Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Size: px
Start display at page:

Download "Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE"

Transcription

1 Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações Potifícia Uiversidade Católica do Rio de Jaeiro, Rua Marquês de São Vicete, Rio de Jaeiro, RJ - Brazil {dailo, weiler}@cetuc.puc-rio.br Abstract Permutatio codes are a class of vector quatizers with a codebook structure based o permutatios. Their mai advatage is to geerate a fixed-rate output, thus avoidig the eed of etropy codig ad bufferig strategies typical of etropy-costraied quatizers. This paper deals with the extesio of (scalar) permutatio codes to the vector case. We have show that vector permutatio codes with log block-legth are asymptotically equivalet to etropy-costraied vector quatizers, i the rate-distortio sese. Based o this coectio we propose a algorithm for geeratig good vector permutatio codes. We preset results for uiform ad Gaussia sources which cofirm that VPC s achieve performace similar to ECVQ; i particular, they are superior to optimum ECSQ ad SPC s. 1. INTRODUCTION A permutatio code for source compressio is a vector quatizer with a codebook cosistig of all the distict permutatios of a referece codeword. The mai advatage of a permutatio code is the geeratio of a fixed-rate output by meas of a simple ecodig operatio [1], thus avoidig the eed of etropy codig ad bufferig strategies. Sice its itroductio i 1965 [2], the theory of permutatio codes has always cosidered the codewords to be composed by scalar elemets, ad, although simple to ecode, these (scalar) permutatio codes have a performace that is tied to that of etropy-costraied scalar quatizers (ECSQ) [1]. A recet paper [3] exteds this idea of scalar permutatio codes (SPC) to a higher-dimesioal case, where the codewords are composed by vectors, ad also provides a umerical method for costructig the referece codeword (uder the assumptio that aother parameter called the compositio vector is give). This work was partially supported by the Brazilia Natioal Research Coucil (CNPq). I the preset paper we show that the performace of vector permutatio codes (VPC) asymptotically approaches that of etropy-costraied vector quatizers (ECVQ). Based o this coectio we propose a algorithm for desigig of compositio vector which, combied with the codebook desig algorithm, provides a complete VPC desig procedure. We also exhibit some results for uiform ad Gaussia sources evidecig that VPC s (desiged by the proposed method) ca achieve better performaces tha ECSQ ad SPC. This paper is orgaized as follows. Sectio 2 presets the defiitios of vector permutatio codes. I sectio 3, a theorem is prove o the asymptotically equivalece of VPC ad ECVQ. A procedure for VPC desig is proposed i Sectio 4. Our experimetal results are show i Sectio 5, ad Sectio 6 presets the coclusios of this work. 2. VECTOR PERMUTATION CODES A L-dimesioal vector permutatio code is a structured fixed-rate vector quatizer of block-legth L, with a codebook C[y 0 ] = {y l } M 1 l=0 cosistig of all the distict permutatios of a referece codeword y 0 = (µ 1,..., µ }{{} 1, µ 2,..., µ }{{} 2 1 2,..., µ K,..., µ K }{{} K ) (1) of legth whose elemets are L-dimesioal vectors i R L. The sets {µ i } K i=1 ad { i} K i=1 are called, respectively, the user alphabet ad the compositio vector. The rate of this code, i bits per scalar sample, is where R = 1 log M (2) L M = is the size of the codebook.! K i=1 i! (3) 753

