Erasure List-Decodable Codes from Random and Algebraic Geometry Codes
|
|
- Darcy Potter
- 6 years ago
- Views:
Transcription
1 Erasure Lst-Decodable Codes from Random and Algebrac Geometry Codes Yang Dng, Lngfe Jn and Chaopng Xng arxv:40.276v [cs.it] 3 Jan 204 Abstract Erasure lst decodng was ntroduced to correct a larger number of erasures wth output of a lst of possble canddates. In the present paper, we consder both random lnear codes and algebrac geometry codes for lst decodng erasure errors. The contrbutons of ths paper are two-fold. Frstly, we show that, for arbtrary 0 < R < and ǫ > 0 R and ǫ are ndependent), wth hgh probablty a random lnear code s an erasure lst decodable code wth constant lst sze 2 O/ǫ) that can correct a fracton R ǫ of erasures,.e., a random lnear code acheves the nformaton-theoretc optmal trade-off between nformaton rate and fracton of erasure errors. Secondly, we show that algebrac geometry codes are good erasure lst-decodable codes. Precsely speakng, for any 0 < R < and ǫ > 0, a q-ary algebrac geometry code of rate R from the Garca-Stchtenoth tower can correct R + ǫ fracton of erasure errors wth lst sze O/ǫ). Ths mproves the Johnson bound appled to algebrac q geometry codes. Furthermore, lst decodng of these algebrac geometry codes can be mplemented n polynomal tme. Index Terms Erasure codes, Lst decodng, Algebrac geometry codes, Generalzed Hammng weghts. I. INTRODUCTION Erasure codes have receved great attentons for ther wde applcatons n recoverng packet losses n the nternet and storage systems. In the model of erasure channel, errors are descrbed as erasures, namely the recevers are supposed to know the postons where the erasures occurred. Compared wth other communcaton channels such as adversaral nose channel, erasure channel s much smpler. Thus, we can expect better parameters for erasure channel than adversaral nose channel. Instead of the unque decodng, the model of lst decodng for whch a decoder allows to output a lst of possble codewords was ndependently ntroduced by Elas and Wonzencraft [3], [8]. The decodng s consdered to be successful as long as the correct codeword s ncluded n the lst and the lst sze s not too bg. The problem of lst decodng for classcal adversaral nose channel has been extensvely studed see [3], [7], [8], [9], [6], [8], [9], for example). A fundamental problem n lst decodng s the tradeoff among the nformaton rate, decodng radus.e., fracton of errors that can be corrected) and the lst sze. In other words, f we fx one of these three parameters, then one s nterested n optmal tradeoff between the remanng two parameters. For nstance, f the lst sze s fxed to be constant or polynomal n the length of codes, the problem becomes a tradeoff between nformaton rate and decodng radus. Defnton.: τ,l)-erasure lst decodablty) Let Σ be a fnte alphabet of sze q, L > an nteger, and τ 0,). A code C Σ n s sad to be τ,l)-erasure lst-decodable, f for every r F τ)n q, and any subset T {,2,,n} of sze τ)n, one has {c C c T = r} L, where c T s the projecton of c onto the coordnates ndexed by T. In other words, gven any receved word wth at most τn erasures, there are at most L codewords that are consstent wth the unerased porton of the receved word. Known results It s known that, for an erasure channel where the codeword symbols are randomly and ndependently erased wth probablty τ, the capacty s τ see [4]). Although erasure lst decodng has been consdered prevously see [6], [0], [8], [9]), a lot of problems stll reman unsolved. Let us summarze some of prevous results on erasure lst decodng below. ) It was shown n [6] that, for any small ǫ > 0 and τ 0,), a τ,l)-erasure lst-decodable code of rate τ ǫ must satsfy L Ω ǫ ); and on the other hand, there exsts a τ,oexp ǫ )))-erasure lst-decodable code of rate τ ǫ. ) In [7, Proposton 0.], the Johnson bound for erasure decodng radus was derved. It says that, for any gven ǫ > 0, every q-ary code of relatve dstance δ < /q s δ+ δ ǫ,o/ǫ))-erasure lst-decodable. Ths means that, wth a constant lst sze, erasure decodng radus s enlarged by approxmaly δ compared wth unque erasure decodng whose decodng radus s only δ. On the other hand, t was shown further n [7, Proposton 0.2] that there exsts a q-ary code of length n and relatve dstance δ < /q that s not δ + δ δn) )-erasure lst-decodable for every small +ǫ,2ωǫ2 All authors are wth Dvson of Mathematcal Scences, School of Physcal and Mathematcal Scences, Nanyang Technologcal Unversty, Sngapore 63737, Republc of Sngapore emal: {dngyang,lfjn,xngcp}@ntu.edu.sg). The work s partally supported by the Sngapore A*STAR SERC under Research Grant
