Erasure List-Decodable Codes from Random and Algebraic Geometry Codes

Size: px
Start display at page:

Download "Erasure List-Decodable Codes from Random and Algebraic Geometry Codes"

Transcription

1 Erasure Lst-Decodable Codes from Random and Algebrac Geometry Codes Yang Dng, Lngfe Jn and Chaopng Xng arxv:40.276v [cs.it] 3 Jan 204 Abstract Erasure lst decodng was ntroduced to correct a larger number of erasures wth output of a lst of possble canddates. In the present paper, we consder both random lnear codes and algebrac geometry codes for lst decodng erasure errors. The contrbutons of ths paper are two-fold. Frstly, we show that, for arbtrary 0 < R < and ǫ > 0 R and ǫ are ndependent), wth hgh probablty a random lnear code s an erasure lst decodable code wth constant lst sze 2 O/ǫ) that can correct a fracton R ǫ of erasures,.e., a random lnear code acheves the nformaton-theoretc optmal trade-off between nformaton rate and fracton of erasure errors. Secondly, we show that algebrac geometry codes are good erasure lst-decodable codes. Precsely speakng, for any 0 < R < and ǫ > 0, a q-ary algebrac geometry code of rate R from the Garca-Stchtenoth tower can correct R + ǫ fracton of erasure errors wth lst sze O/ǫ). Ths mproves the Johnson bound appled to algebrac q geometry codes. Furthermore, lst decodng of these algebrac geometry codes can be mplemented n polynomal tme. Index Terms Erasure codes, Lst decodng, Algebrac geometry codes, Generalzed Hammng weghts. I. INTRODUCTION Erasure codes have receved great attentons for ther wde applcatons n recoverng packet losses n the nternet and storage systems. In the model of erasure channel, errors are descrbed as erasures, namely the recevers are supposed to know the postons where the erasures occurred. Compared wth other communcaton channels such as adversaral nose channel, erasure channel s much smpler. Thus, we can expect better parameters for erasure channel than adversaral nose channel. Instead of the unque decodng, the model of lst decodng for whch a decoder allows to output a lst of possble codewords was ndependently ntroduced by Elas and Wonzencraft [3], [8]. The decodng s consdered to be successful as long as the correct codeword s ncluded n the lst and the lst sze s not too bg. The problem of lst decodng for classcal adversaral nose channel has been extensvely studed see [3], [7], [8], [9], [6], [8], [9], for example). A fundamental problem n lst decodng s the tradeoff among the nformaton rate, decodng radus.e., fracton of errors that can be corrected) and the lst sze. In other words, f we fx one of these three parameters, then one s nterested n optmal tradeoff between the remanng two parameters. For nstance, f the lst sze s fxed to be constant or polynomal n the length of codes, the problem becomes a tradeoff between nformaton rate and decodng radus. Defnton.: τ,l)-erasure lst decodablty) Let Σ be a fnte alphabet of sze q, L > an nteger, and τ 0,). A code C Σ n s sad to be τ,l)-erasure lst-decodable, f for every r F τ)n q, and any subset T {,2,,n} of sze τ)n, one has {c C c T = r} L, where c T s the projecton of c onto the coordnates ndexed by T. In other words, gven any receved word wth at most τn erasures, there are at most L codewords that are consstent wth the unerased porton of the receved word. Known results It s known that, for an erasure channel where the codeword symbols are randomly and ndependently erased wth probablty τ, the capacty s τ see [4]). Although erasure lst decodng has been consdered prevously see [6], [0], [8], [9]), a lot of problems stll reman unsolved. Let us summarze some of prevous results on erasure lst decodng below. ) It was shown n [6] that, for any small ǫ > 0 and τ 0,), a τ,l)-erasure lst-decodable code of rate τ ǫ must satsfy L Ω ǫ ); and on the other hand, there exsts a τ,oexp ǫ )))-erasure lst-decodable code of rate τ ǫ. ) In [7, Proposton 0.], the Johnson bound for erasure decodng radus was derved. It says that, for any gven ǫ > 0, every q-ary code of relatve dstance δ < /q s δ+ δ ǫ,o/ǫ))-erasure lst-decodable. Ths means that, wth a constant lst sze, erasure decodng radus s enlarged by approxmaly δ compared wth unque erasure decodng whose decodng radus s only δ. On the other hand, t was shown further n [7, Proposton 0.2] that there exsts a q-ary code of length n and relatve dstance δ < /q that s not δ + δ δn) )-erasure lst-decodable for every small +ǫ,2ωǫ2 All authors are wth Dvson of Mathematcal Scences, School of Physcal and Mathematcal Scences, Nanyang Technologcal Unversty, Sngapore 63737, Republc of Sngapore emal: {dngyang,lfjn,xngcp}@ntu.edu.sg). The work s partally supported by the Sngapore A*STAR SERC under Research Grant