2 With the optimal ecodig scheme, a source vector x = (x 1... x ), x m R L, is reproduced by the permutatio of y 0 that is closer to x, i.e., by the codeword π(y 0 : x) = arg mi d(x, y), (4) y C[y 0] where d(x, y) is the per-sample distortio betwee x ad y. The average per-sample distortio of the overall scheme is thus D = E[d(X, π(y 0 : X))]. (5) If the distortio measure is the squared-error criterio, the D = 1 L E[ X, π(y 0 : X) 2 ]. (6) 3. EQUIVALENCE OF VPC AND ECVQ Cosider a L-dimesioal ECVQ with a cardiality K codebook. Its ecodig rule maps the source vector x R L to the codeword that miimizes a weighted sum of distortio ad output etropy [4]. Thus a optimal ECVQ ca be characterized by a set of codewords {µ i } K i=1 ad their correspodig probabilities {p i} K i=1. Now the followig theorem establishes the asymptotical equivalece of VPC ad ECVQ. Theorem 1: Let X be a L-dimesioal radom vector, ad let {X m } be a sequece of i.i.d. radom vectors with the same distributio as X. Assume that the distortio measure is a metric. For ay give ECVQ ({µ i } K i=1, {p i} K i=1 ) such that both K ad max i,j d(µ i, µ j ) are fiite, ad for ay give ɛ > 0, if the ECVQ ecodes X with rate R ad distortio D, the there exists a sequece {C } of L-dimesioal VPC s of block legth, = 1, 2,..., that ecode X = (X 1,..., X ) with correspodig rates R ad per-sample average distortios D that satisfy both lim R = R ad lim D D + ɛ. Proof: For all, set the VPC user alphabet equal to the ECVQ codebook {µ i } K i=1, ad let the VPC compositio vector { i } K i=1 be chose i such a way that lim i = p i. By the Stirlig s formula, it follows easily that lim R = 1 L K p i log p i = R. (7) i=1 Let ow Y be the sequece of ECVQ codewords geerated by ecodig each compoet of X with ECVQ. Thus, Y is a sequece of symbols draw i.i.d from a alphabet Y = {µ i } K i=1 accordig to a distributio {p i } K i=1. Let N(µ i Y ) be the umber of occurreces of µ i i Y, ad defie the set of strogly typical sequeces [5, p.288] T () = {Y Y : N(µ i Y ) p i <, i = 1,..., K}. (8) Note that if Y T (), the it must differ from oe of the VPC codewords i at most r K( +1) symbols. Now cosider the followig approach to VPC ecodig: if for ay i, N(µ i Y ) > i, the a ew sequece is geerated from Y by arbitrarily replacig oe µ i by some µ j for which N(µ j Y ) < j. This procedure is repeatedly applied to the ew sequece util o further substitutio is required. By defiitio, the resultig sequece Z will be a VPC codeword. Next, we obtai the average distortio for this scheme. The per-sample distortio betwee sequeces is d(x, Z ) = 1 d(x j, Z j ) (9) j=1 where d(x j, Z j ) is the per-sample distortio betwee the symbols X j ad Z j. Also, sice d(, ) satisfies the triagle iequality, we have: D = E [d(x, Z )] E [d(x, Y )] + E [d(y, Z )] = D + D (10) where D is the pealty (icrease i distortio) paid for ecodig with VPC istead of ECVQ. To evaluate D, we first obtai a boud o d(y, Z ): d(y, Z ) = 1 d(y j, Z j ) j=1 r d max, d max, if Y T () if Y / T () (11) where d max = max i,j d(µ i, µ j ) is a determiistic costat. If we let A be the evet {Y T () }, the D ca be writte as D = E [ d(y, Z ) ] A P (A ) +E [ d(y, Z ) ] A P ( A ) (12) Substitutig (11) ad the boud o r, we obtai D K( + 1) d max P (A ) + d max P ( A ) (13) ad, by the law of large umbers, Fially, we have lim D Kd max = ɛ. (14) lim D D + lim D D + ɛ (15) ad the proof is complete. 754

