Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Size: px
Start display at page:

Download "Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product."

Transcription

1 Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code. It was discovered by Muller in 1954, and the first decoding algorith was devised by Reed also in For each positive integer and each integer r with 0 r, there is an r th Reed-Muller Code RM (r, ), which is a binary linear code of paraeters [ 2, ( ) + 0 ( ) ( ) ], 2 r. r order Note that RM (1, ) code is a sall code (n 2 ) with a large iniu distance (n 2 1 ), so a good decoding algorith is the ost eleentary: for each received word w, find a codeword in RM (1, ) closed to, w. This can be done very efficiently. In fact, RM (1, 5) was used by Mariner 9 to transit black and white pictures of Mars back to the Earth in Definition. There are any ways to define the Reed-Muller codes. First we choose an inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. The zeroth order Reed-Muller codes RM (0, ), for 0, are defined to be the repetition codes { 0, 1 } of length 2. RM (0, 0) {0, 1} IK, RM (0, 1) {0 0, }, RM (0, 2) { , }, The first order Reed-Muller codes RM (1, ) are binary codes defined for all integers 1, recursively by: (i) RM (1, 1) { 0 0,, 1 0, } IK 2. (ii) For 1, RM (1, + 1) { (u, u) : u RM (1, ) } { (u, u + 1) : u RM (1, ) }. Exaple. RM (1, 2) { (x, y + x) : x { }, y { 0 0 }} , ,, 0 0, 1 0, 1 0,, , RM (1, 3) , , , 0 0, , , , Diension. For 1, the Reed-Muller code RM (1, ) is a binary [ 2, + 1, 2 ] 1 linear code, in which every codeword except 0 and 1 has weight 2 1. RM ( 1, ) consists of all binary words of length 2 that have even weight.

2 Coding Theory Reed-Muller Codes Page 2 Theore 1. The codes RM (r, ) and RM ( r 1, ) are dual of each other. Proof. Let B r, and B r 1, be( orthonoral ) ( ) bases( of) RM (r, ) and and RM ( r 1, ), respectively. Then B contains linearly independent vectors and ( ) ( ) 0 ( 1 ) r B r 1, contains linearly independent vectors. The facts r 1 that and [( ) ( ) ( )] [( ) r r + 1 ) ( ) ( ) ( ) (,,..., 1 1 ( 0 ( + r + 2 ) r 1 ) ( )] + ( ). r + 1 iply that the vector space IK is generated by the union of two orthonoral bases B and B r 1,. Hence the code RM ( r 1, ) is the dual of RM (r, ) According to this theore, RM (r, 2 r+1) codes are self dual. Thus RM (1, 3) and RM (2, 5) are self-dual. Generator Matrix. Rather than using the recursive description of the code, we will give a recursive construction for the generator atrix of RM (r, ) code, which we will denote by G(r, ). For r 0, define G(0, ) [... ], and for r, define G(, ) G( 1, ) If G(r, ) is a generator atrix for RM (r, ), then a generator atrix for RM (r, + 1) is Exaples. G(r, + 1) [ G(r, ) G(r, ) ] 0 G(r 1, ) G(0, 1) [ ], G(0, 2) [ ], G(0, 3) [ ], G(1, 1) G(1, 1) G(1, 1), G(1, 2), θ G(0, 1) 0 0 G(1, 2) G(1, 2) G(1, 2) G(2, 2), G(1, 3), θ G(0, 2) G(2, 2) G(2, 2) G(2, 3) , and G(2, 3) G(3, 3). θ G(1, 2)

