Refined Coding Bounds for Network Error Correction

Size: px
Start display at page:

Download "Refined Coding Bounds for Network Error Correction"

Transcription

1 Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong Raymond W. Yeung Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong Abstract Wth respect to a gven set of local encodng kernels defnng a lnear network code, refned versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton are proved by the weght propertes of network codes. Ths refned Sngleton bound s also proved to be tght for lnear message sets. Index Terms Network error correcton codng, network Hammng weght, Sngleton bound, Glbert-Varshamov bound. I. INTRODUCTION The network error correcton problem studed n [1] [5] s to extend classcal error correcton codng theory to a general network settng. The concept of network error correcton codng was frst ntroduced by Ca Yeung [1] [3]. They generalzed the Hammng bound, the Sngleton bound the Glbert-Varshamov bound n classcal error correcton codng to network codng. Zhang [4] ntroduced the mnmum rank for lnear network codes, whch plays a role smlar to that of the mnmum dstance n decodng classcal error-correctng codes. Recently, network generalzatons of the Hammng weght, the Hammng dstance, the mnmum dstance of network codes have been obtaned by Yang Yeung [5]. In terms of the mnmum dstance, the capablty of a network code for error correcton, error detecton, erasure correcton can be fully characterzed. The relaton between network codng maxmum dstance separaton (MDS codes n classcal algebrac codng has been clarfed n [6]. In ths paper, we present stronger versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton compared wth those bounds obtaned n [1] [3]. Our proofs of these bounds are based on the weght propertes of network codes [5]. An algorthm that constructs a lnear network codes achevng a refned Sngleton bound from a classcal lnear block code has recently been presented n [9]. In ths paper, we present a dfferent constructve proof to the tghtness of the Sngleton bound wth respect to a gven sets of global encodng kernels defnng a lnear network code. Ths paper s organzed as follows. Secton II formulates the network error correcton problem. Secton III revews the weght propertes of network codes. The codng bounds are proved n Secton IV. In the last secton we summarze our work. II. PROBLEM FORMULATION We study network transmsson n a drected acyclc communcaton network represented by G = (V, E, where V s the set of nodes E s the set of edges n the network. We assume an order on the edge set E whch s consstent wth the assocated partal order of the drected acyclc network G. An edge from node a to node b, say edge e, represents a communcaton channel from node a to node b. We call node a (node b the tal (head of edge e, denoted by tal(e (head(e. In(a = {e E : head(e = a} Out(a = {e E : tal(e = a} be the sets of nput edges output edges of node a, respectvely. There can be multple edges between a par of nodes, each edge can transmt one symbol n a fnte feld F. A multcast on G transmts nformaton from a source node s to a set of snk nodes T. n s = Out(s. The source node s modulates the nformaton to be multcast nto a row vector x F ns called the message vector. The set of all message vectors, a subset of F n s, s called the message set denoted by C. The source node s transmts the message vector by mappng ts n s components onto the edges n Out(s. Defne an n s E matrx A = [A,j ] as { 1 ej s the th edge n Out(s, A,j = (1 0 otherwse. By applyng the order on E to Out(s, the n s non-zero columns of A form an dentty matrx. An error vector z s an E -dmensonal row vector wth each component representng the error on the correspondng edge. An error pattern s a subset of E. An error vector s sad to match an error pattern f all the errors occur on the edges n the error pattern. The set of all error vectors that match error pattern ρ s denoted by ρ. ρ z be the error pattern correspondng to the non-zero components of an error vector z. For network G, a lnear network error-correctng code, or a lnear network code for brevty, s specfed by a set of local encodng kernels {k e,e : e, e E} the message set C. The local encodng kernel k e,e can be non-zero only f e In(tal(e. Defne the E E one-step transton matrx