2 2 ǫ > 0. Ths mples that the best bound on erasure lst decodng radus of a q-ary code of relatve mnmum dstance δ s δ + δ. ) In [6], Guruswam showed that, for any small ǫ > 0, wth hgh probablty a random lnear code of rater = Ωǫ/log/ǫ)) s σ, O/σ))-erasure lst-decodable for every σ satsfyng ǫ σ. Furthermore, by the concatenaton method Guruswam showed n [6] that, for any small ǫ > 0, one can construct a famly of concatenated bnary) ǫ,o/ǫ))- erasure lst-decodable codes of rate Ωǫ 2 /log/ǫ)) n polynomal tme. A slghtly better rate was obtaned for nonlnear codes over larger alphabet sze n [9]. Our results and comparson Our contrbutons of ths paper are two-fold. ) Frstly, we show that, for arbtrary 0 < R < and ǫ > 0 R and ǫ are ndependent), wth hgh probablty a random lnear code s R ǫ,2 O/ǫ) )-erasure lst-decodable,.e., a random lnear code acheves the nformaton-theoretc optmal tradeoff between nformaton rate and fracton of erasure errors that can be corrected. Whle Theorem 2 n [6] whch was derved from [] only shows exstence of R ǫ,2 O/ǫ) )-erasure lst-decodable codes for arbtrary 0 < R < and ǫ > 0. ) Secondly, we show that algebrac geometry codes are good erasure lst-decodable codes. Precsely speakng, for any 0 < τ < andǫ > 0, aq-ary algebrac geometry code from the Garca-Stchtenoth tower has rate at least τ + q ǫ and sτ, O/ǫ))-erasure lst-decodable. Furthermore, lst decodng of these algebrac geometry codes can be mplemented n polynomal tme. On the other hand, f we apply the Johnson bound gven n [7, Proposton 0.] to general algebrac geometry codes, we can only clam that a q-ary algebrac geometry code from the Garca-Stchtenoth tower has rate τ + τ q ǫ and s τ,o/ǫ))-erasure lst-decodable. Ths rate s always smaller than our rate for any τ 0,). Ths mples that the Johnson bound could be mproved for some specal class of codes although t s optmal n general. Open problems For adversaral error channel, t has been shown that, gven decodng radus 0 < τ <, the optmal rate for lst decodng s R = H q τ), where H q x) = xlog q q ) xlog q x x)log q x) s the q-ary entropy functon. More precsely speakng, for any small ǫ > 0 and τ wth 0 < τ < /q, wth hgh probablty a random code s H q τ) ǫ,o ǫ ))-lst decodable. Furthermore, every q-ary H q τ) ǫ,l)-lst-decodable code has lst sze at least Ωlog/ǫ). It s stll an open problem to determne f there exsts a q-ary H q τ) ǫ,l)-lst decodable code wth lst sze L smaller than O ǫ ). Under the stuaton of erasure lst decodng, the optmal rate R that one can acheve s R = τ. If we denote L τ,q ǫ) to be the smallest nteger L for whch there are q-ary τ,l)-erasure lst-decodable codes of rate at least τ ǫ for nfntely many lengths n, then t follows from our result and [6] that Ω ǫ ) L τ,qǫ) 2 O/ǫ). Now the frst open problem s Open Problem : Determne L τ,q ǫ). In the lterature, there are not many results on constructve bounds on erasure lst decodng except for suffcently large q or small rate [6], [0]. The second open problem would be Open Problem 2: Narrow the rate gap between τ + q and τ by constructng erasure lst-decodable such that codes explctly,.e., construct a q-ary τ,l)-erasure lst-decodable codes of rate R > τ + q the lst sze L s ether a constant or a polynomal n length. Organzaton The paper s organzed as follows. In Secton 2, we ntroduce some necessary nataton and defntons and known results as well. Secton 3 s devoted to random codes. In the last secton, we show that algebrac geometry codes are good erasure lst-decodable codes. II. PRELIMINARIES In ths paper, we only focus on lnear codes. Recall that a q-ary [n,k] q lnear code s an F q -lnear subspace of F n q wth dmenson k, where F q s a fnte feld wth q elements and q s a prme power. n s called the length of the code and k s the dmenson of the code. The nformaton rate of the code C s defned as R = k/n whch represents the effcency of the code. Another mportant parameter of the code s the dstance whch represents the error correctng capablty. The dstance of a lnear code C s defned to be the mnmum Hammng weght of nonzero codewords of C, denoted by d = dc). The relatve dstance δ = δc) s defned to be the quotent d/n. From Defnton., one knows that, n a τ,l)-erasure lst decodable code C of length n, for every r F q τ)n and T {,2,...,n} wth T = τ)n the number of the codewords n the output lst that are consstent wth r at the coordnates ndexed by T s at most L. Thus, f C s lnear, t s equvalent to sayng that the number of the codewords

