Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.
|
|
- Austen Walker
- 6 years ago
- Views:
Transcription
1 Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code. It was discovered by Muller in 1954, and the first decoding algorith was devised by Reed also in For each positive integer and each integer r with 0 r, there is an r th Reed-Muller Code RM (r, ), which is a binary linear code of paraeters [ 2, ( ) + 0 ( ) ( ) ], 2 r. r order Note that RM (1, ) code is a sall code (n 2 ) with a large iniu distance (n 2 1 ), so a good decoding algorith is the ost eleentary: for each received word w, find a codeword in RM (1, ) closed to, w. This can be done very efficiently. In fact, RM (1, 5) was used by Mariner 9 to transit black and white pictures of Mars back to the Earth in Definition. There are any ways to define the Reed-Muller codes. First we choose an inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. The zeroth order Reed-Muller codes RM (0, ), for 0, are defined to be the repetition codes { 0, 1 } of length 2. RM (0, 0) {0, 1} IK, RM (0, 1) {0 0, }, RM (0, 2) { , }, The first order Reed-Muller codes RM (1, ) are binary codes defined for all integers 1, recursively by: (i) RM (1, 1) { 0 0,, 1 0, } IK 2. (ii) For 1, RM (1, + 1) { (u, u) : u RM (1, ) } { (u, u + 1) : u RM (1, ) }. Exaple. RM (1, 2) { (x, y + x) : x { }, y { 0 0 }} , ,, 0 0, 1 0, 1 0,, , RM (1, 3) , , , 0 0, , , , Diension. For 1, the Reed-Muller code RM (1, ) is a binary [ 2, + 1, 2 ] 1 linear code, in which every codeword except 0 and 1 has weight 2 1. RM ( 1, ) consists of all binary words of length 2 that have even weight.
2 Coding Theory Reed-Muller Codes Page 2 Theore 1. The codes RM (r, ) and RM ( r 1, ) are dual of each other. Proof. Let B r, and B r 1, be( orthonoral ) ( ) bases( of) RM (r, ) and and RM ( r 1, ), respectively. Then B contains linearly independent vectors and ( ) ( ) 0 ( 1 ) r B r 1, contains linearly independent vectors. The facts r 1 that and [( ) ( ) ( )] [( ) r r + 1 ) ( ) ( ) ( ) (,,..., 1 1 ( 0 ( + r + 2 ) r 1 ) ( )] + ( ). r + 1 iply that the vector space IK is generated by the union of two orthonoral bases B and B r 1,. Hence the code RM ( r 1, ) is the dual of RM (r, ) According to this theore, RM (r, 2 r+1) codes are self dual. Thus RM (1, 3) and RM (2, 5) are self-dual. Generator Matrix. Rather than using the recursive description of the code, we will give a recursive construction for the generator atrix of RM (r, ) code, which we will denote by G(r, ). For r 0, define G(0, ) [... ], and for r, define G(, ) G( 1, ) If G(r, ) is a generator atrix for RM (r, ), then a generator atrix for RM (r, + 1) is Exaples. G(r, + 1) [ G(r, ) G(r, ) ] 0 G(r 1, ) G(0, 1) [ ], G(0, 2) [ ], G(0, 3) [ ], G(1, 1) G(1, 1) G(1, 1), G(1, 2), θ G(0, 1) 0 0 G(1, 2) G(1, 2) G(1, 2) G(2, 2), G(1, 3), θ G(0, 2) G(2, 2) G(2, 2) G(2, 3) , and G(2, 3) G(3, 3). θ G(1, 2)