3 4. VPC DESIGN ALGORITHM 4.1. Codebook Desig The user alphabet ad the compositio vector sets are the two parameters that specify a VPC. Cosiderig sources that ca be characterized by a traiig set T = {x (1),..., x (t),..., x (T ) }, (16) a Lloyd-like algorithm ca be used for (locally) optimum codebook desig, if the compositio vector is give. Such algorithm appeared i [3] ad is reproduced below: Codebook Desig Algorithm 1. Iput { i } K i=1 ad the iitial {µ i} K i=1. 2. Set S i = i j=1 j. 3. Calculate 1 : a) y 0 = (µ 1,..., µ 1,..., µ K,..., µ K ) b) z = (z 1... z ) = 1 T T t=1 π(x(t) : y 0 ) c) µ i = 1 i Si j=1+s i 1 z j 4. Repeat step 3 util {µ i } K i=1 coverges. 5. Doe Compositio Vector Desig Fidig good permutatio codes amouts thus to fidig good compositio vectors a problem which, due to the overwhelmig umber of such vectors, is ot practical to be solved with a exhaustive search. The followig algorithm makes use of the derived relatioship betwee VPC ad ECVQ to facilitate this task. VPC Desig Algorithm 1. Iput, L, K, ad a target rate R. 2. Desig a L-dimesioal ECVQ with K codewords for a rate R, thus obtaiig a codebook {µ i } K i=1 with codeword probabilities {p i} K i=1. 3. Set i p i with a appropriate roudig rule. 4. Set {µ i } K i=1 as the iitial VPC user alphabet. 5. Update the user alphabet with the Codebook Desig Algorithm. 6. Doe. 1 Oe should otice that π(x (t) : y 0 ) meas that x (t) is to be permuted with respect to y Complexity If is sufficietly large, the 5th step i the above algorithm ca be omitted without compromisig the attaiable distortio. With this modificatio, the complexity of the VPC desig equals that of a ECVQ desig. O the other had, if the algorithm of sectio 4.1 must be used, the overall complexity will deped o that of the ecodig operatio (4). Equatio (4) ca be recogized as the optimal solutio to a weighted bipartite matchig problem which, for L 2, has a complexity of O( 2 log ) [6]. This is substatially differet from the special case L = 1 (SPC), where the ecodig operatio is a simple sortig procedure, with complexity O( log ) [7]. If the optimal VPC ecodig is prohibitive for a applicatio, a sub-optimal but less complex procedure ca be pursued. Oe such possibility, as give i Theorem 1, is to perform the VPC ecodig by firstly geeratig the sequece Y with ECVQ ecodig, the arbitrarily replacig the exceedig symbols i order to covert it to a VPC codeword. The complexity of this scheme is oly liear with, ad the resultig icrease i distortio is egligible whe is large. 5. EXPERIMENTAL RESULTS This sectio presets some results obtaied with the proposed method of sectio 4.2 for VPC desig ad the optimal ecodig operatio whe assessig the performace. Fig. 1 shows a compariso betwee VPC s of various dimesios ad the optimum ECSQ for a uiform memoryless source with a squared-error distortio measure. I each curve, the VPC s were obtaied for various values of parameters K ad (up to = 100 for L = 10). The rate-distortio fuctio is also plotted i the figure. We use traiig ad test sequeces of samples each, ad the geeralized Lloyd algorithm for the ECVQ desig. Therefore, all VPC s i this figure were actually obtaied from full rate VQ s (or ECVQ s with λ = 0 i the otatio of [4]). Figs. 2, 3 ad 4 show aalogous comparisos for a Gaussia memoryless source. Here we used the Chou et al. s iterative algorithm for ECVQ desig [4]. The figures also show the performaces of the obtaied ECVQ s; for each of them, a correspodig VPC was desiged without codebook updatig, ad its performace was calculated. Traiig ad test sequeces of L-dimesioal samples were used i the simulatios. Performace of SPC is ot show i the figure, but, as reported by Berger [7], its curve is kow to lie above that of the optimum ECSQ. As it ca be see i Fig. 3, the performace of VPC improves whe block-legth is icreased. The fact that 755