3 3 that are 0 at the coordnates ndexed by T s at most L,.e., {c C c T = 0} L. Hence, an [n,k,d] q -lnear code s d )/n, )-erasure lst-decodable, but not d/n, )-erasure lst-decodable. Defnton 2.: Erasure lst decodng radus ELDR)) ) For an nteger L and a lnear code C of length n, we denote Rad L C) := max{s Z >0 : C s s/n,l)-erasure lst-decodable}. ) For an nfnte famly C = {C } of q-ary lnear codes wth length tendng to and an nteger L, we denote { } RadL C ) ELDR L C) := lmnf, where n s the length of C. Defnton 2.2: For an nteger L and 0 τ, the maxmum rate for lnear τ,l)-erasure lst-decodable code famles s defned to be R L τ) := sup C: ELDR LC) τ RC). The notaton of erasure lst decodng for lnear codes actually had already been studed n the form of generalzed Hammng weght, see [7]. However, the explct relatonshp between erasure lst decodng and generalzed Hammng weght had not been made clear untl the work n [6]. The concept of generalzed Hammng weght was ntally ntroduced n [7] and later receved great attenton due to applcatons n cryptography, desgn of codes, t-reslent functons and so on []. Defnton 2.3: Generalzed Hammng Weght) The r-th generalzed Hammng weght of a code C, denoted by d r C), s defned to be the sze of the smallest support of an r-dmensonal subcode of C,.e., d r C) = mn{ SuppD) : D s a subspace of C of dmenson r}, where SuppD) = { : c,...,c n ) D,c 0}. Note that d C) s exactly the mnmum dstance d of C. The characterzaton of erasure lst decodablty through generalzed Hammng weght s gven below. Lemma 2.4: see [6]) A lnear code C of length n s s/n,l)-erasure lst-decodable f and only f d r C) > s, where r = log q L +. The lnk stated n Lemma 2.4 establshes a two-way brdge. Results for erasure lst decdng can be derved drectly from the exstng results on generalzed Hammng weght, and thus the applcatons of generalzed Hammng weght are nherted. In the meanwhle, some new propertes for generalzed Hammng wght can be obtaned as well f one can develop some fresh deas on erasure lst decodng. In [6], Guruswam made use of the connecton between generalzed Hammng weght and erasure lst decodng to establsh some bounds for rate R L τ) through the exstng bounds on generalzed Hammng weght. Lemma 2.5: see [6]) One has ) For every nteger L and every τ, 0 τ, R L τ) τ r log q n q r q H qτ) r where r = log q L +. In partcular, for any small ǫ > 0 and τ 0,), there exsts a τ,oexp ǫ )))-erasure lstdecodable code of rate τ ǫ. ) For small ǫ > 0 and τ wth 0 < τ <, a τ,l)-erasure lst-decodable code of rate τ ǫ must satsfy L Ω ǫ ). III. RANDOM LIST DECODABLE ERASURE CODES Random ǫ, O/ǫ))-erasure lst-decodable codes of rate R = Ωǫ/ log/ǫ)) was dscussed n [6] by usng a characterzaton of generator matrces of erasure lst-decodable codes. However, the rate s qute small and actually s dependent on ǫ. In ths secton, we are gong to show that for any 0 R R s ndependent of ǫ), wth probablty q Ωn) a random lnear code C of length n and rate R s R ǫ,2 O/ǫ) )-erasure lst-decodable. Our approach s through a characterzaton of party-check matrces of erasure lst-decodable codes. Proposton 3.: If k/n R > 0 when n tends to, then for a random matrx H over F q of sze n k) n, the probablty that H s full-rank s approachng when n tends to. Proof: On one hand, t s easy to compute that the total number of random matrx H over F q of sze n k) n wth full rank s q n )q n q) q n q n k ).