3 Coding Theory Reed-Muller Codes Page 3 Corollary 1.1. The parity-check atrix of G(r, ) is G( r 1, ) t. Proof. According to Theore 1, the generator G(r, ) of RM (r, ) is orthogonal to the generator G( r 1, ) of RM ( r 1, ). This clearly iplies that the parity-check atrix of G(r, ) is G( r 1, ) t. Theore 2. For r > 0, the code RM (r, 1) is contained in RM (r, ). Proof. We prove by induction. We start with G(1, + 1) G(1, ) G(1, ). 0 G(0, ) (Since the top row entries of [ G(1, ) G(1, ) ] are all ones. we conclude that RM (0, ) [ ] is contained in RM (1, ). In general, since G(r 1, 1) is a sub-atrix of G(r 1, ) and G(r 2, 1) is a sub-atrix of G(r 1, 1) we have obviously G(r 1, ) G(r 1, 1) G(r 1, 1) 0 G(r 2, 1) a sub-atrix of G(r, ). Thus RM (r, 1) is contained in RM (r, ). Corollary 2.1. For any integer 2, the code RM ( 2, ) is an extended Haing code and RM (1, ) is its dual code. Prof. Recall that any [ 2, 2 1, 3 ] code is a Haing code and any [ 2, 2 1, 4 ] code is an extended Haing code. Since RM ( 2, ) is a [ 2, 2 1, 4 ] code, we conclude that that it is an extended Haing code. The reainder of the proof follows fro Theore 1. An iediate result of this corollary is that RM (1, 3) is a self dual code. Kronecker Product. The Kronecker product also called tensor product or the direct product of two atrices A (a(ij)) and B is defined as follows: a 11 B a 12 B... a 1n B a A B 21 B a 22 B... a 2n B a 1 B a 2 B... a n B For exaple G(1, 1) G(1, 1) G(1, 2). Thus by using the Kronecker product, we ay build generators for Reed-Muller codes. Here is how we define the generators: Let G 0 [ ], Z 1 Z, G(0, 0) [ 1 ], and J [ ]. Then
4 Coding Theory Reed-Muller Codes Page 4 (1) G(0, 1) J G(0, 0) [ ] and Z 2 Z 1 Z 1 [ 0 0 ]. (2) G(0, 2) [ ], G(1, 2), and G(22) (3) Z 3 Z Z 2 [ ], G(0, 3) J G(02) [ 1 ] J G(1, 2) G(1, 3). Z G(0, 2) Note that the above atrix G(1, 3) G(3 2, 3) generates an extended self-dual Haing code. For exaple, G(0, 1) [ ], G(0, 2) [ ], G(0, 3) [ ], G(1, 1) G(1, 1) G(1, 1), G(1, 2) 01 01, 01 θ G(0, 1) G(1, 2) 0101 G(1, 2) G(1, 2) G(2, 2), G(1, 3), θ G(0, 2) G(2, 2) G(2, 2) G(2, 3) , and G(2, 3) G(3, 3) θ G(1, 2) Reed Decoding This decoding algorith is quite siple. we explain the algorith with the RM (1, 3) code which is also a self dual extended Haing code. Since the diension of RM (1, 3) is four and the generator atrix RM (1, 3) has four rows, we conclude that the rows of v 1 v G(1, 3) 2 v v for a basis of the one-error-correcting code RM (1, 3). Exaple 1. Suppose the word w [ 0 0 ] was received. Clearly there is at least one error involved (Why?) Step 1. We express w as a linear cobination of v 1, v 2, v 3, v 4. Thus w [ 0 0 ] λ 1 v 1 + λ 2 v 1 + λ 3 v 3 + λ 4 v 4 [ λ 1, λ 1 + λ 2, λ 1 + λ 3, λ 1 + λ 2 + λ 3, λ 1 + λ 4, λ 1 + λ 2 + λ 4, λ 1 + λ 3 + λ 4, λ 1 + λ 2 + λ 3 + λ 4 ].