2 2 ǫ > 0. Ths mples that the best bound on erasure lst decodng radus of a q-ary code of relatve mnmum dstance δ s δ + δ. ) In [6], Guruswam showed that, for any small ǫ > 0, wth hgh probablty a random lnear code of rater = Ωǫ/log/ǫ)) s σ, O/σ))-erasure lst-decodable for every σ satsfyng ǫ σ. Furthermore, by the concatenaton method Guruswam showed n [6] that, for any small ǫ > 0, one can construct a famly of concatenated bnary) ǫ,o/ǫ))- erasure lst-decodable codes of rate Ωǫ 2 /log/ǫ)) n polynomal tme. A slghtly better rate was obtaned for nonlnear codes over larger alphabet sze n [9]. Our results and comparson Our contrbutons of ths paper are two-fold. ) Frstly, we show that, for arbtrary 0 < R < and ǫ > 0 R and ǫ are ndependent), wth hgh probablty a random lnear code s R ǫ,2 O/ǫ) )-erasure lst-decodable,.e., a random lnear code acheves the nformaton-theoretc optmal tradeoff between nformaton rate and fracton of erasure errors that can be corrected. Whle Theorem 2 n [6] whch was derved from [] only shows exstence of R ǫ,2 O/ǫ) )-erasure lst-decodable codes for arbtrary 0 < R < and ǫ > 0. ) Secondly, we show that algebrac geometry codes are good erasure lst-decodable codes. Precsely speakng, for any 0 < τ < andǫ > 0, aq-ary algebrac geometry code from the Garca-Stchtenoth tower has rate at least τ + q ǫ and sτ, O/ǫ))-erasure lst-decodable. Furthermore, lst decodng of these algebrac geometry codes can be mplemented n polynomal tme. On the other hand, f we apply the Johnson bound gven n [7, Proposton 0.] to general algebrac geometry codes, we can only clam that a q-ary algebrac geometry code from the Garca-Stchtenoth tower has rate τ + τ q ǫ and s τ,o/ǫ))-erasure lst-decodable. Ths rate s always smaller than our rate for any τ 0,). Ths mples that the Johnson bound could be mproved for some specal class of codes although t s optmal n general. Open problems For adversaral error channel, t has been shown that, gven decodng radus 0 < τ <, the optmal rate for lst decodng s R = H q τ), where H q x) = xlog q q ) xlog q x x)log q x) s the q-ary entropy functon. More precsely speakng, for any small ǫ > 0 and τ wth 0 < τ < /q, wth hgh probablty a random code s H q τ) ǫ,o ǫ ))-lst decodable. Furthermore, every q-ary H q τ) ǫ,l)-lst-decodable code has lst sze at least Ωlog/ǫ). It s stll an open problem to determne f there exsts a q-ary H q τ) ǫ,l)-lst decodable code wth lst sze L smaller than O ǫ ). Under the stuaton of erasure lst decodng, the optmal rate R that one can acheve s R = τ. If we denote L τ,q ǫ) to be the smallest nteger L for whch there are q-ary τ,l)-erasure lst-decodable codes of rate at least τ ǫ for nfntely many lengths n, then t follows from our result and [6] that Ω ǫ ) L τ,qǫ) 2 O/ǫ). Now the frst open problem s Open Problem : Determne L τ,q ǫ). In the lterature, there are not many results on constructve bounds on erasure lst decodng except for suffcently large q or small rate [6], [0]. The second open problem would be Open Problem 2: Narrow the rate gap between τ + q and τ by constructng erasure lst-decodable such that codes explctly,.e., construct a q-ary τ,l)-erasure lst-decodable codes of rate R > τ + q the lst sze L s ether a constant or a polynomal n length. Organzaton The paper s organzed as follows. In Secton 2, we ntroduce some necessary nataton and defntons and known results as well. Secton 3 s devoted to random codes. In the last secton, we show that algebrac geometry codes are good erasure lst-decodable codes. II. PRELIMINARIES In ths paper, we only focus on lnear codes. Recall that a q-ary [n,k] q lnear code s an F q -lnear subspace of F n q wth dmenson k, where F q s a fnte feld wth q elements and q