4 4 On the other hand, the total number of matrces H over F q of sze n k) n s q nn k). Let E denote the event that an n k) n random matrx H over F q s full-rank, then PrE) = qn )q n q) q n q n k ) q nn k). To show lm n PrE) =, t suffces to show that lm n lnpre) 0. When n tends to, we have 0 ln qn )q n q) q n q n k ) q nn k) = n =k+ ln q ) n =k+ 2q ) 2n q k 0. Ths completes the proof. Lemma 3.2: Let s be a postve nteger, then an [n,k] q code C s s/n,l)-erasure-lst-decodable f and only f any submatrx H n k) s of the party check matrx H n k) n of C has rank at least s log q L. Proof: By Defnton. and the fact that C s a lnear code, C s s/n,l)-erasure-lst-decodable f and only f {c C c T = 0} L for T {,2,...,n} wth sze n s. Ths mples that C s s/n,l)-erasure-lst-decodable f and only f for any submatrx H n k) s of H n k) n, {x F s q H n k) s x = 0} L,.e., the soluton space of H n k) s has dmenson at most log ql. Therefore, H n k) s has rank at least s log ql. Theorem 3.3: For every small ǫ > 0, a real 0 < R < and suffcently large n, wth probablty at least q Ωn), a random lnear code over F q of length n and rate R s R ǫ,2 O ǫ ) )-erasure lst-decodable. Proof: Put l = ǫ 2 R)log q2+) and L = q l. Thus, L = 2 O ǫ ). We randomly pck a matrx H n k) n. Then wth probablty approachng, H n k) n s full rank from Proposton 3.. Let such a full rank matrc H n k) n be the party check matrx of our lnear code C. Then we are gong to prove that wth probablty at most q Ωn), C s not s,l)-erasure lst-decodable for s = n k ǫn. By Lemma 3.2, ths happens only f some n k) s submatrx of H has rank less than s log q L. Denote n k by K. Let A denote the number of full-rank matrces H n k) n n whch there exsts s = n k ǫn columns wth rank ) at most s l. Note that the total number of matrces of sze K s over F q wth rank at most s l s equal to q s ) q s q )q K ). Thus, we have s l K A n s s l < 2 n ) K q s ) q s q )q K ) ) K q s+k 2 )+Kn s) s l ) K )q Kn s) s l 2 n q s+k)s l) s l)2 +Kn s) 2 n+k q s+k)s l) s l)2 +Kn s) q n+k)log q 2 q 2K ǫn)k ǫn l) K ǫn l)2 +Kn K+ǫn) < q n2 R)log2 ǫl)+kn. Substtutng the value of l to the above equaton, we have lm sup n A q n )q n q) q n q n k ) lmsup n A lm q n k)n n q n k)n q n )q n q) q n q n k ) lm n q n = 0. Ths mples that wth probablty at most q n, a random matrx H n k) n has full rank and a submatrx of sze n k) s of rank at most s l. The clamed result follows from settng of our parameters.