5 Coding Theory Reed-Muller Codes Page 5 Step 2. If there is no error in the first digit, then λ 1 0, λ 2 1, λ 3 0, λ 4 1. But in the sixth colun we have λ 2 + λ , which is a contradiction. Thus the sixth digit of w ust be changed fro 1 to zero. Note that the word v [ 0 0 ] is a codeword. Exaple 2. Suppose the word w [ ] was received with at ost one digit-error. Solution. If there is no error in the first digit, then λ 1 1, λ 2 1, λ 3 0, λ 4 1. But we have contradictions in the sixth, seventh, and eight coluns. Since the word v [ ] is a codeword, we conclude that the error occurred in the first digit. Exercise. Suppose the following words were received using the RM (1, 3) code: w 1 [ 0 1 ] w 2 [ ] w 3 [ ] w 4 [ 0 0 ] Use Reed Decoding algorith to decode the above words, assuing that in each word, there is at ost one digit-error. Hadaard Matrices. A Hadaard atrix of order n is an n n atrix H n with eleents 1 and - 1 such that H n Hn t n I n (i.e., H n is orthogonal). For exaple, H 1 [1], H 2. An n n Hadaard atrix with n > 2 exists only 1 1 if 4 divides n. For n > 4, in order to construct a Hadaard atrix of order n using the Kronecker product, n ust be divisible by 8. H 4 H 2 H Since H n Hn t n I n, any two different rows of H n ust be orthogonal, and the atrix obtained fro the perutation of rows or coluns of H n is also a Hadaard atrix, but the syetry ay be lost. Clearly H n is also a Hadaard atrix. Decoding Algorith for First order Reed-Muller Codes, Using Hadaard Matrices. The RM (1, ) code ay be decoded using a Hadaard atrix H 2 and the 1 1 Kronecker product. This algorith requires that for j 1, 2,...,, the atrices H j I 2 j H I 2 j 1 be constructed first. For exaple, for RM (1, ) code, we need to construct: 0 0 H I 2 H, H2 2 H I
6 Coding Theory Reed-Muller Codes Page H I 4 H I 1 I 4 H H I 2 H I H I 1 H I 4 H I The recursive nature of the construction of RM (1, ) codes suggests that there is a recursive approach to decoding as well. Fast Decoding Algorith for RM(1,). The generator atrix G(1, ) of the RM (1, ) code, changes the essage a [a 0, a 1, a 2,..., a ] of zeros and ones into a codeword v [v 0, v 1, v 2,...,... v 2 1]. Suppose the word v was sent and the word w (w 0, w 1, w 2,......,, w 2 1) is received. To decode w, we proceed as follows: Step 1. First, we replace all the zeros by -1 in w to obtain w 0 as follows: Step 2. For j 2, 3,...,, copute: w 0 2 w e, where e [ 1, 1, 1,..., 1, 1, 1 ]. w 1 w 0 H 1, w 2 w 1 H 2, w 3 w 2 H 3,, w 1 w 2 H 1, w w 1 H. Step 3. Find the position i 0 of w (w,0, w,1,..., w,2 ), where w,i0 coponent, in absolute value. is the largest Let v(i 0 ) IK be the binary representation of i , , , , ,
7 Coding Theory Reed-Muller Codes Page 7 If w,i0 is positive, then, the presued essage is [1, v(i 0 )], and if it is negative, then the presued essage is [0, v(i 0 )]. Note. In the above stateent, the presued essage does not ean that it is the correct essage. To ake sure that the essage obtained fro this ethod is the sent essage, we should encode the essage with the generator atrix G(1, ) and copared it with the received word w; only if the encoded word is equal to w, then we ay assert that the procedure was successful. Exaples. Consider the Reed-Muller code RM(1, 3) generated by the atrix G(1, 3). a. Suppose the word w 1 0 is received, then: Step 1. w 0 2 w e (1, 1, 1, 1, 1, 1, 1, 1). Step 2. Copute: w 1 w 