s a prme power. n s called the length of the code and k s the dmenson of the code. The nformaton rate of the code C s defned as R = k/n whch represents the effcency of the code. Another mportant parameter of the code s the dstance whch represents the error correctng capablty. The dstance of a lnear code C s defned to be the mnmum Hammng weght of nonzero codewords of C, denoted by d = dc). The relatve dstance δ = δc) s defned to be the quotent d/n. From Defnton., one knows that, n a τ,l)-erasure lst decodable code C of length n, for every r F q τ)n and T {,2,...,n} wth T = τ)n the number of the codewords n the output lst that are consstent wth r at the coordnates ndexed by T s at most L. Thus, f C s lnear, t s equvalent to sayng that the number of the codewords
3 3 that are 0 at the coordnates ndexed by T s at most L,.e., {c C c T = 0} L. Hence, an [n,k,d] q -lnear code s d )/n, )-erasure lst-decodable, but not d/n, )-erasure lst-decodable. Defnton 2.: Erasure lst decodng radus ELDR)) ) For an nteger L and a lnear code C of length n, we denote Rad L C) := max{s Z >0 : C s s/n,l)-erasure lst-decodable}. ) For an nfnte famly C = {C } of q-ary lnear codes wth length tendng to and an nteger L, we denote { } RadL C ) ELDR L C) := lmnf, where n s the length of C. Defnton 2.2: For an nteger L and 0 τ, the maxmum rate for lnear τ,l)-erasure lst-decodable code famles s defned to be R L τ) := sup C: ELDR LC) τ RC). The notaton of erasure lst decodng for lnear codes actually had already been studed n the form of generalzed Hammng weght, see [7]. However, the explct relatonshp between erasure lst decodng and generalzed Hammng weght had not been made clear untl the work n [6]. The concept of generalzed Hammng weght was ntally ntroduced n [7] and later receved great attenton due to applcatons n cryptography, desgn of codes, t-reslent functons and so on []. Defnton 2.3: Generalzed Hammng Weght) The r-th generalzed Hammng weght of a code C, denoted by d r C), s defned to be the sze of the smallest support of an r-dmensonal subcode of C,.e., d r C) = mn{ SuppD) : D s a subspace of C of dmenson r}, where SuppD) = { : c,...,c n ) D,c 0}. Note that d C) s exactly the mnmum dstance d of C. The characterzaton of erasure lst decodablty through generalzed Hammng weght s gven below. Lemma 2.4: see [6]) A lnear code C of length n s s/n,l)-erasure lst-decodable f and only f d r C) > s, where r = log q L +. The lnk stated n Lemma 2.4 establshes a two-way brdge. Results for erasure lst decdng can be derved drectly from the exstng results on generalzed Hammng weght, and thus the applcatons of generalzed Hammng weght are nherted. In the meanwhle, some new propertes for generalzed Hammng wght can be obtaned as well f one can develop some fresh deas on erasure lst decodng. In [6], Guruswam made use of the connecton between generalzed Hammng weght and erasure lst decodng to establsh some bounds for rate R L τ) through the exstng bounds on generalzed Hammng weght. Lemma 2.5: see [6]) One has ) For every nteger L and every τ, 0 τ, R L τ) τ r log q n q r q H qτ) r where r = log q L +. In partcular, for any small ǫ > 0 and τ 0,), there exsts a τ,oexp ǫ )))-erasure lstdecodable code of rate τ ǫ. ) For small ǫ > 0 and τ wth 0 < τ <, a τ,l)-erasure lst-decodable code of rate τ ǫ must satsfy L Ω ǫ ). III. RANDOM LIST DECODABLE ERASURE CODES Random ǫ, O/ǫ))-erasure lst-decodable codes of rate R = Ωǫ/ log/ǫ)) was dscussed n [6] by usng a characterzaton of generator matrces of erasure lst-decodable codes. However, the rate s qute small and actually s dependent on ǫ. In ths secton, we are gong to show that for any 0 R R s ndependent of ǫ), wth probablty q Ωn) a random lnear code C of length n and rate R s R ǫ,2 O/ǫ) )-erasure lst-decodable. Our approach s through a characterzaton of party-check matrces of erasure lst-decodable codes. Proposton 3.: If k/n R > 0 when n tends to, then for a random matrx H over F q of sze n k) n, the probablty that H s full-rank s approachng when n tends to. Proof: On one hand, t s easy to compute that the total number of random matrx H over F q of sze n k) n wth full rank s q n )q n q) q n q n k ).