3 Coding Theory Reed-Muller Codes Page 3 Corollary 1.1. The parity-check atrix of G(r, ) is G( r 1, ) t. Proof. According to Theore 1, the generator G(r, ) of RM (r, ) is orthogonal to the generator G( r 1, ) of RM ( r 1, ). This clearly iplies that the parity-check atrix of G(r, ) is G( r 1, ) t. Theore 2. For r > 0, the code RM (r, 1) is contained in RM (r, ). Proof. We prove by induction. We start with G(1, + 1) G(1, ) G(1, ). 0 G(0, ) (Since the top row entries of [ G(1, ) G(1, ) ] are all ones. we conclude that RM (0, ) [ ] is contained in RM (1, ). In general, since G(r 1, 1) is a sub-atrix of G(r 1, ) and G(r 2, 1) is a sub-atrix of G(r 1, 1) we have obviously G(r 1, ) G(r 1, 1) G(r 1, 1) 0 G(r 2, 1) a sub-atrix of G(r, ). Thus RM (r, 1) is contained in RM (r, ). Corollary 2.1. For any integer 2, the code RM ( 2, ) is an extended Haing code and RM (1, ) is its dual code. Prof. Recall that any [ 2, 2 1, 3 ] code is a Haing code and any [ 2, 2 1, 4 ] code is an extended Haing code. Since RM ( 2, ) is a [ 2, 2 1, 4 ] code, we conclude that that it is an extended Haing code. The reainder of the proof follows fro Theore 1. An iediate result of this corollary is that RM (1, 3) is a self dual code. Kronecker Product. The Kronecker product also called tensor product or the direct product of two atrices A (a(ij)) and B is defined as follows: a 11 B a 12 B... a 1n B a A B 21 B a 22 B... a 2n B a 1 B a 2 B... a n B For exaple G(1, 1) G(1, 1) G(1, 2). Thus by using the Kronecker product, we ay build generators for Reed-Muller codes. Here is how we define the generators: Let G 0 [ ], Z 1 Z, G(0, 0) [ 1 ], and J [ ]. Then

4 Coding Theory Reed-Muller Codes Page 4 (1) G(0, 1) J G(0, 0) [ ] and Z 2 Z 1 Z 1 [ 0 0 ]. (2) G(0, 2) [ ], G(1, 2), and G(22) (3) Z 3 Z Z 2 [ ], G(0, 3) J G(02) [ 1 ] J G(1, 2) G(1, 3). Z G(0, 2) Note that the above atrix G(1, 3) G(3 2, 3) generates an extended self-dual Haing code. For exaple, G(0, 1) [ ], G(0, 2) [ ], G(0, 3) [ ], G(1, 1) G(1, 1) G(1, 1), G(1, 2) 01 01, 01 θ G(0, 1) G(1, 2) 0101 G(1, 2) G(1, 2) G(2, 2), G(1, 3), θ G(0, 2) G(2, 2) G(2, 2) G(2, 3) , and G(2, 3) G(3, 3) θ G(1, 2) Reed Decoding This decoding algorith is quite siple. we explain the algorith with the RM (1, 3) code which is also a self dual extended Haing code. Since the diension of RM (1, 3) is four and the generator atrix RM (1, 3) has four rows, we conclude that the rows of v 1 v G(1, 3) 2 v v for a basis of the one-error-correcting code RM (1, 3). Exaple 1. Suppose the word w [ 0 0 ] was received. Clearly there is at least one error involved (Why?) Step 1. We express w as a linear cobination of v 1, v 2, v 3, v 4. Thus w [ 0 0 ] λ 1 v 1 + λ 2 v 1 + λ 3 v 3 + λ 4 v 4 [ λ 1, λ 1 + λ 2, λ 1 + λ 3, λ 1 + λ 2 + λ 3, λ 1 + λ 4, λ 1 + λ 2 + λ 4, λ 1 + λ 3 + λ 4, λ 1 + λ 2 + λ 3 + λ 4 ].

5 Coding Theory Reed-Muller Codes Page 5 Step 2. If there is no error in the first digit, then λ 1 0, λ 2 1, λ 3 0, λ 4 1. But in the sixth colun we have λ 2 + λ , which is a contradiction. Thus the sixth digit of w ust be changed fro 1 to zero. Note that the word v [ 0 0 ] is a codeword. Exaple 2. Suppose the word w [ ] was received with at ost one digit-error. Solution. If there is no error in the first digit, then λ 1 1, λ 2 1, λ 3 0, λ 4 1. But we have contradictions in the sixth, seventh, and eight coluns. Since the word v [ ] is a codeword, we conclude that the error occurred in the first digit. Exercise. Suppose the following words were received using the RM (1, 3) code: w 1 [ 0 1 ] w 2 [ ] w 3 [ ] w 4 [ 0 0 ] Use Reed Decoding algorith to decode the above words, assuing that in each word, there is at ost one digit-error. Hadaard Matrices. A Hadaard atrix of order n is an n n atrix H n with eleents 1 and - 1 such that H n Hn t n I n (i.e., H n is orthogonal). For exaple, H 1 [1], H 2. An n n Hadaard atrix with n > 2 exists only 1 1 if 4 divides n. For n > 4, in order to construct a Hadaard atrix of order n using the Kronecker product, n ust be divisible by 8. H 4 H 2 H Since H n Hn t n I n, any two different rows of H n ust be orthogonal, and the atrix obtained fro the perutation of rows or coluns of H n is also a Hadaard atrix, but the syetry ay be lost. Clearly H n is also a Hadaard atrix. Decoding Algorith for First order Reed-Muller Codes, Using Hadaard Matrices. The RM (1, ) code ay be decoded using a Hadaard atrix H 2 and the 1 1 Kronecker product. This algorith requires that for j 1, 2,...,, the atrices H j I 2 j H I 2 j 1 be constructed first. For exaple, for RM (1, ) code, we need to construct: 0 0 H I 2 H, H2 2 H I