4 0.07 ECVQ (L = 2) Distortio Fuctio 0.06 SPC Distortio 0.05 VPC (L = 3) Distortio = 500 = 100 = VPC (L = 10) 0.03 Distortio Fuctio Figure 1: Compariso betwee VPC s with L = 1, 2, 3 ad 10 ad the optimum ECSQ for a uiforme source. Figure 3: Performace of a 2-dimesioal VPC versus block-legth. ECVQ (L = 2) Distortio Fuctio ECVQ (L = 3) VPC (L = 3) Distortio Fuctio Distortio Distortio Figure 2: Compariso betwee 2-dimesioal VPC ad ECVQ for a Gaussia source. The performace of the optimum ECSQ is also show. for Gaussia sources we have actually obtaied VPC s with better performace tha ECVQ is probably 2 because the use of Chou et al. s algorithm results, i geeral, i ECVQ s which are ot globally optimal [8]. 6. CONCLUSIONS The theory of permutatio codes has bee exteded to the vector case. It is a kow fact that the perfor- 2 However, it should be emphasized that the Theorem costructio was based o sub-optimal VPC ecodig, ad o coverse was prove. Therefore, it remais a ope questio whether the performace of optimum VPC ca surpass that of optimum ECVQ or ot. Figure 4: Compariso betwee 3-dimesioal VPC ad ECVQ for a Gaussia source. The performace of the optimum ECSQ is also show. mace of scalar permutatio codes approaches that of ECSQ whe block-legth teds to ifiity. I this paper, we prove the vector couterpart: the asymptotical equivalece of vector permutatio codes ad ECVQ. This coectio is ot oly theoretical, but it provides us with a practical scheme for the desig of VPC s. By meas of the desig algorithm preseted, we have obtaied some rate-distortio poits for uiform ad Gaussia sources which show that VPC s with fiite block-legth ca be as good as ECVQ at low to medium rates. We are curretly ivestigatig techiques to improve the performace of VPC s for small block-legth. 756

5 Refereces [1] T. Berger, Optimum quatizers ad permutatio codes, IEEE Trasactios o Iformatio Theory, vol. 18, pp , [2] D. Slepia, Permutatio modulatio, Proceedigs of the IEEE, vol. 53, pp , [3] W. A. Fiamore, S. V. B. Bruo, ad D. Silva, Vector permutatio ecodig for the uiform sources, Proc. of the Data Compressio Coferece, p. 539, March [4] P. A. Chou, T. Lookabaugh, ad R. M. Gray, Etropy costraied vector quatizatio, IEEE Trasactios o Iformatio Theory, vol. 37, pp , [5] T. M. Cover ad J. A. Thomas, Elemets of Iformatio Theory. New York: Wiley, [6] A. V. Goldberg ad R. Keedy, A efficiet cost scalig algorithm for the assigemet problem, tech report, Staford uiversity, CS Departmet, Staford, CA, May [7] T. Berger, F. Jeliek, ad J. K. Wolf, Permutatio codes for sources, IEEE Trasactios o Iformatio Theory, vol. 18, pp , [8] J. C. Kieffer, A survey of the theory of source codig with a fidelity criterio, IEEE Trasactios o Iformatio Theory, vol. 39, pp ,

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Math 312 Lecture Notes One Dimensional Maps

Math 312 Lecture Notes One Dimensional Maps Math 312 Lecture Notes Oe Dimesioal Maps Warre Weckesser Departmet of Mathematics Colgate Uiversity 21-23 February 25 A Example We begi with the simplest model of populatio growth. Suppose, for example,

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

1.3 Convergence Theorems of Fourier Series. k k k k. N N k 1. With this in mind, we state (without proof) the convergence of Fourier series.

1.3 Convergence Theorems of Fourier Series. k k k k. N N k 1. With this in mind, we state (without proof) the convergence of Fourier series. .3 Covergece Theorems of Fourier Series I this sectio, we preset the covergece of Fourier series. A ifiite sum is, by defiitio, a limit of partial sums, that is, a cos( kx) b si( kx) lim a cos( kx) b si(

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

NUMERICAL METHODS FOR SOLVING EQUATIONS

NUMERICAL METHODS FOR SOLVING EQUATIONS Mathematics Revisio Guides Numerical Methods for Solvig Equatios Page 1 of 11 M.K. HOME TUITION Mathematics Revisio Guides Level: GCSE Higher Tier NUMERICAL METHODS FOR SOLVING EQUATIONS Versio:. Date:

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Machine Learning Brett Bernstein

Machine Learning Brett Bernstein Machie Learig Brett Berstei Week 2 Lecture: Cocept Check Exercises Starred problems are optioal. Excess Risk Decompositio 1. Let X = Y = {1, 2,..., 10}, A = {1,..., 10, 11} ad suppose the data distributio

More information

Random assignment with integer costs

Random assignment with integer costs Radom assigmet with iteger costs Robert Parviaie Departmet of Mathematics, Uppsala Uiversity P.O. Box 480, SE-7506 Uppsala, Swede robert.parviaie@math.uu.se Jue 4, 200 Abstract The radom assigmet problem