0 H 1 3 [ 0, 2, 0, 2, 0, 2, 2, 0 ] w 2 w 1 H 2 3 [ 0, 4, 0, 0, 2, 2, 2, 2 ] w 3 w 2 H 3 3 [ 2, 6, 2, 2, 2, 2, 2, 2 ] Step 3. The second coponent of w 3 is 6 occurring in position 1. Since v(1) 100 and 6 > 0, then the presued essage is a 0 0. b. Suppose w is the received word, then Step 1. w 0 2 w e [ 1, 1, 1, 1, 1, 1, 1, 1 ]. Step 2. Copute: w 1 w 0 H 1 3 [0, 2, 2, 0, 2, 0, 2, 0 ] w 2 w 1 H 2 3 [ 2, 2, 2, 2, 4, 0, 0, 0 ] w 3 w 2 H 3 3 [2, 2, 2, 2, 6, 2, 2, 2 ] Step 3. The fifth coponent of w 3 is 6 occurring in position 4. Since v(4) 001 and 6 < 0, then the presued essage is a Matlab. % Choose, then define the Hadaard atrix H 2. >> 3 ; H hadaard ( 2 ) ; % Use H 2 to define H 1, H 2,..., H. >> H31 kron ( eye(4), H ) ; H32 kron ( kron ( eye(2), H ), eye(2) ) ; >> H33 kron( H, eye(4) ) Exaple a. Suppose the received word is: >> wa [1 0 ] wa 1 0 STEP 1. Replace all the zero coponents of wa by -1. >> xa wa ones (1, 8) ; wxa wa + xa
8 Coding Theory Reed-Muller Codes Page 8 wxa 1 1 STEP 2. Now we evaluate: >> wxa1 wxa H31, wxa2 wxa1 H32, wxa3 wxa2 H33 wxa1 wxa2 wxa STEP3. The larges coponent of wxa3 (in absolute value) is 6 occurring in position 1 (the first position is position zero). The binary position of 6 is va1 [ ] va Since 6 is positive, the presued essage is va [ 0 0 ] va 0 0 The first position is position zero, so the binary position of 2 is 000. Exaple b. Suppose the received word is: wb [ ] wb STEP 1. Replace all the zero coponents of wa by -1. >> xb wb ones (1, 8) ; wxb wb + xb wxb STEP 2. Now we valuate >> wxb1 wxb H31, wxb2 wxb1 H32, wxb3 wxb2 H33 wxb1 wxb2 wxb STEP3. The larges coponent of wxb3 (in absolute value) is 6, occurring in position 4. The binary position of 6 is vb4 [ 0 ] vb4
9 Coding Theory Reed-Muller Codes Page 9 0 Since -6 is negative, the presued essage is: vb [ 0 0 ] vb 0 0 The first position is position zero, so the binary position of 2 is % Suppose the vector ŵ is received. Then w 0 2 w e (1, 1, 1, 1, 1, 1, 1, 1). >> w [ , ] ; e ones(1, 2 ) ; w 0 2 w e w % Define w 1 w 0 H 1 3, w 2 w 1 H 2 3, and w 3 w 2 H 3 3 >> w1 w 0 H31, w2 w 1 H32, w3 w 2 H33 ; w w w % 4 v(4) 0 and 6 < 0, so a 0 0. >> a 0 0 a 0 0 Exercises. Consider the Reed-Muller code RM (1, 3), then decode the following received words: (a) w (b) w (c) w Mariner 9 and Reed-Muller RM(1,5) Code. Mariner 9 was the first spaceship to be put into orbit around Mars. As it was entioned previously, the ain reason for selecting the Hadaard [Reed-Muller(32,64,16)] code RM (1, 5), for transitting black and white pictures of the planet was its fast decoding algorith. Since RM (1, 5) is a 6 diensional code, there is a basis with 6 eleents (any linear cobination of which gives a code word). The data type 6-tuple is used to provide the coefficients for the linear cobination of the basis vectors. Thus associating a unique codeword to each data type. This siple coputation can be hard wired and requires no eory.
Feature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationHadamard Codes. A Hadamard matrix of order n is a matrix H n with elements 1 or 1 such that H n H t n = n I n. For example,
Coding Theory Massoud Malek Hadamard Codes A Hadamard matrix of order n is a matrix H n with elements 1 or 1 such that H n H t n = n I n. For example, [ ] 1 1 1 1 1 1 1 1 1 1 H 1 = [1], H 2 =, H 1 1 4
More informationAN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.
AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More information60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the
Chapter 6 Introduction to binary block codes In this chapter we b e g i n to study binary signal constellations, which are the Euclidean-space iages of binary block codes. Such constellations have bit
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationPage 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011
Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for
More informationThe Fundamental Basis Theorem of Geometry from an algebraic point of view
Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article
More informationReed-Muller codes for random erasures and errors
Reed-Muller codes for rando erasures and errors Eanuel Abbe Air Shpilka Avi Wigderson Abstract This paper studies the paraeters for which Reed-Muller (RM) codes over GF (2) can correct rando erasures and
More informationCoding Theory. Golay Codes
Coding Theory Massoud Malek Golay Codes The Golay codes are examples of perfect codes; they were discovered by the Swiss mathematician and information theorist, Marcel J. E. Golay in 1949. A binary Golay
More informationPhysics 215 Winter The Density Matrix
Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it
More informationFinite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields
Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for
More informationBinary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0
Coding Theory Massoud Malek Binary Linear Codes Generator and Parity-Check Matrices. A subset C of IK n is called a linear code, if C is a subspace of IK n (i.e., C is closed under addition). A linear
More informationarxiv: v1 [math.nt] 14 Sep 2014
ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row
More informationPolynomial Division By Convolution
Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationMonochromatic images
CHAPTER 8 Monochroatic iages 1 The Central Sets Theore Lea 11 Let S,+) be a seigroup, e be an idepotent of βs and A e There is a set B A in e such that, for each v B, there is a set C A in e with v+c A
More informationError Detection and Correction: Hamming Code; Reed-Muller Code
Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation
More informationComputational and Statistical Learning Theory
Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher
More informationLecture 9 November 23, 2015
CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)
More informationPoly-Bernoulli Numbers and Eulerian Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441
More informationChaotic Coupled Map Lattices
Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each
More informationTHE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n
THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra
More informationG G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k
12 VICTORIA HOSKINS 3. Algebraic group actions and quotients In this section we consider group actions on algebraic varieties and also describe what type of quotients we would like to have for such group
More information(t, m, s)-nets and Maximized Minimum Distance, Part II
(t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More information4 = (0.02) 3 13, = 0.25 because = 25. Simi-
Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =
More informationPhysics 139B Solutions to Homework Set 3 Fall 2009
Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about
More informationIntroduction to Optimization Techniques. Nonlinear Programming
Introduction to Optiization echniques Nonlinear Prograing Optial Solutions Consider the optiization proble in f ( x) where F R n xf Definition : x F is optial (global iniu) for this proble, if f( x ) f(
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationRateless Codes for MIMO Channels
Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT
More informationLow-complexity, Low-memory EMS algorithm for non-binary LDPC codes
Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering
More informationGeneralized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.
Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,
More informationA1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3
A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)
More informationDivisibility of Polynomials over Finite Fields and Combinatorial Applications
Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationIntroduction to Discrete Optimization
Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and
More informationDescent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,
Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu
More informationSaddle Points in Random Matrices: Analysis of Knuth Search Algorithms
Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX 77005
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationc 2010 Society for Industrial and Applied Mathematics
SIAM J MATRIX ANAL APPL Vol 31, No 4, pp 1848 1872 c 21 Society for Industrial and Applied Matheatics STOCHASTIC GALERKIN MATRICES OLIVER G ERNST AND ELISABETH ULLMANN Abstract We investigate the structural,
More informationarxiv: v1 [cs.ds] 29 Jan 2012
A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationNORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS
NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,
More informationLeast Squares Fitting of Data
Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a
More information3.3 Variational Characterization of Singular Values
3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationarxiv: v2 [math.co] 8 Mar 2018
Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,
More informationi ij j ( ) sin cos x y z x x x interchangeably.)