6 Coding Theory Reed-Muller Codes Page H I 4 H I 1 I 4 H H I 2 H I H I 1 H I 4 H I The recursive nature of the construction of RM (1, ) codes suggests that there is a recursive approach to decoding as well. Fast Decoding Algorith for RM(1,). The generator atrix G(1, ) of the RM (1, ) code, changes the essage a [a 0, a 1, a 2,..., a ] of zeros and ones into a codeword v [v 0, v 1, v 2,...,... v 2 1]. Suppose the word v was sent and the word w (w 0, w 1, w 2,......,, w 2 1) is received. To decode w, we proceed as follows: Step 1. First, we replace all the zeros by -1 in w to obtain w 0 as follows: Step 2. For j 2, 3,...,, copute: w 0 2 w e, where e [ 1, 1, 1,..., 1, 1, 1 ]. w 1 w 0 H 1, w 2 w 1 H 2, w 3 w 2 H 3,, w 1 w 2 H 1, w w 1 H. Step 3. Find the position i 0 of w (w,0, w,1,..., w,2 ), where w,i0 coponent, in absolute value. is the largest Let v(i 0 ) IK be the binary representation of i , , , , ,

7 Coding Theory Reed-Muller Codes Page 7 If w,i0 is positive, then, the presued essage is [1, v(i 0 )], and if it is negative, then the presued essage is [0, v(i 0 )]. Note. In the above stateent, the presued essage does not ean that it is the correct essage. To ake sure that the essage obtained fro this ethod is the sent essage, we should encode the essage with the generator atrix G(1, ) and copared it with the received word w; only if the encoded word is equal to w, then we ay assert that the procedure was successful. Exaples. Consider the Reed-Muller code RM(1, 3) generated by the atrix G(1, 3). a. Suppose the word w 1 0 is received, then: Step 1. w 0 2 w e (1, 1, 1, 1, 1, 1, 1, 1). Step 2. Copute: w 1 w 0 H 1 3 [ 0, 2, 0, 2, 0, 2, 2, 0 ] w 2 w 1 H 2 3 [ 0, 4, 0, 0, 2, 2, 2, 2 ] w 3 w 2 H 3 3 [ 2, 6, 2, 2, 2, 2, 2, 2 ] Step 3. The second coponent of w 3 is 6 occurring in position 1. Since v(1) 100 and 6 > 0, then the presued essage is a 0 0. b. Suppose w is the received word, then Step 1. w 0 2 w e [ 1, 1, 1, 1, 1, 1, 1, 1 ]. Step 2. Copute: w 1 w 0 H 1 3 [0, 2, 2, 0, 2, 0, 2, 0 ] w 2 w 1 H 2 3 [ 2, 2, 2, 2, 4, 0, 0, 0 ] w 3 w 2 H 3 3 [2, 2, 2, 2, 6, 2, 2, 2 ] Step 3. The fifth coponent of w 3 is 6 occurring in position 4. Since v(4) 001 and 6 < 0, then the presued essage is a Matlab. % Choose, then define the Hadaard atrix H 2. >> 3 ; H hadaard ( 2 ) ; % Use H 2 to define H 1, H 2,..., H. >> H31 kron ( eye(4), H ) ; H32 kron ( kron ( eye(2), H ), eye(2) ) ; >> H33 kron( H, eye(4) ) Exaple a. Suppose the received word is: >> wa [1 0 ] wa 1 0 STEP 1. Replace all the zero coponents of wa by -1. >> xa wa ones (1, 8) ; wxa wa + xa

8 Coding Theory Reed-Muller Codes Page 8 wxa 1 1 STEP 2. Now we evaluate: >> wxa1 wxa H31, wxa2 wxa1 H32, wxa3 wxa2 H33 wxa1 wxa2 wxa STEP3. The larges coponent of wxa3 (in absolute value) is 6 occurring in position 1 (the first position is position zero). The binary position of 6 is va1 [ ] va Since 6 is positive, the presued essage is va [ 0 0 ] va 0 0 The first position is position zero, so the binary position of 2 is 000. Exaple b. Suppose the received word is: wb [ ] wb STEP 1. Replace all the zero coponents of wa by -1. >> xb wb ones (1, 8) ; wxb wb + xb wxb STEP 2. Now we valuate >> wxb1 wxb H31, wxb2 wxb1 H32, wxb3 wxb2 H33 wxb1 wxb2 wxb STEP3. The larges coponent of wxb3 (in absolute value) is 6, occurring in position 4. The binary position of 6 is vb4 [ 0 ] vb4