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

f(x) dx as we do. 2x dx x also diverges. Solution: We compute 2x dx lim

f(x) dx as we do. 2x dx x also diverges. Solution: We compute 2x dx lim Math 3, Sectio 2. (25 poits) Why we defie f(x) dx as we do. (a) Show that the improper itegral diverges. Hece the improper itegral x 2 + x 2 + b also diverges. Solutio: We compute x 2 + = lim b x 2 + =

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

Commutativity in Permutation Groups

Commutativity in Permutation Groups Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A. Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

Modified Logistic Maps for Cryptographic Application

Modified Logistic Maps for Cryptographic Application Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi

More information

Chapter 2 The Monte Carlo Method

Chapter 2 The Monte Carlo Method Chapter 2 The Mote Carlo Method The Mote Carlo Method stads for a broad class of computatioal algorithms that rely o radom sampligs. It is ofte used i physical ad mathematical problems ad is most useful

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 5

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 5 CS434a/54a: Patter Recogitio Prof. Olga Veksler Lecture 5 Today Itroductio to parameter estimatio Two methods for parameter estimatio Maimum Likelihood Estimatio Bayesia Estimatio Itroducto Bayesia Decisio

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

Intro to Learning Theory

Intro to Learning Theory Lecture 1, October 18, 2016 Itro to Learig Theory Ruth Urer 1 Machie Learig ad Learig Theory Comig soo 2 Formal Framework 21 Basic otios I our formal model for machie learig, the istaces to be classified

More information

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1. Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio

More information

ECE 901 Lecture 14: Maximum Likelihood Estimation and Complexity Regularization

ECE 901 Lecture 14: Maximum Likelihood Estimation and Complexity Regularization ECE 90 Lecture 4: Maximum Likelihood Estimatio ad Complexity Regularizatio R Nowak 5/7/009 Review : Maximum Likelihood Estimatio We have iid observatios draw from a ukow distributio Y i iid p θ, i,, where

More information

Disjoint Systems. Abstract

Disjoint Systems. Abstract Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio

More information

Inequalities for Entropies of Sets of Subsets of Random Variables

Inequalities for Entropies of Sets of Subsets of Random Variables Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4.

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4. 4. BASES I BAACH SPACES 39 4. BASES I BAACH SPACES Sice a Baach space X is a vector space, it must possess a Hamel, or vector space, basis, i.e., a subset {x γ } γ Γ whose fiite liear spa is all of X ad

More information

PERMUTATIONS are fundamental mathematical objects

PERMUTATIONS are fundamental mathematical objects 1 Compressio i the Space of Permutatios Da Wag, Arya Mazumdar, Member, IEEE, ad Gregory W. Worell, Fellow, IEEE of permutatios with certai properties, such as efficiet rak queryig give a elemet, get its

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Lecture 7: October 18, 2017

Lecture 7: October 18, 2017 Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

1 Review and Overview

1 Review and Overview DRAFT a fial versio will be posted shortly CS229T/STATS231: Statistical Learig Theory Lecturer: Tegyu Ma Lecture #3 Scribe: Migda Qiao October 1, 2013 1 Review ad Overview I the first half of this course,

More information

On a Smarandache problem concerning the prime gaps

On a Smarandache problem concerning the prime gaps O a Smaradache problem cocerig the prime gaps Felice Russo Via A. Ifate 7 6705 Avezzao (Aq) Italy felice.russo@katamail.com Abstract I this paper, a problem posed i [] by Smaradache cocerig the prime gaps

More information

Some remarks for codes and lattices over imaginary quadratic

Some remarks for codes and lattices over imaginary quadratic Some remarks for codes ad lattices over imagiary quadratic fields Toy Shaska Oaklad Uiversity, Rochester, MI, USA. Caleb Shor Wester New Eglad Uiversity, Sprigfield, MA, USA. shaska@oaklad.edu Abstract

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Review Problems 1. ICME and MS&E Refresher Course September 19, 2011 B = C = AB = A = A 2 = A 3... C 2 = C 3 = =