4 4 On the other hand, the total number of matrces H over F q of sze n k) n s q nn k). Let E denote the event that an n k) n random matrx H over F q s full-rank, then PrE) = qn )q n q) q n q n k ) q nn k). To show lm n PrE) =, t suffces to show that lm n lnpre) 0. When n tends to, we have 0 ln qn )q n q) q n q n k ) q nn k) = n =k+ ln q ) n =k+ 2q ) 2n q k 0. Ths completes the proof. Lemma 3.2: Let s be a postve nteger, then an [n,k] q code C s s/n,l)-erasure-lst-decodable f and only f any submatrx H n k) s of the party check matrx H n k) n of C has rank at least s log q L. Proof: By Defnton. and the fact that C s a lnear code, C s s/n,l)-erasure-lst-decodable f and only f {c C c T = 0} L for T {,2,...,n} wth sze n s. Ths mples that C s s/n,l)-erasure-lst-decodable f and only f for any submatrx H n k) s of H n k) n, {x F s q H n k) s x = 0} L,.e., the soluton space of H n k) s has dmenson at most log ql. Therefore, H n k) s has rank at least s log ql. Theorem 3.3: For every small ǫ > 0, a real 0 < R < and suffcently large n, wth probablty at least q Ωn), a random lnear code over F q of length n and rate R s R ǫ,2 O ǫ ) )-erasure lst-decodable. Proof: Put l = ǫ 2 R)log q2+) and L = q l. Thus, L = 2 O ǫ ). We randomly pck a matrx H n k) n. Then wth probablty approachng, H n k) n s full rank from Proposton 3.. Let such a full rank matrc H n k) n be the party check matrx of our lnear code C. Then we are gong to prove that wth probablty at most q Ωn), C s not s,l)-erasure lst-decodable for s = n k ǫn. By Lemma 3.2, ths happens only f some n k) s submatrx of H has rank less than s log q L. Denote n k by K. Let A denote the number of full-rank matrces H n k) n n whch there exsts s = n k ǫn columns wth rank ) at most s l. Note that the total number of matrces of sze K s over F q wth rank at most s l s equal to q s ) q s q )q K ). Thus, we have s l K A n s s l < 2 n ) K q s ) q s q )q K ) ) K q s+k 2 )+Kn s) s l ) K )q Kn s) s l 2 n q s+k)s l) s l)2 +Kn s) 2 n+k q s+k)s l) s l)2 +Kn s) q n+k)log q 2 q 2K ǫn)k ǫn l) K ǫn l)2 +Kn K+ǫn) < q n2 R)log2 ǫl)+kn. Substtutng the value of l to the above equaton, we have lm sup n A q n )q n q) q n q n k ) lmsup n A lm q n k)n n q n k)n q n )q n q) q n q n k ) lm n q n = 0. Ths mples that wth probablty at most q n, a random matrx H n k) n has full rank and a submatrx of sze n k) s of rank at most s l. The clamed result follows from settng of our parameters.
