

Testing Problems with Sub-Learning Sample Complexity Testing Problems with Sub-Learning Sample Complexity Michael Kearns AT&T Labs Research 180 Park Avenue Florham Park, NJ, 07932 mkearns@researchattcom Dana Ron Laboratory for Computer Science, MIT 545 Technology

More information

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures

The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures HE et al.: THE MM-PEGA/MM-QC-PEGA DESIGN THE LDPC CODES WITH BETTER CYCLE-STRUCTURES 1 arxiv:1605.05123v1 [cs.it] 17 May 2016 The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 4, pp , August

c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 4, pp , August SIAM J COMPUT c 1998 Society for Industrial and Applied Mathematics Vol 27, No 4, pp 173 182, August 1998 8 SEPARATING EXPONENTIALLY AMBIGUOUS FINITE AUTOMATA FROM POLYNOMIALLY AMBIGUOUS FINITE AUTOMATA

More information

On Detecting Multiple Faults in Baseline Interconnection Networks

On Detecting Multiple Faults in Baseline Interconnection Networks On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,

More information

A Note on the Density of the Multiple Subset Sum Problems

A Note on the Density of the Multiple Subset Sum Problems A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,

More information

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity Universität zu Lübeck Institut für Theoretische Informatik Lecture notes on Knowledge-Based and Learning Systems by Maciej Liśkiewicz Lecture 5: Efficient PAC Learning 1 Consistent Learning: a Bound on

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

7 The structure of graphs excluding a topological minor

7 The structure of graphs excluding a topological minor 7 The structure of graphs excluding a topological minor Grohe and Marx [39] proved the following structure theorem for graphs excluding a topological minor: Theorem 7.1 ([39]). For every positive integer

More information

On the correlation of parity and small-depth circuits

On the correlation of parity and small-depth circuits Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Lecture 28: Generalized Minimum Distance Decoding

Lecture 28: Generalized Minimum Distance Decoding Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 8: Generalized Minimum Distance Decoding November 5, 007 Lecturer: Atri Rudra Scribe: Sandipan Kundu & Atri Rudra 1

More information

On Syndrome Decoding of Chinese Remainder Codes

On Syndrome Decoding of Chinese Remainder Codes On Syndrome Decoding of Chinese Remainder Codes Wenhui Li Institute of, June 16, 2012 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2012) Pomorie, Bulgaria Wenhui

More information

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 41 Pulse Code Modulation (PCM) So, if you remember we have been talking

More information

2 A Fourier Transform for Bivariate Functions

2 A Fourier Transform for Bivariate Functions Stanford University CS59Q: Quantum Computing Handout 0 Luca Trevisan October 5, 0 Lecture 0 In which we present a polynomial time quantum algorithm for the discrete logarithm problem. The Discrete Log

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Introduction to Decision Sciences Lecture 10

Introduction to Decision Sciences Lecture 10 Introduction to Decision Sciences Lecture 10 Andrew Nobel October 17, 2017 Mathematical Induction Given: Propositional function P (n) with domain N + Basis step: Show that P (1) is true Inductive step:

More information

6 Cosets & Factor Groups

6 Cosets & Factor Groups 6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.

More information

Lecture 6: Expander Codes

Lecture 6: Expander Codes CS369E: Expanders May 2 & 9, 2005 Lecturer: Prahladh Harsha Lecture 6: Expander Codes Scribe: Hovav Shacham In today s lecture, we will discuss the application of expander graphs to error-correcting codes.

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Multipath Matching Pursuit

Multipath Matching Pursuit Multipath Matching Pursuit Submitted to IEEE trans. on Information theory Authors: S. Kwon, J. Wang, and B. Shim Presenter: Hwanchol Jang Multipath is investigated rather than a single path for a greedy

More information

CHAPTER 6. Prime Numbers. Definition and Fundamental Results

CHAPTER 6. Prime Numbers. Definition and Fundamental Results CHAPTER 6 Prime Numbers Part VI of PJE. Definition and Fundamental Results 6.1. Definition. (PJE definition 23.1.1) An integer p is prime if p > 1 and the only positive divisors of p are 1 and p. If n

More information

Error Correcting Codes Prof. Dr. P. Vijay Kumar Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

Error Correcting Codes Prof. Dr. P. Vijay Kumar Department of Electrical Communication Engineering Indian Institute of Science, Bangalore (Refer Slide Time: 00:15) Error Correcting Codes Prof. Dr. P. Vijay Kumar Department of Electrical Communication Engineering Indian Institute of Science, Bangalore Lecture No. # 03 Mathematical Preliminaries:

More information

Perfect Two-Fault Tolerant Search with Minimum Adaptiveness 1

Perfect Two-Fault Tolerant Search with Minimum Adaptiveness 1 Advances in Applied Mathematics 25, 65 101 (2000) doi:10.1006/aama.2000.0688, available online at http://www.idealibrary.com on Perfect Two-Fault Tolerant Search with Minimum Adaptiveness 1 Ferdinando

More information

Elementary Loops Revisited

Elementary Loops Revisited Elementary Loops Revisited Jianmin Ji a, Hai Wan b, Peng Xiao b, Ziwei Huo b, and Zhanhao Xiao c a School of Computer Science and Technology, University of Science and Technology of China, Hefei, China

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Lecture 5. 1 Review (Pairwise Independence and Derandomization)

Lecture 5. 1 Review (Pairwise Independence and Derandomization) 6.842 Randomness and Computation September 20, 2017 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Tom Kolokotrones 1 Review (Pairwise Independence and Derandomization) As we discussed last time, we can

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

REFERENCES. A Sharpened Dynamic Range of a Generalized Chinese Remainder Theorem for Multiple Integers

REFERENCES. A Sharpened Dynamic Range of a Generalized Chinese Remainder Theorem for Multiple Integers 428 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 1, JANUARY 2007 ACKNOWLEDGMENT The authors wish to thank the reviewers for their helpful suggestions. REFERENCES [1] J. Proakis, Digital Communications.