Tensor Operators Michael Fowler,2/3/12 Introduction: Cartesian Vectors and Tensors Physics is full of vectors: x, L, S and so on Classically, a (three-diensional) vector is defined by its properties under
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationSupplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators
Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical
More informationEstimating Parameters for a Gaussian pdf
Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3
More informationA note on the realignment criterion
A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,
More informationarxiv: v1 [math.na] 10 Oct 2016
GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble
More informationA GENERAL FORM FOR THE ELECTRIC FIELD LINES EQUATION CONCERNING AN AXIALLY SYMMETRIC CONTINUOUS CHARGE DISTRIBUTION
A GENEAL FOM FO THE ELECTIC FIELD LINES EQUATION CONCENING AN AXIALLY SYMMETIC CONTINUOUS CHAGE DISTIBUTION BY MUGU B. ăuţ Abstract..By using an unexpected approach it results a general for for the electric
More informationON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS
#A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno
More informationA Study on B-Spline Wavelets and Wavelet Packets
Applied Matheatics 4 5 3-3 Published Online Noveber 4 in SciRes. http://www.scirp.org/ournal/a http://dx.doi.org/.436/a.4.5987 A Study on B-Spline Wavelets and Wavelet Pacets Sana Khan Mohaad Kaliuddin
More informationRECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE
Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS
More informationSupport recovery in compressed sensing: An estimation theoretic approach
Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de
More informationSupplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion
Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish
More informationA Bernstein-Markov Theorem for Normed Spaces
A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :
More informationTC08 / 6. Hadamard codes SX
TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose
More informationExact tensor completion with sum-of-squares
Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David
More informationDeflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007
Deflation of the I-O Series 1959-2. Soe Technical Aspects Giorgio Rapa University of Genoa g.rapa@unige.it April 27 1. Introduction The nuber of sectors is 42 for the period 1965-2 and 38 for the initial
More informationCharacterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone
Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationCompressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements
1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationPattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition
More informationGenetic Algorithm Search for Stent Design Improvements
Genetic Algorith Search for Stent Design Iproveents K. Tesch, M.A. Atherton & M.W. Collins, South Bank University, London, UK Abstract This paper presents an optiisation process for finding iproved stent
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationM ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.
M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x
More informationTHE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1]
MATHEMATICS OF COMPUTATION Volue 00, Nuber 0, Pages 000 000 S 0025-578(XX)0000-0 THE CONSTRUCTION OF GOOD EXTENSIBLE RANK- LATTICES JOSEF DICK, FRIEDRICH PILLICHSHAMMER, AND BENJAMIN J. WATERHOUSE Abstract.
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationFinding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction
Finding Rightost Eigenvalues of Large Sparse Non-syetric Paraeterized Eigenvalue Probles Applied Matheatics and Scientific Coputation Progra Departent of Matheatics University of Maryland, College Par,
More informationCSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13
CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture
More informationAverage Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications
Average Consensus and Gossip Algoriths in Networks with Stochastic Asyetric Counications Duarte Antunes, Daniel Silvestre, Carlos Silvestre Abstract We consider that a set of distributed agents desire
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationOn the Maximum Number of Codewords of X-Codes of Constant Weight Three
On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv:190.097v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba
More informationSolutions of Discretized Affine Toda Field Equations for A (1)
arxiv:solv-int/9610011v2 9 Dec 1997 Solutions of Discretized Affine Toda Field Equations for A (1) n, B n (1), C n (1), D n (1), A (2) n and D (2) n+1 Zengo Tsuboi Institute of Physics, University of Tokyo
More informationThe Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters
journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn
More information#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES
#A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,
More informationPREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL
PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY
More informationALGEBRAS AND MATRICES FOR ANNOTATED LOGICS
ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS R. A. Lewin, I. F. Mikenberg and M. G. Schwarze Pontificia Universidad Católica de Chile Abstract We study the atrices, reduced atrices and algebras associated
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationIn this chapter, we consider several graph-theoretic and probabilistic models
THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions
More informationOn Certain C-Test Words for Free Groups
Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of
More informationIntroduction to Robotics (CS223A) (Winter 2006/2007) Homework #5 solutions
Introduction to Robotics (CS3A) Handout (Winter 6/7) Hoework #5 solutions. (a) Derive a forula that transfors an inertia tensor given in soe frae {C} into a new frae {A}. The frae {A} can differ fro frae
More information