5 5 IV. ALGEBRAIC GEOMETRY CODES ARE GOOD ERASURE LIST-DECODABLE CODES In the prevous secton, we proved that random codes are good erasure lst-decodable codes. There s stll a lack of constructve results on erasure lst decodng. Though Guruswam [6] presented a constructve result from concatenated codes, the rate s extremely small. In ths secton, we show that algebrac geometry AG for short) codes are good erasure lst-decodable codes and furthermore they can be lst decoded n polynomal-tme. As a preparaton, we recall some basc results on AG codes frst. Readers may refer to [5] for more detals. Let X be a smooth, projectve, absolutely rreducble curve of genus gx) we wll use g nstead of gx) f there s no confuson n the context) defned over F q. We denote by F q X) the functon feld of X. Denote by NX) the number of ratonal ponts of X. Let P = {P,...,P n } be a set of n dstnct ratonal ponts over F q. Let G be a dvsor such that SuppG) {P,...,P n } =. Defne LG) as the Remann-Roch space assocated to G and denote dmlg) = lg). The algebrac geometry code CG,P) s defned as the mage of LG) n F n q under the followng evaluaton map C : LG) F n q, f fp ),...,fp n )). If n > degg, then CG,P) s an [n, degg g +, n degg] q -AG code. Throughout ths secton, we always assume that n s bgger than degg). The gonalty of a curve X was ntroduced n [3]. It s defned to be the smallest degree of a nonconstant map from X to the projectve lne. We denote the gonalty of X by tx). More specfcally, f X s defned over a feld F q and F q X) s the functon feld of X, then tx) s the mnmum degree of the feld extensons of F q X) over a ratonal functon feld. It s easy to see that f gx) = 0, then tx) =. If gx) = or 2, then tx) = 2. However, for general g, the gonalty s no longer determned by genus. In general, we have the followng lower bound for tx). Lemma 4.: [3]) Let X be a curve defned over F q of genus g wth N ratonal ponts. Then tx) N/q +). By usng the lower bound on tx), one has the followng proposton. n ) ) Proposton 4.2: CG, P) s n degg)+ n q+,q -erasure lst-decodable. Proof: Let s be a postve nteger wth s n degg)+ n q+. For any subset T {,2,,n} of sze n s, we clam that {c CG,P) c T = 0} q. Ths s equvalent to provng that dml G ) P. Suppose dml G P ) 2, the one can choose a nonzero functon f L G P ), then f)+g P 0. Let H = f)+g P 0. Then t s clear that degh = deg G ) n P = degg)+s n and q + dmlh) = dml G ) P 2. Choose a functon z LH)\F q, then [F q X) : F q z)] s at most degh) n q+ < N q+. Ths contradcts Lemma 4.. Our desred result follows from Defnton.. Proposton 4.2 can be extended by the Grsmer bound through the followng lemma. Lemma 4.3: If a dvsor G satsfes lg) t and degg < N, then degg N qt q t, where N stands for the number of ratonal ponts on X. Proof: Suppose P,...,P N are N dstnct ratonal ponts on X. By the strong approxmaton theorem, there exsts x F q X) such that Suppx)+G) {P,...,P N } =. Then lx)+g) = lg) and degx) +G) = degg). Thus, we can obtan an algebrac geometry code Cx)+G,{P,...,P N }) wth parameters [N,lG),d N degg] q. By the Grsmer bound [2], we have lg) d t d t N q q N degg) q. Thus, the desred result follows from the above nequalty. Theorem 4.4: If G satsfes lg) t and degg < n, then CG,P) s erasure lst-decodable. ) n n degg)+ qt q t n,q )- t
6 6 Proof: Let s be an nteger satsfyng s n degg+ qt q t n. For any T {,2,,n} of sze n s, we have deg G ) q t P = degg T = degg n+s q t n < N qt q t. By Lemma 4.3, we have l G ) P t. Our desred result follows from Defnton.. Remark 4.5: When t =, Theorem 4.4 shows that CG,P) s n n degg) ),) -erasure lst-decodable. For t = 2, we obtan the result of Proposton 4.2. Combng Lemma 2.4 and Theorem 4.4, we mmedately obtan the followng lower bound on generalzed Hammng weght of algebrac geometry codes. Corollary 4.6: For t degg) g +, the t-th generalzed Hammng weght of CG,P) satsfes q t d t CG,P)) n degg)+ q t n. Now we come to the man result of ths secton. Theorem 4.7: Let q be a square. For any small ǫ > 0 and τ wth 0 < τ < + q ǫ, there exsts a famly {CG,P)} of algebrac geometry code wth length tendng to such that CG,P) have rate at least τ + q ǫ and are τ,o ǫ ))-erasure lst-decodable. Furthermore, t can be lst decoded n Onlog q n)3 ) tme, where n s the