5 5 IV. ALGEBRAIC GEOMETRY CODES ARE GOOD ERASURE LIST-DECODABLE CODES In the prevous secton, we proved that random codes are good erasure lst-decodable codes. There s stll a lack of constructve results on erasure lst decodng. Though Guruswam [6] presented a constructve result from concatenated codes, the rate s extremely small. In ths secton, we show that algebrac geometry AG for short) codes are good erasure lst-decodable codes and furthermore they can be lst decoded n polynomal-tme. As a preparaton, we recall some basc results on AG codes frst. Readers may refer to [5] for more detals. Let X be a smooth, projectve, absolutely rreducble curve of genus gx) we wll use g nstead of gx) f there s no confuson n the context) defned over F q. We denote by F q X) the functon feld of X. Denote by NX) the number of ratonal ponts of X. Let P = {P,...,P n } be a set of n dstnct ratonal ponts over F q. Let G be a dvsor such that SuppG) {P,...,P n } =. Defne LG) as the Remann-Roch space assocated to G and denote dmlg) = lg). The algebrac geometry code CG,P) s defned as the mage of LG) n F n q under the followng evaluaton map C : LG) F n q, f fp ),...,fp n )). If n > degg, then CG,P) s an [n, degg g +, n degg] q -AG code. Throughout ths secton, we always assume that n s bgger than degg). The gonalty of a curve X was ntroduced n [3]. It s defned to be the smallest degree of a nonconstant map from X to the projectve lne. We denote the gonalty of X by tx). More specfcally, f X s defned over a feld F q and F q X) s the functon feld of X, then tx) s the mnmum degree of the feld extensons of F q X) over a ratonal functon feld. It s easy to see that f gx) = 0, then tx) =. If gx) = or 2, then tx) = 2. However, for general g, the gonalty s no longer determned by genus. In general, we have the followng lower bound for tx). Lemma 4.: [3]) Let X be a curve defned over F q of genus g wth N ratonal ponts. Then tx) N/q +). By usng the lower bound on tx), one has the followng proposton. n ) ) Proposton 4.2: CG, P) s n degg)+ n q+,q -erasure lst-decodable. Proof: Let s be a postve nteger wth s n degg)+ n q+. For any subset T {,2,,n} of sze n s, we clam that {c CG,P) c T = 0} q. Ths s equvalent to provng that dml G ) P. Suppose dml G P ) 2, the one can choose a nonzero functon f L G P ), then f)+g P 0. Let H = f)+g P 0. Then t s clear that degh = deg G ) n P = degg)+s n and q + dmlh) = dml G ) P 2. Choose a functon z LH)\F q, then [F q X) : F q z)] s at most degh) n q+ < N q+. Ths contradcts Lemma 4.. Our desred result follows from Defnton.. Proposton 4.2 can be extended by the Grsmer bound through the followng lemma. Lemma 4.3: If a dvsor G satsfes lg) t and degg < N, then degg N qt q t, where N stands for the number of ratonal ponts on X. Proof: Suppose P,...,P N are N dstnct ratonal ponts on X. By the strong approxmaton theorem, there exsts x F q X) such that Suppx)+G) {P,...,P N } =. Then lx)+g) = lg) and degx) +G) = degg). Thus, we can obtan an algebrac geometry code Cx)+G,{P,...,P N }) wth parameters [N,lG),d N degg] q. By the Grsmer bound [2], we have lg) d t d t N q q N degg) q. Thus, the desred result follows from the above nequalty. Theorem 4.4: If G satsfes lg) t and degg < n, then CG,P) s erasure lst-decodable. ) n n degg)+ qt q t n,q )- t