Review Problems 1. ICME and MS&E Refresher Course September 19, 2011 B = C = AB = A = A 2 = A 3... C 2 = C 3 = = Review Problems ICME ad MS&E Refresher Course September 9, 0 Warm-up problems. For the followig matrices A = 0 B = C = AB = 0 fid all powers A,A 3,(which is A times A),... ad B,B 3,... ad C,C 3,... Solutio:

More information

Lecture #20. n ( x p i )1/p = max

Lecture #20. n ( x p i )1/p = max COMPSCI 632: Approximatio Algorithms November 8, 2017 Lecturer: Debmalya Paigrahi Lecture #20 Scribe: Yua Deg 1 Overview Today, we cotiue to discuss about metric embeddigs techique. Specifically, we apply

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

6.867 Machine learning, lecture 7 (Jaakkola) 1

6.867 Machine learning, lecture 7 (Jaakkola) 1 6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit

More information

18.440, March 9, Stirling s formula

18.440, March 9, Stirling s formula Stirlig s formula 8.44, March 9, 9 The factorial fuctio! is importat i evaluatig biomial, hypergeometric, ad other probabilities. If is ot too large,! ca be computed directly, by calculators or computers.

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

Fastest mixing Markov chain on a path

Fastest mixing Markov chain on a path Fastest mixig Markov chai o a path Stephe Boyd Persi Diacois Ju Su Li Xiao Revised July 2004 Abstract We ider the problem of assigig trasitio probabilities to the edges of a path, so the resultig Markov

More information

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error Proceedigs of the 6th WSEAS Iteratioal Coferece o SIGNAL PROCESSING, Dallas, Texas, USA, March -4, 7 67 Sesitivity Aalysis of Daubechies 4 Wavelet Coefficiets for Reductio of Recostructed Image Error DEVINDER

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 12

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 12 Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract I this lecture we derive risk bouds for kerel methods. We will start by showig that Soft Margi kerel SVM correspods to miimizig

More information

Complexity of Control on Finite Automata

Complexity of Control on Finite Automata Complexity of Cotrol o Fiite Automata Jea-Charles Delvee Divisio of Applied Mathematics, Uiversité catholique de Louvai, 4, aveue Georges Lemaître, B-1348 Louvai-la-Neuve, Belgium delvee@ima.ucl.ac.be

More information

Arithmetic Distribution Matching

Arithmetic Distribution Matching Arithmetic Distributio Matchig Sebastia Baur ad Georg Böcherer Istitute for Commuicatios Egieerig Techische Uiversität Müche, Germay Email: baursebastia@mytum.de,georg.boecherer@tum.de arxiv:48.393v [cs.it]

More information

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.

More information

Generalized Semi- Markov Processes (GSMP)

Generalized Semi- Markov Processes (GSMP) Geeralized Semi- Markov Processes (GSMP) Summary Some Defiitios Markov ad Semi-Markov Processes The Poisso Process Properties of the Poisso Process Iterarrival times Memoryless property ad the residual

More information

A collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation

A collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation Iteratioal Joural of Mathematics Research. ISSN 0976-5840 Volume 9 Number 1 (017) pp. 45-51 Iteratioal Research Publicatio House http://www.irphouse.com A collocatio method for sigular itegral equatios

More information

Fixed-Threshold Polar Codes

Fixed-Threshold Polar Codes Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge

More information

Q-BINOMIALS AND THE GREATEST COMMON DIVISOR. Keith R. Slavin 8474 SW Chevy Place, Beaverton, Oregon 97008, USA.

Q-BINOMIALS AND THE GREATEST COMMON DIVISOR. Keith R. Slavin 8474 SW Chevy Place, Beaverton, Oregon 97008, USA. INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 2008, #A05 Q-BINOMIALS AND THE GREATEST COMMON DIVISOR Keith R. Slavi 8474 SW Chevy Place, Beaverto, Orego 97008, USA slavi@dsl-oly.et Received:

More information

An Efficient Lloyd-Max Quantizer for Matching Pursuit Decompositions

An Efficient Lloyd-Max Quantizer for Matching Pursuit Decompositions BRAZILVI ITERATIOAL TELECOMMUICATIOS SYMPOSIUM (ITS6), SEPTEMBER 3-6, 6, FORTALEZA-CE, BRAZIL A Efficiet Lloyd-Max Quatizer for Matchig Pursuit Decompositios Lisadro Lovisolo, Eduardo A B da Silva ad Paulo

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 Fuctioal Law of Large Numbers. Costructio of the Wieer Measure Cotet. 1. Additioal techical results o weak covergece

More information

Markov Decision Processes

Markov Decision Processes Markov Decisio Processes Defiitios; Statioary policies; Value improvemet algorithm, Policy improvemet algorithm, ad liear programmig for discouted cost ad average cost criteria. Markov Decisio Processes

More information

Quantile regression with multilayer perceptrons.