length of the code. Proof: Choose a curvex/f q n the Garca-Stchtenoth tower [5]. Then NX)/gX). Let P = {P,P 2,...,P n } wth n = NX). Choose the last ratonal pont P of X such that P P. Put q t m := n τn + q t n and G = mp. By Theorem 4.4, CG,P) s ) n n m+ qt q t n,q )-erasure t lst-decodable for any constant t. Hence, CG,P) s τ,q t )-erasure lst-decodable. Pck ǫ = q qt q t = qq t ), then qt = O ǫ ). Moreover, the rate of CG,P) s at least n m g +) τ + qt q q t = τ + q q ǫ. Ths proves the frst statement of the theorem. Fnally by [4], we know that a bass of LG) can be found n Onlog q n) 3 ) tme, where n s the length of the code. Assume that we have already found a bass f,...,f k of LG). Suppose that c = c,...,c n ) was transmtted and c T was receved wth T {,2,...,n} and T τ)n. A functon f LG) s n the lst f and only f fp ) = c for all T. Let f = k j= λ jf j wth λ j beng unknowns. Then one has k j= λ jf j P ) = c for all T. Ths s a system of lnear equatons wth T equatons and k unknowns. It can be solved n On 3 ) tme. Ths completes the proof. REFERENCES [] A. Ashkhmn, A. Barg and S. Ltsyn, New upper bounds on generalzed weghts, IEEE. Trans. Inform. Theory, 45, pp , 999. [2] G. D. Cohen, S. N. Ltsyn and G. Zémor, Upper bounds on generalzed dstances, IEEE. Trans. Inform. Theory, 40, pp , 994. [3] P. Elas, Lst-decodng for nosy channels, MIT, Res. Lab. Electron., Cambrdge, MA, Tech. Rep. 335, 957. [4] P. Elsa, Codng for two nosy channels, Informaton Theory, Thrd London Symposum, pp. 6-76, 995. [5] A. Garca, H. Stchenoth, A tower of Artn-Schreer extensons of functon felds attanng the Drnfeld-Vlădut bound, Inventones Mathematcae, 2, pp.2 222, 995. [6] V. Guruswam, Lst decodng from erasure: Bounds and code constructons, IEEE. Trans. Inform. Theory, 49, pp , [7] V. Guruswam, Lst decodng of error correctng codes, Number 3282 n Lecture Notes n Computer Scence. Sprnger, [8] V. Guruswam and P. Indyk, Lnear-tme st decodng n error-free settngs, Lecture Notes n Computer Scence. 342, PP , [9] V. Guruswam and P. Indyk, Near-optmal lnear tme codes for unque decodng and new lst-decodable codes over small alphabets, In Proceedngs of the 34nd Annual ACM Symposum on Theory of Computng, pp.82-82, [0] V. Guruswam and M. Sudan, Lst decodng algorthms for certan cancatenated codes, In Proceedngs of the 32nd Annual ACM Symposum on Theory of Computng, pp.8-90, [] T. Helleseth, T. Kløve, V. I. Levenshten and Ø. Ytrehus, Bounds on mnmum support weghts, IEEE. Trans. Inform. Theory, 4, pp , 995. [2] S. Lng and C. P. Xng, Codng Theory A Frst Course, Cambrdge Unversty Press, [3] R. Pellkaan, On the gonalty of curves, abundant codes and decodng, Lecture notes n Math., 58, 32-44, Sprnger, Berln, 992. [4] K. W. Shum, I. Aleshnkov, P. V. Kummer, H. Stchtenoth and V. Deolalkar, A low-complexty algorthm for the constructon of algebrac-geometry codes better than the Glbert-Varshamov bound, IEEE. Trans. Inform. Theory, 47, pp , 200. [5] H. Stchtenoth, Algebrac Functon Felds and Codes, Sprnger Verlag, 993. [6] M. Sudan, Lst decodng: Algorthms and applcatons, SIGACT news, 3, pp.6-27, [7] V. We, Generalzed Hammng weght for lnear codes, IEEE. Trans. Inform. Theory, 37, pp.42-48, 99. [8] J. M. Wozencraft, Lst decodng, Quarterly Progress Report MIT, Res. Lab. Electron., Cambrdge, MA, 48, 958. [9] V. V. Zyablov and M. S. Pnsker, Lst cascade decodng n Russan), Probl. Inf. Transm., 7, pp.29-34, 98.
Refined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationPerron Vectors of an Irreducible Nonnegative Interval Matrix
Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationMath 217 Fall 2013 Homework 2 Solutions
Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationLow-discrepancy sequences using duality and global function fields
ACTA ARITHMETICA 130.1 (2007) Low-dscrepancy sequences usng dualty and global functon felds by Harald Nederreter (Sngapore) and FerruhÖzbudak (Sngapore and Ankara) 1. Introducton. Let s 1 be an nteger
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationApplication of Fuzzy Algebra in Automata theory
Amercan Journal of Engneerng Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-2, pp-21-26 www.ajer.org Research Paper Applcaton of Fuzzy Algebra n Automata theory Kharatt Lal Dept.