6 6 Proof: Let s be an nteger satsfyng s n degg+ qt q t n. For any T {,2,,n} of sze n s, we have deg G ) q t P = degg T = degg n+s q t n < N qt q t. By Lemma 4.3, we have l G ) P t. Our desred result follows from Defnton.. Remark 4.5: When t =, Theorem 4.4 shows that CG,P) s n n degg) ),) -erasure lst-decodable. For t = 2, we obtan the result of Proposton 4.2. Combng Lemma 2.4 and Theorem 4.4, we mmedately obtan the followng lower bound on generalzed Hammng weght of algebrac geometry codes. Corollary 4.6: For t degg) g +, the t-th generalzed Hammng weght of CG,P) satsfes q t d t CG,P)) n degg)+ q t n. Now we come to the man result of ths secton. Theorem 4.7: Let q be a square. For any small ǫ > 0 and τ wth 0 < τ < + q ǫ, there exsts a famly {CG,P)} of algebrac geometry code wth length tendng to such that CG,P) have rate at least τ + q ǫ and are τ,o ǫ ))-erasure lst-decodable. Furthermore, t can be lst decoded n Onlog q n)3 ) tme, where n s the length of the code. Proof: Choose a curvex/f q n the Garca-Stchtenoth tower [5]. Then NX)/gX). Let P = {P,P 2,...,P n } wth n = NX). Choose the last ratonal pont P of X such that P P. Put q t m := n τn + q t n and G = mp. By Theorem 4.4, CG,P) s ) n n m+ qt q t n,q )-erasure t lst-decodable for any constant t. Hence, CG,P) s τ,q t )-erasure lst-decodable. Pck ǫ = q qt q t = qq t ), then qt = O ǫ ). Moreover, the rate of CG,P) s at least n m g +) τ + qt q q t = τ + q q ǫ. Ths proves the frst statement of the theorem. Fnally by [4], we know that a bass of LG) can be found n Onlog q n) 3 ) tme, where n s the length of the code. Assume that we have already found a bass f,...,f k of LG). Suppose that c = c,...,c n ) was transmtted and c T was receved wth T {,2,...,n} and T τ)n. A functon f LG) s n the lst f and only f fp ) = c for all T. Let f = k j= λ jf j wth λ j beng unknowns. Then one has k j= λ jf j P ) = c for all T. Ths s a system of lnear equatons wth T equatons and k unknowns. It can be solved n On 3 ) tme. Ths completes the proof. REFERENCES [] A. Ashkhmn, A. Barg and S. Ltsyn, New upper bounds on generalzed weghts, IEEE. Trans. Inform. Theory, 45, pp , 999. [2] G. D. Cohen, S. N. Ltsyn and G. Zémor, Upper bounds on generalzed dstances, IEEE. Trans. Inform. Theory, 40, pp , 994. [3] P. Elas, Lst-decodng for nosy channels, MIT, Res. Lab. Electron., Cambrdge, MA, Tech. Rep. 335, 957. [4] P. Elsa, Codng for two nosy channels, Informaton Theory, Thrd London Symposum, pp. 6-76, 995. [5] A. Garca, H. Stchenoth, A tower of Artn-Schreer extensons of functon felds attanng the Drnfeld-Vlădut bound, Inventones Mathematcae, 2, pp.2 222, 995. [6] V. Guruswam, Lst decodng from erasure: Bounds and code constructons, IEEE. Trans. Inform. Theory, 49, pp , [7] V. Guruswam, Lst decodng of error correctng codes, Number 3282 n Lecture Notes n Computer Scence. Sprnger, [8] V. Guruswam and P. Indyk, Lnear-tme st decodng n error-free settngs, Lecture Notes n Computer Scence. 342, PP , [9] V. Guruswam and P. Indyk, Near-optmal lnear tme codes for unque decodng and new lst-decodable codes over small alphabets, In Proceedngs of the 34nd Annual ACM Symposum on Theory of Computng, pp.82-82, [0] V. Guruswam and M. Sudan, Lst decodng algorthms for certan cancatenated codes, In Proceedngs of the 32nd Annual ACM Symposum on Theory of Computng, pp.8-90, [] T. Helleseth, T. Kløve, V. I. Levenshten and Ø. Ytrehus, Bounds on mnmum support weghts, IEEE. Trans. Inform. Theory, 4, pp , 995. [2] S. Lng and C. P. Xng, Codng Theory A Frst Course, Cambrdge Unversty Press, [3] R. Pellkaan, On the gonalty of curves, abundant codes and decodng, Lecture notes n Math., 58, 32-44, Sprnger, Berln, 992. [4] K. W. Shum, I. Aleshnkov, P. V. Kummer, H. Stchtenoth and V. Deolalkar, A low-complexty algorthm for the constructon of algebrac-geometry codes better than the Glbert-Varshamov bound, IEEE. Trans. Inform. Theory, 47, pp , 200. [5] H. Stchtenoth, Algebrac Functon Felds and Codes, Sprnger Verlag, 993. [6] M. Sudan, Lst decodng: Algorthms and applcatons, SIGACT news, 3, pp.6-27, [7] V. We, Generalzed Hammng weght for lnear codes, IEEE. Trans. Inform. Theory, 37, pp.42-48, 99. [8] J. M. Wozencraft, Lst decodng, Quarterly Progress Report MIT, Res. Lab. Electron., Cambrdge, MA, 48, 958. [9] V. V. Zyablov and M. S. Pnsker, Lst cascade decodng n Russan), Probl. Inf. Transm., 7, pp.29-34, 98.

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Math 217 Fall 2013 Homework 2 Solutions

Math 217 Fall 2013 Homework 2 Solutions Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Low-discrepancy sequences using duality and global function fields

Low-discrepancy sequences using duality and global function fields ACTA ARITHMETICA 130.1 (2007) Low-dscrepancy sequences usng dualty and global functon felds by Harald Nederreter (Sngapore) and FerruhÖzbudak (Sngapore and Ankara) 1. Introducton. Let s 1 be an nteger

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Application of Fuzzy Algebra in Automata theory

Application of Fuzzy Algebra in Automata theory Amercan Journal of Engneerng Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-2, pp-21-26 www.ajer.org Research Paper Applcaton of Fuzzy Algebra n Automata theory Kharatt Lal Dept.