Quantile regression with multilayer perceptrons. Quatile regressio with multilayer perceptros. S.-F. Dimby ad J. Rykiewicz Uiversite Paris 1 - SAMM 90 Rue de Tolbiac, 75013 Paris - Frace Abstract. We cosider oliear quatile regressio ivolvig multilayer

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

The Choquet Integral with Respect to Fuzzy-Valued Set Functions

The Choquet Integral with Respect to Fuzzy-Valued Set Functions The Choquet Itegral with Respect to Fuzzy-Valued Set Fuctios Weiwei Zhag Abstract The Choquet itegral with respect to real-valued oadditive set fuctios, such as siged efficiecy measures, has bee used i

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

Lecture 9: Expanders Part 2, Extractors

Lecture 9: Expanders Part 2, Extractors Lecture 9: Expaders Part, Extractors Topics i Complexity Theory ad Pseudoradomess Sprig 013 Rutgers Uiversity Swastik Kopparty Scribes: Jaso Perry, Joh Kim I this lecture, we will discuss further the pseudoradomess

More information

Machine Learning Theory (CS 6783)

Machine Learning Theory (CS 6783) Machie Learig Theory (CS 6783) Lecture 2 : Learig Frameworks, Examples Settig up learig problems. X : istace space or iput space Examples: Computer Visio: Raw M N image vectorized X = 0, 255 M N, SIFT

More information

Mathematical Modeling of Optimum 3 Step Stress Accelerated Life Testing for Generalized Pareto Distribution

Mathematical Modeling of Optimum 3 Step Stress Accelerated Life Testing for Generalized Pareto Distribution America Joural of Theoretical ad Applied Statistics 05; 4(: 6-69 Published olie May 8, 05 (http://www.sciecepublishiggroup.com/j/ajtas doi: 0.648/j.ajtas.05040. ISSN: 6-8999 (Prit; ISSN: 6-9006 (Olie Mathematical

More information

The Phi Power Series

The Phi Power Series The Phi Power Series I did this work i about 0 years while poderig the relatioship betwee the golde mea ad the Madelbrot set. I have fially decided to make it available from my blog at http://semresearch.wordpress.com/.

More information

ON POINTWISE BINOMIAL APPROXIMATION

ON POINTWISE BINOMIAL APPROXIMATION Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece

More information

MAT1026 Calculus II Basic Convergence Tests for Series

MAT1026 Calculus II Basic Convergence Tests for Series MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

7.1 Convergence of sequences of random variables

7.1 Convergence of sequences of random variables Chapter 7 Limit Theorems Throughout this sectio we will assume a probability space (, F, P), i which is defied a ifiite sequece of radom variables (X ) ad a radom variable X. The fact that for every ifiite

More information

Empirical Process Theory and Oracle Inequalities

Empirical Process Theory and Oracle Inequalities Stat 928: Statistical Learig Theory Lecture: 10 Empirical Process Theory ad Oracle Iequalities Istructor: Sham Kakade 1 Risk vs Risk See Lecture 0 for a discussio o termiology. 2 The Uio Boud / Boferoi

More information

Jacob Hays Amit Pillay James DeFelice 4.1, 4.2, 4.3

Jacob Hays Amit Pillay James DeFelice 4.1, 4.2, 4.3 No-Parametric Techiques Jacob Hays Amit Pillay James DeFelice 4.1, 4.2, 4.3 Parametric vs. No-Parametric Parametric Based o Fuctios (e.g Normal Distributio) Uimodal Oly oe peak Ulikely real data cofies

More information

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity

More information