9 Coding Theory Reed-Muller Codes Page 9 0 Since -6 is negative, the presued essage is: vb [ 0 0 ] vb 0 0 The first position is position zero, so the binary position of 2 is % Suppose the vector ŵ is received. Then w 0 2 w e (1, 1, 1, 1, 1, 1, 1, 1). >> w [ , ] ; e ones(1, 2 ) ; w 0 2 w e w % Define w 1 w 0 H 1 3, w 2 w 1 H 2 3, and w 3 w 2 H 3 3 >> w1 w 0 H31, w2 w 1 H32, w3 w 2 H33 ; w w w % 4 v(4) 0 and 6 < 0, so a 0 0. >> a 0 0 a 0 0 Exercises. Consider the Reed-Muller code RM (1, 3), then decode the following received words: (a) w (b) w (c) w Mariner 9 and Reed-Muller RM(1,5) Code. Mariner 9 was the first spaceship to be put into orbit around Mars. As it was entioned previously, the ain reason for selecting the Hadaard [Reed-Muller(32,64,16)] code RM (1, 5), for transitting black and white pictures of the planet was its fast decoding algorith. Since RM (1, 5) is a 6 diensional code, there is a basis with 6 eleents (any linear cobination of which gives a code word). The data type 6-tuple is used to provide the coefficients for the linear cobination of the basis vectors. Thus associating a unique codeword to each data type. This siple coputation can be hard wired and requires no eory.

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Hadamard Codes. A Hadamard matrix of order n is a matrix H n with elements 1 or 1 such that H n H t n = n I n. For example,

Hadamard Codes. A Hadamard matrix of order n is a matrix H n with elements 1 or 1 such that H n H t n = n I n. For example, Coding Theory Massoud Malek Hadamard Codes A Hadamard matrix of order n is a matrix H n with elements 1 or 1 such that H n H t n = n I n. For example, [ ] 1 1 1 1 1 1 1 1 1 1 H 1 = [1], H 2 =, H 1 1 4

More information

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587. AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the Chapter 6 Introduction to binary block codes In this chapter we b e g i n to study binary signal constellations, which are the Euclidean-space iages of binary block codes. Such constellations have bit

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

Reed-Muller codes for random erasures and errors

Reed-Muller codes for random erasures and errors Reed-Muller codes for rando erasures and errors Eanuel Abbe Air Shpilka Avi Wigderson Abstract This paper studies the paraeters for which Reed-Muller (RM) codes over GF (2) can correct rando erasures and

More information

Coding Theory. Golay Codes

Coding Theory. Golay Codes Coding Theory Massoud Malek Golay Codes The Golay codes are examples of perfect codes; they were discovered by the Swiss mathematician and information theorist, Marcel J. E. Golay in 1949. A binary Golay

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

Binary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0

Binary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0 Coding Theory Massoud Malek Binary Linear Codes Generator and Parity-Check Matrices. A subset C of IK n is called a linear code, if C is a subspace of IK n (i.e., C is closed under addition). A linear

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Monochromatic images

Monochromatic images CHAPTER 8 Monochroatic iages 1 The Central Sets Theore Lea 11 Let S,+) be a seigroup, e be an idepotent of βs and A e There is a set B A in e such that, for each v B, there is a set C A in e with v+c A

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k 12 VICTORIA HOSKINS 3. Algebraic group actions and quotients In this section we consider group actions on algebraic varieties and also describe what type of quotients we would like to have for such group

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

Physics 139B Solutions to Homework Set 3 Fall 2009

Physics 139B Solutions to Homework Set 3 Fall 2009 Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about

More information

Introduction to Optimization Techniques. Nonlinear Programming

Introduction to Optimization Techniques. Nonlinear Programming Introduction to Optiization echniques Nonlinear Prograing Optial Solutions Consider the optiization proble in f ( x) where F R n xf Definition : x F is optial (global iniu) for this proble, if f( x ) f(