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Restricted divisor sums

Restricted divisor sums ACTA ARITHMETICA 02 2002) Restrcted dvsor sums by Kevn A Broughan Hamlton) Introducton There s a body of work n the lterature on varous restrcted sums of the number of dvsors of an nteger functon ncludng

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

On the size of quotient of two subsets of positive integers.

On the size of quotient of two subsets of positive integers. arxv:1706.04101v1 [math.nt] 13 Jun 2017 On the sze of quotent of two subsets of postve ntegers. Yur Shtenkov Abstract We obtan non-trval lower bound for the set A/A, where A s a subset of the nterval [1,

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Group Analysis of Ordinary Differential Equations of the Order n>2

Group Analysis of Ordinary Differential Equations of the Order n>2 Symmetry n Nonlnear Mathematcal Physcs 997, V., 64 7. Group Analyss of Ordnary Dfferental Equatons of the Order n> L.M. BERKOVICH and S.Y. POPOV Samara State Unversty, 4430, Samara, Russa E-mal: berk@nfo.ssu.samara.ru

More information

On the Stopping Distance and the Stopping Redundancy of Codes

On the Stopping Distance and the Stopping Redundancy of Codes On the Stoppng Dstance and the Stoppng Redundancy of Codes Moshe Schwartz Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. moosh@everest.ucsd.edu Abstract It s now well known that the performance

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q. Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

Algebraic properties of polynomial iterates

Algebraic properties of polynomial iterates Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

From the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm

From the Euclidean Algorithm for Solving a Key Equation for Dual Reed Solomon Codes to the Berlekamp-Massey Algorithm 1 / 32 From the Eucldean Algorthm for Solvng a Key Equaton for Dual Reed Solomon Codes to the Berlekamp-Massey Algorthm Mara Bras-Amorós, Mchael E O Sullvan The Claude Shannon Insttute Workshop on Codng

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

Self-complementing permutations of k-uniform hypergraphs

Self-complementing permutations of k-uniform hypergraphs Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

Fixed points of IA-endomorphisms of a free metabelian Lie algebra

Fixed points of IA-endomorphisms of a free metabelian Lie algebra Proc. Indan Acad. Sc. (Math. Sc.) Vol. 121, No. 4, November 2011, pp. 405 416. c Indan Academy of Scences Fxed ponts of IA-endomorphsms of a free metabelan Le algebra NAIME EKICI 1 and DEMET PARLAK SÖNMEZ

More information

Bernoulli Numbers and Polynomials

Bernoulli Numbers and Polynomials Bernoull Numbers and Polynomals T. Muthukumar tmk@tk.ac.n 17 Jun 2014 The sum of frst n natural numbers 1, 2, 3,..., n s n n(n + 1 S 1 (n := m = = n2 2 2 + n 2. Ths formula can be derved by notng that

More information

General viscosity iterative method for a sequence of quasi-nonexpansive mappings

General viscosity iterative method for a sequence of quasi-nonexpansive mappings Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

STAT 309: MATHEMATICAL COMPUTATIONS I FALL 2018 LECTURE 16

STAT 309: MATHEMATICAL COMPUTATIONS I FALL 2018 LECTURE 16 STAT 39: MATHEMATICAL COMPUTATIONS I FALL 218 LECTURE 16 1 why teratve methods f we have a lnear system Ax = b where A s very, very large but s ether sparse or structured (eg, banded, Toepltz, banded plus

More information

Representation theory and quantum mechanics tutorial Representation theory and quantum conservation laws

Representation theory and quantum mechanics tutorial Representation theory and quantum conservation laws Representaton theory and quantum mechancs tutoral Representaton theory and quantum conservaton laws Justn Campbell August 1, 2017 1 Generaltes on representaton theory 1.1 Let G GL m (R) be a real algebrac

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997

More information

where a is any ideal of R. Lemma 5.4. Let R be a ring. Then X = Spec R is a topological space Moreover the open sets

where a is any ideal of R. Lemma 5.4. Let R be a ring. Then X = Spec R is a topological space Moreover the open sets 5. Schemes To defne schemes, just as wth algebrac varetes, the dea s to frst defne what an affne scheme s, and then realse an arbtrary scheme, as somethng whch s locally an affne scheme. The defnton of

More information

On the irreducibility of a truncated binomial expansion

On the irreducibility of a truncated binomial expansion On the rreducblty of a truncated bnomal expanson by Mchael Flaseta, Angel Kumchev and Dmtr V. Pasechnk 1 Introducton For postve ntegers k and n wth k n 1, defne P n,k (x = =0 ( n x. In the case that k