2 K = [K,j ] for network G as K,j = k e,e j. ( For an acyclc network, K N = 0 for some postve nteger N. Defne the transfer matrx of the network by F = (I K 1 [7], so that the symbols transmtted on the edges are gven by the components of (xa + zf. For a snk node t T, wrte n t = In(t, defne an E n t matrx B t = [B,j ] for snk node t as Defnton : For any snk node t, the network Hammng dstance between two receved vectors y 1 y s defned by Dt rec (y 1, y = Wt rec (y 1 y ; (8 the network Hammng dstance between two message vectors x 1 x s defned by D msg t (x 1, x = W msg t (x 1 x. (9 B,j = { 1 e s the jth edge n In(t, 0 otherwse. (3 Defnton 3: The uncast mnmum dstance of a network code wth message set C for snk node t s defned by Agan by applyng the order on E to In(t, the n t nonzero rows of B t form an dentty matrx. The recepton at a snk node t s gven by y t = (xa + zf B t, = xf s,t + zf t, (4 where F s,t = AF B t s the submatrx of F gven by the ntersecton of the n s rows correspondng to the edges n Out(s the n t columns correspondng to the edges n In(t, F t = F B t s the submatrx of F formed by the columns of F correspondng to the nput edges of snk node t. F s,t F t are the transfer matrces of message transmsson error transmsson, respectvely, for snk node t. Denote the rank of F s,t by m t. Euaton (4 s the formulaton of the multcast network error correcton problem gven n [4]. The classcal error correcton problem s a specal case n whch both of F s,t F t reduce to dentty matrces. The message transmsson capacty of the network code, n the absence of errors, s measured by the rank of the transfer matrx F s,t. Denote the maxmum flow between source node s snk node t by maxflow(s,t. Evdently, for any lnear network code on G, the rank of F s,t s upper bounded by maxflow(s,t [6]. When the network s error-free, the error correcton problem s reduced to the usual network codng problem, for whch the sze of the message set C s bounded by mn maxflow(s,t [8]. III. PREVIOUS RESULTS A. Weght Propertes of Network Codes For any t T, let Υ t (y = {z F E : zf t = y} for a receved vector y Im(F t = {z F t : z F E }. Defnton 1: For any snk node t, the network Hammng weghts of a receved vector y, of an error vector z, of a message vector x are defned by respectvely. W rec t (y = mn z Υ t (y w H(z, (5 Wt err (z = Wt rec (zf t, (6 W msg t (x = Wt rec (xf s,t, (7 d mn,t = mn{d msg t (x, x : x, x C, x x }. (10 Theorem 1 ( [5]: For a snk node t, the followng fve propertes of a network code are euvalent: 1 The code can correct any error vector z wth w H (z d/; The code can correct any error vector z wth Wt err (z d/; 3 The code can detect any error vector z wth 0 < w H (z d; 4 The code can detect any error vector z wth 0 < Wt err (z d; 5 The code has d mn,t d + 1; where d s a nonnegatve nteger. B. Codng Bounds d mn = mn d mn,t, (11 n = mn maxflow(s, t. (1 In terms of the noton of mnmum dstance, the Hammng bound the Sngleton bound for network codes obtaned n [] can be restated as C where r = d mn 1, =0 n ( n, (13 C n dmn+1. (14 The tghtness of (14 has been proved n [3]. IV. REFINED CODING BOUNDS In ths secton, we employ the tools of network Hammng weght to prove refned versons of the codng bounds n [1] [3]. The proofs presented here are consderably smpler more transparent.

3 A. Hammng Bound Sngleton Bound Theorem (Hammng bound Sngleton bound: A network code wth rank(f s,t = m t, message set C, uncast mnmum dstance d mn,t > 0 for any snk node t satsfes the 1 Hammng bound: C t =0 m t where r t = d mn,t 1, the Sngleton bound: C m t d mn,t +1, (15 (16 for all snk node t. Proof: Fx a snk node t. Fnd m t lnearly ndependent rows of F s,t let ρ t be the set of edges n Out(s that corresponds to these m t lnearly ndependent rows. Note that ρ t Out(s E, so that ρ t s an error pattern. Defne the set C t = {x F n s : x A ρ t, x F s,t = xf s,t for some x C}, (17 where the matrx A s defned as (1. Defne a mappng φ t : C C t (18 by φ t (x = x f x F s,t = xf s,t. Snce the rows of F s,t ndexed by ρ t form a bass for the row space of F s,t, φ t s well-defned. The mappng φ t s onto by the defnton of C t. The mappng φ t s also one-to-one because otherwse there exsts x C t such that x F s,t = x 1 F s,t = x F s,t for dstnct x 1, x C, a contradcton to the assumpton that d mn,t > 0. Thus the mappng φ t s a one-to-one onto mappng, whch mples that C t = C. Z t = {z ρ t : w H (z r t }. (19 By Theorem 1, the network code wth C beng the message set can correct all the errors n Z t at snk node t. Snce snk node t has the same recepton for the transmsson of ether x C or φ t (x C t for the same error vector, the network code wth C t beng the message set can also correct all the errors n Z t at snk node t. Consder the problem of fndng a subset of ρ t as an errorcorrectng code that can correct all the errors n Z t. Ths problem s euvalent to the problem n classcal algebrac codng of fndng a block code wth codeword length m t that can correct r t errors. The vectors n the set C t = {xa : x C t} must form such a code, otherwse the network code wth C t beng the message set cannot possbly correct all the error vectors n Z t at snk node t. Applyng the Hammng bound the Sngleton bound for classcal error-correctng codes to C t, we have C t t =0 mt, (0 C t mt dmn,t+1. (1 The proof s completed by notng that C = C t = C t. The Hammng bound the Sngleton bound n Theorem are more refned than those n [1], [] because as we wll show, they mply (13 (14 but not vce versa. The Hammng bound n Theorem mples C t =0 =0 mt mt maxflow(s,t =0 ( maxflow(s,t ( (3 (4 for all snk nodes t, where (3 follows from r r t (4 follows from m t maxflow(s, t the neualty proved n the Appendx. By the same neualty, upon mnmzng over all snk nodes t T, we obtan (13. To verfy that the condton for the neualty n the Appendx apples n the above, by consderng the Sngleton bound n (16, we obtan or for all t T. Then 1 C (5 mt dmn,t+1 (6 d mn,t 1 m t (7 r = d mn 1 (8 d mn,t 1 (9 d mn,t 1 (30 m t (31 for all t T. For the Sngleton bound n Theorem, we frst note that t s maxmzed when m t = maxflow(s, t for all t T. Ths can be acheved by a lnear broadcast whose exstence was proved n [10], [6]. To show that the Sngleton bound n Theorem mples (14, consder C m t d mn,t +1 m t d mn +1 maxflow(s,t d mn+1 (3 (33 (34 for all snk nodes t. Then (14 s obtaned upon mnmzng over all t T. B. Glbert Bound Varshamov Bound t (x, d = {x F ns For x = 0, we can wrte t (0, d = {x F ns : D msg t (x, x d}. (35 : W msg t (x d}. (36