More information

On the Number of Cycles in a Graph

On the Number of Cycles in a Graph arxiv:603.0807v [cs.dm] 6 Mar 206 On the Number of Cycles in a Graph Bader AlBdaiwi bdaiwi@cs.ku.edu.kw Computer Science Department, Kuwait University, P.O. Box 5969 AlSafat, 3060 Kuwait October 5, 208

More information

Modal and temporal logic

Modal and temporal logic Modal and temporal logic N. Bezhanishvili I. Hodkinson C. Kupke Imperial College London 1 / 83 Overview Part II 1 Soundness and completeness. Canonical models. 3 lectures. 2 Finite model property. Filtrations.

More information

Zaslavsky s Theorem. As presented by Eric Samansky May 11, 2002

Zaslavsky s Theorem. As presented by Eric Samansky May 11, 2002 Zaslavsky s Theorem As presented by Eric Samansky May, 2002 Abstract This paper is a retelling of the proof of Zaslavsky s Theorem. For any arrangement of hyperplanes, there is a corresponding semi-lattice

More information

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory Part V 7 Introduction: What are measures and why measurable sets Lebesgue Integration Theory Definition 7. (Preliminary). A measure on a set is a function :2 [ ] such that. () = 2. If { } = is a finite

More information

On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes

On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes Venkata Gandikota Purdue University vgandiko@purdue.edu Badih Ghazi MIT badih@mit.edu Elena Grigorescu Purdue University elena-g@purdue.edu

More information

Approximate Map Labeling. is in (n log n) Frank Wagner* B 93{18. December Abstract

Approximate Map Labeling. is in (n log n) Frank Wagner* B 93{18. December Abstract SERIE B INFORMATIK Approximate Map Labeling is in (n log n) Frank Wagner* B 93{18 December 1993 Abstract Given n real numbers, the -CLOSENESS problem consists in deciding whether any two of them are within

More information

Lecture Examples of problems which have randomized algorithms

Lecture Examples of problems which have randomized algorithms 6.841 Advanced Complexity Theory March 9, 2009 Lecture 10 Lecturer: Madhu Sudan Scribe: Asilata Bapat Meeting to talk about final projects on Wednesday, 11 March 2009, from 5pm to 7pm. Location: TBA. Includes

More information

RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS

RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS WILL JOHNSON Abstract. We consider the problem of recovering nonlinear conductances in a circular planar graph. If the graph is critical

More information

ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS.

ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS. 17th European Signal Processing Conference (EUSIPCO 009) Glasgow, Scotland, August 4-8, 009 ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS. Sandra Roger, Alberto Gonzalez,

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

A Lower Bound Technique for Restricted Branching Programs and Applications

A Lower Bound Technique for Restricted Branching Programs and Applications A Lower Bound Technique for Restricted Branching Programs and Applications (Extended Abstract) Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany woelfel@ls2.cs.uni-dortmund.de

More information

Partial LLL Reduction

Partial LLL Reduction Partial Reduction Xiaohu Xie School of Computer Science McGill University Montreal, Quebec, Canada H3A A7 Email: xiaohu.xie@mail.mcgill.ca Xiao-Wen Chang School of Computer Science McGill University Montreal,

More information

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA. GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES DESIGN OF A QUINARY TO RESIDUE NUMBER SYSTEM CONVERTER USING MULTI-LEVELS OF CONVERSION Hassan Amin Osseily Electrical and Electronics Department,

More information

Hardness of the Covering Radius Problem on Lattices

Hardness of the Covering Radius Problem on Lattices Hardness of the Covering Radius Problem on Lattices Ishay Haviv Oded Regev June 6, 2006 Abstract We provide the first hardness result for the Covering Radius Problem on lattices (CRP). Namely, we show

More information

All Good (Bad) Words Consisting of 5 Blocks

All Good (Bad) Words Consisting of 5 Blocks Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series

More information

Computing Error Distance of Reed-Solomon Codes

Computing Error Distance of Reed-Solomon Codes Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics

More information

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2 8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose

More information

On Two Probabilistic Decoding Algorithms for Binary Linear Codes

On Two Probabilistic Decoding Algorithms for Binary Linear Codes On Two Probabilistic Decoding Algorithms for Binary Linear Codes Miodrag Živković Abstract A generalization of Sullivan inequality on the ratio of the probability of a linear code to that of any of its

More information

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT Feng Lin, Robert C. Qiu, James P. Browning, Michael C. Wicks Cognitive Radio Institute, Department of Electrical and Computer

More information

Lecture 10 February 4, 2013

Lecture 10 February 4, 2013 UBC CPSC 536N: Sparse Approximations Winter 2013 Prof Nick Harvey Lecture 10 February 4, 2013 Scribe: Alexandre Fréchette This lecture is about spanning trees and their polyhedral representation Throughout

More information

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2 CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the

More information

Algorithms (II) Yu Yu. Shanghai Jiaotong University

Algorithms (II) Yu Yu. Shanghai Jiaotong University Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:

More information