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

9 Characteristic classes

9 Characteristic classes THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Short running title: A generating function approach A GENERATING FUNCTION APPROACH TO COUNTING THEOREMS FOR SQUARE-FREE POLYNOMIALS AND MAXIMAL TORI

Short running title: A generating function approach A GENERATING FUNCTION APPROACH TO COUNTING THEOREMS FOR SQUARE-FREE POLYNOMIALS AND MAXIMAL TORI Short runnng ttle: A generatng functon approach A GENERATING FUNCTION APPROACH TO COUNTING THEOREMS FOR SQUARE-FREE POLYNOMIALS AND MAXIMAL TORI JASON FULMAN Abstract. A recent paper of Church, Ellenberg,

More information

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

Smarandache-Zero Divisors in Group Rings

Smarandache-Zero Divisors in Group Rings Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the

More information

Module 3: Element Properties Lecture 1: Natural Coordinates

Module 3: Element Properties Lecture 1: Natural Coordinates Module 3: Element Propertes Lecture : Natural Coordnates Natural coordnate system s bascally a local coordnate system whch allows the specfcaton of a pont wthn the element by a set of dmensonless numbers

More information

Graph Theoretic Methods in Coding Theory

Graph Theoretic Methods in Coding Theory Graph Theoretc Methods n Codng Theory Salm El Rouayheb 1 and Costas N. Georghades 2 1 ECE Department,Texas A&M Unversty, College Staton, TX 77843 salm@ece.tamu.edu 2 ECE Department,Texas A&M Unversty,

More information

On Finite Rank Perturbation of Diagonalizable Operators

On Finite Rank Perturbation of Diagonalizable Operators Functonal Analyss, Approxmaton and Computaton 6 (1) (2014), 49 53 Publshed by Faculty of Scences and Mathematcs, Unversty of Nš, Serba Avalable at: http://wwwpmfnacrs/faac On Fnte Rank Perturbaton of Dagonalzable

More information

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights ACTA ET COMMENTATIONES UNIVERSITATIS TARTUENSIS DE MATHEMATICA Volume 7, Number 2, December 203 Avalable onlne at http://acutm.math.ut.ee A note on almost sure behavor of randomly weghted sums of φ-mxng

More information

Root Structure of a Special Generalized Kac- Moody Algebra

Root Structure of a Special Generalized Kac- Moody Algebra Mathematcal Computaton September 04, Volume, Issue, PP8-88 Root Structu of a Specal Generalzed Kac- Moody Algebra Xnfang Song, #, Xaox Wang Bass Department, Bejng Informaton Technology College, Bejng,

More information

Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity

Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity Constructon of reslent S-boxes wth hgher-dmensonal vectoral outputs and strctly almost optmal nonlnearty WeGuo Zhang and LuYang L ISN Laboratory, Xdan Unversty, X an 710071, Chna e-mal: zwg@xdaneducn Enes

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

MEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x

MEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x MEM633 Lectures 7&8 Chapter 4 Descrptons of MIMO Systems 4- Drect ealzatons y() s s su() s y () s u () s ( s)( s) s y() s u (), s y() s u() s s s y() s u(), s y() s u() s ( s)( s) s () ( s ) y ( s) u (

More information

arxiv: v1 [math.ho] 18 May 2008

arxiv: v1 [math.ho] 18 May 2008 Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

A summation on Bernoulli numbers

A summation on Bernoulli numbers Journal of Number Theory 111 (005 37 391 www.elsever.com/locate/jnt A summaton on Bernoull numbers Kwang-Wu Chen Department of Mathematcs and Computer Scence Educaton, Tape Muncpal Teachers College, No.

More information

Geometry of Müntz Spaces

Geometry of Müntz Spaces WDS'12 Proceedngs of Contrbuted Papers, Part I, 31 35, 212. ISBN 978-8-7378-224-5 MATFYZPRESS Geometry of Müntz Spaces P. Petráček Charles Unversty, Faculty of Mathematcs and Physcs, Prague, Czech Republc.

More information

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

The Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices

The Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices Internatonal Mathematcal Forum, Vol 11, 2016, no 11, 513-520 HIKARI Ltd, wwwm-hkarcom http://dxdoorg/1012988/mf20166442 The Jacobsthal and Jacobsthal-Lucas Numbers va Square Roots of Matrces Saadet Arslan

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information