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationRestricted divisor sums
ACTA ARITHMETICA 02 2002) Restrcted dvsor sums by Kevn A Broughan Hamlton) Introducton There s a body of work n the lterature on varous restrcted sums of the number of dvsors of an nteger functon ncludng
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationRandić Energy and Randić Estrada Index of a Graph
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More informationOn the size of quotient of two subsets of positive integers.
arxv:1706.04101v1 [math.nt] 13 Jun 2017 On the sze of quotent of two subsets of postve ntegers. Yur Shtenkov Abstract We obtan non-trval lower bound for the set A/A, where A s a subset of the nterval [1,
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationGroup Analysis of Ordinary Differential Equations of the Order n>2
Symmetry n Nonlnear Mathematcal Physcs 997, V., 64 7. Group Analyss of Ordnary Dfferental Equatons of the Order n> L.M. BERKOVICH and S.Y. POPOV Samara State Unversty, 4430, Samara, Russa E-mal: berk@nfo.ssu.samara.ru
More informationOn the Stopping Distance and the Stopping Redundancy of Codes
On the Stoppng Dstance and the Stoppng Redundancy of Codes Moshe Schwartz Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. moosh@everest.ucsd.edu Abstract It s now well known that the performance
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationExact-Regenerating Codes between MBR and MSR Points
Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between
More information12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product
12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More informationA New Refinement of Jacobi Method for Solution of Linear System Equations AX=b
Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,
More informationLecture 4: Constant Time SVD Approximation
Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More information} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.
Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationAlgebraic properties of polynomial iterates
Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationFrom the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm
1 / 32 From the Eucldean Algorthm for Solvng a Key Equaton for Dual Reed Solomon Codes to the Berlekamp-Massey Algorthm Mara Bras-Amorós, Mchael E O Sullvan The Claude Shannon Insttute Workshop on Codng
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationSelf-complementing permutations of k-uniform hypergraphs
Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationFixed points of IA-endomorphisms of a free metabelian Lie algebra
Proc. Indan Acad. Sc. (Math. Sc.) Vol. 121, No. 4, November 2011, pp. 405 416. c Indan Academy of Scences Fxed ponts of IA-endomorphsms of a free metabelan Le algebra NAIME EKICI 1 and DEMET PARLAK SÖNMEZ
More informationBernoulli Numbers and Polynomials
Bernoull Numbers and Polynomals T. Muthukumar tmk@tk.ac.n 17 Jun 2014 The sum of frst n natural numbers 1, 2, 3,..., n s n n(n + 1 S 1 (n := m = = n2 2 2 + n 2. Ths formula can be derved by notng that
More informationGeneral viscosity iterative method for a sequence of quasi-nonexpansive mappings
Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationSTAT 309: MATHEMATICAL COMPUTATIONS I FALL 2018 LECTURE 16
STAT 39: MATHEMATICAL COMPUTATIONS I FALL 218 LECTURE 16 1 why teratve methods f we have a lnear system Ax = b where A s very, very large but s ether sparse or structured (eg, banded, Toepltz, banded plus
More informationRepresentation theory and quantum mechanics tutorial Representation theory and quantum conservation laws
Representaton theory and quantum mechancs tutoral Representaton theory and quantum conservaton laws Justn Campbell August 1, 2017 1 Generaltes on representaton theory 1.1 Let G GL m (R) be a real algebrac
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationREGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction
REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997
More informationwhere a is any ideal of R. Lemma 5.4. Let R be a ring. Then X = Spec R is a topological space Moreover the open sets
5. Schemes To defne schemes, just as wth algebrac varetes, the dea s to frst defne what an affne scheme s, and then realse an arbtrary scheme, as somethng whch s locally an affne scheme. The defnton of
More informationOn the irreducibility of a truncated binomial expansion
On the rreducblty of a truncated bnomal expanson by Mchael Flaseta, Angel Kumchev and Dmtr V. Pasechnk 1 Introducton For postve ntegers k and n wth k n 1, defne P n,k (x = =0 ( n x. In the case that k