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX 77005

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

c 2010 Society for Industrial and Applied Mathematics

c 2010 Society for Industrial and Applied Mathematics SIAM J MATRIX ANAL APPL Vol 31, No 4, pp 1848 1872 c 21 Society for Industrial and Applied Matheatics STOCHASTIC GALERKIN MATRICES OLIVER G ERNST AND ELISABETH ULLMANN Abstract We investigate the structural,

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

i ij j ( ) sin cos x y z x x x interchangeably.)

i ij j ( ) sin cos x y z x x x interchangeably.) Tensor Operators Michael Fowler,2/3/12 Introduction: Cartesian Vectors and Tensors Physics is full of vectors: x, L, S and so on Classically, a (three-diensional) vector is defined by its properties under

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

Estimating Parameters for a Gaussian pdf

Estimating Parameters for a Gaussian pdf Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

A GENERAL FORM FOR THE ELECTRIC FIELD LINES EQUATION CONCERNING AN AXIALLY SYMMETRIC CONTINUOUS CHARGE DISTRIBUTION

A GENERAL FORM FOR THE ELECTRIC FIELD LINES EQUATION CONCERNING AN AXIALLY SYMMETRIC CONTINUOUS CHARGE DISTRIBUTION A GENEAL FOM FO THE ELECTIC FIELD LINES EQUATION CONCENING AN AXIALLY SYMMETIC CONTINUOUS CHAGE DISTIBUTION BY MUGU B. ăuţ Abstract..By using an unexpected approach it results a general for for the electric

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

A Study on B-Spline Wavelets and Wavelet Packets

A Study on B-Spline Wavelets and Wavelet Packets Applied Matheatics 4 5 3-3 Published Online Noveber 4 in SciRes. http://www.scirp.org/ournal/a http://dx.doi.org/.436/a.4.5987 A Study on B-Spline Wavelets and Wavelet Pacets Sana Khan Mohaad Kaliuddin

More information

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

TC08 / 6. Hadamard codes SX

TC08 / 6. Hadamard codes SX TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose

More information

Exact tensor completion with sum-of-squares

Exact tensor completion with sum-of-squares Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David

More information

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007 Deflation of the I-O Series 1959-2. Soe Technical Aspects Giorgio Rapa University of Genoa g.rapa@unige.it April 27 1. Introduction The nuber of sectors is 42 for the period 1965-2 and 38 for the initial

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements 1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Genetic Algorithm Search for Stent Design Improvements

Genetic Algorithm Search for Stent Design Improvements Genetic Algorith Search for Stent Design Iproveents K. Tesch, M.A. Atherton & M.W. Collins, South Bank University, London, UK Abstract This paper presents an optiisation process for finding iproved stent

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1]

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1] MATHEMATICS OF COMPUTATION Volue 00, Nuber 0, Pages 000 000 S 0025-578(XX)0000-0 THE CONSTRUCTION OF GOOD EXTENSIBLE RANK- LATTICES JOSEF DICK, FRIEDRICH PILLICHSHAMMER, AND BENJAMIN J. WATERHOUSE Abstract.

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction Finding Rightost Eigenvalues of Large Sparse Non-syetric Paraeterized Eigenvalue Probles Applied Matheatics and Scientific Coputation Progra Departent of Matheatics University of Maryland, College Par,

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications Average Consensus and Gossip Algoriths in Networks with Stochastic Asyetric Counications Duarte Antunes, Daniel Silvestre, Carlos Silvestre Abstract We consider that a set of distributed agents desire

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

On the Maximum Number of Codewords of X-Codes of Constant Weight Three

On the Maximum Number of Codewords of X-Codes of Constant Weight Three On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv:190.097v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba

More information

Solutions of Discretized Affine Toda Field Equations for A (1)

Solutions of Discretized Affine Toda Field Equations for A (1) arxiv:solv-int/9610011v2 9 Dec 1997 Solutions of Discretized Affine Toda Field Equations for A (1) n, B n (1), C n (1), D n (1), A (2) n and D (2) n+1 Zengo Tsuboi Institute of Physics, University of Tokyo

More information

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY

More information

ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS

ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS R. A. Lewin, I. F. Mikenberg and M. G. Schwarze Pontificia Universidad Católica de Chile Abstract We study the atrices, reduced atrices and algebras associated

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

Introduction to Robotics (CS223A) (Winter 2006/2007) Homework #5 solutions

Introduction to Robotics (CS223A) (Winter 2006/2007) Homework #5 solutions Introduction to Robotics (CS3A) Handout (Winter 6/7) Hoework #5 solutions. (a) Derive a forula that transfors an inertia tensor given in soe frae {C} into a new frae {A}. The frae {A} can differ fro frae

More information