More informationApproximate Smallest Enclosing Balls
Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More information9 Characteristic classes
THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct
More informationSubset Topological Spaces and Kakutani s Theorem
MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered
More informationShort running title: A generating function approach A GENERATING FUNCTION APPROACH TO COUNTING THEOREMS FOR SQUARE-FREE POLYNOMIALS AND MAXIMAL TORI
Short runnng ttle: A generatng functon approach A GENERATING FUNCTION APPROACH TO COUNTING THEOREMS FOR SQUARE-FREE POLYNOMIALS AND MAXIMAL TORI JASON FULMAN Abstract. A recent paper of Church, Ellenberg,
More informationMATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS
MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationMatrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD
Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo
More informationSmarandache-Zero Divisors in Group Rings
Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the
More informationModule 3: Element Properties Lecture 1: Natural Coordinates
Module 3: Element Propertes Lecture : Natural Coordnates Natural coordnate system s bascally a local coordnate system whch allows the specfcaton of a pont wthn the element by a set of dmensonless numbers
More informationGraph Theoretic Methods in Coding Theory
Graph Theoretc Methods n Codng Theory Salm El Rouayheb 1 and Costas N. Georghades 2 1 ECE Department,Texas A&M Unversty, College Staton, TX 77843 salm@ece.tamu.edu 2 ECE Department,Texas A&M Unversty,
More informationOn Finite Rank Perturbation of Diagonalizable Operators
Functonal Analyss, Approxmaton and Computaton 6 (1) (2014), 49 53 Publshed by Faculty of Scences and Mathematcs, Unversty of Nš, Serba Avalable at: http://wwwpmfnacrs/faac On Fnte Rank Perturbaton of Dagonalzable
More informationA note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights
ACTA ET COMMENTATIONES UNIVERSITATIS TARTUENSIS DE MATHEMATICA Volume 7, Number 2, December 203 Avalable onlne at http://acutm.math.ut.ee A note on almost sure behavor of randomly weghted sums of φ-mxng
More informationRoot Structure of a Special Generalized Kac- Moody Algebra
Mathematcal Computaton September 04, Volume, Issue, PP8-88 Root Structu of a Specal Generalzed Kac- Moody Algebra Xnfang Song, #, Xaox Wang Bass Department, Bejng Informaton Technology College, Bejng,
More informationConstruction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity
Constructon of reslent S-boxes wth hgher-dmensonal vectoral outputs and strctly almost optmal nonlnearty WeGuo Zhang and LuYang L ISN Laboratory, Xdan Unversty, X an 710071, Chna e-mal: zwg@xdaneducn Enes
More informationWeek 2. This week, we covered operations on sets and cardinality.
Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from
More informationMEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x
MEM633 Lectures 7&8 Chapter 4 Descrptons of MIMO Systems 4- Drect ealzatons y() s s su() s y () s u () s ( s)( s) s y() s u (), s y() s u() s s s y() s u(), s y() s u() s ( s)( s) s () ( s ) y ( s) u (
More informationarxiv: v1 [math.ho] 18 May 2008
Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationTHE SUMMATION NOTATION Ʃ
Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the
More informationThe Quadratic Trigonometric Bézier Curve with Single Shape Parameter
J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma
More informationA summation on Bernoulli numbers
Journal of Number Theory 111 (005 37 391 www.elsever.com/locate/jnt A summaton on Bernoull numbers Kwang-Wu Chen Department of Mathematcs and Computer Scence Educaton, Tape Muncpal Teachers College, No.
More informationGeometry of Müntz Spaces
WDS'12 Proceedngs of Contrbuted Papers, Part I, 31 35, 212. ISBN 978-8-7378-224-5 MATFYZPRESS Geometry of Müntz Spaces P. Petráček Charles Unversty, Faculty of Mathematcs and Physcs, Prague, Czech Republc.
More informationLecture 2: Gram-Schmidt Vectors and the LLL Algorithm
NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationThe Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices
Internatonal Mathematcal Forum, Vol 11, 2016, no 11, 513-520 HIKARI Ltd, wwwm-hkarcom http://dxdoorg/1012988/mf20166442 The Jacobsthal and Jacobsthal-Lucas Numbers va Square Roots of Matrces Saadet Arslan
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationREAL ANALYSIS I HOMEWORK 1
REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α
More information