4 Then t s readly seen that t (0, d s closed under scalar multplcaton,.e., α t (0, d = {αx : x t (0, d} = t (0, d, (37 where α F α 0. For two subsets V 1, V F ns, ther sum s the set defned by V 1 + V = {v 1 + v : v 1 V 1, v V }. (38 For v F ns V F ns, we also wrte {v} + V as v + V. Theorem 3 (Glbert bound: Gven a set of local encodng kernels, let C max be the maxmum possble sze of the message set such that the network code has uncast mnmum dstance greater than or eual to d t > 0 for each snk node t. Then, where C max ns (0, (39 (0 = t (0, d t 1. (40 Proof: C be the message set wth the maxmum possble sze. Then for any x F n s, there exsts a codeword c C a snk node t such that D msg t (x, c d t 1, (41 snce otherwse we could add x to the message set whle keepng the mnmum dstance larger than or eual to d t for each snk node t, whch s a contradcton on the maxmalty of C. (c = t (c, d t 1. (4 Hence, the whole space F n s s contaned n the unon of (c over all messages c C,.e., F n s c C (c. (43 Snce (c = c + (0, we have (c = (0. So we deduce that ns C (0, that s C ns (0. (44 Theorem 4 (Varshamov bound: Gven a set of local encodng kernels, let ω max be the maxmum possble dmenson of the lnear message set such that the network code has uncast mnmum dstance larger than or eual to d t > 0 for each snk node t. Then, ω max n s log (0, (45 where (0 s defned n (40. Proof: C be the lnear message set wth the maxmum possble dmenson. We clam that F ns (0 + C. (46 If the clam s true, then ns = (0 + C (47 (0 C (48 = (0 ω max, (49 provng (45. The clam s proved by contradcton. g F ns \ ( (0 + C, (50 C = C + g. Then C s a subspace wth dmenson ω max +1. If C (0 {0}, then there exsts a non-zero vector c + αg (0, (51 where c C α F. Here, α 0, otherwse we have c = 0 because C (0 = {0}. Snce t (0, d t 1 s closed under scalar multplcaton for all t T, see from (40 that the same holds for (0. Thus from (51, g (0 α 1 c (5 (0 + C, (53 whch s a contradcton to (50. Therefore, C (0 = {0},.e., C s a message set such that the network code has uncast mnmum dstance larger than or eual to d t, whch s a contradcton on the maxmalty of C. The proof s completed. C. Tghtness of the Sngleton Bound Theorem 5: Gven a set of local encodng kernels over a fnte feld wth sze where s suffcently large, for every 0 ω mn m t, (54 there exsts a message set C wth C = ω such that d mn,t = + 1 (55 for all snk nodes t. Proof: we start wth any gven set of local encodng kernels whch defnes a lnear network code. Ths determnes m t for all snk nodes t. Fx an ω whch satsfes (54. We wll then construct an ω-dmensonal lnear message set whch together wth the gven lnear network code consttute a lnear network error-correctng code that satsfy (55 for all t. Note that (54 (55 mply d mn,t 1. (56 We now construct the message set C. g 1,, g ω F n s be a seuence of vectors obtaned as follows. For each, 1 ω, choose g such that g / t (0, + g 1,, g 1, (57 t (0, g 1,, g = {0}, (58

5 for each snk node t. If such g 1,, g ω exst, then C = g 1,, g ω s the desred message set snce (58 holdng for = ω means d mn,t + 1 for any snk node t. We frst prove that g satsfyng (57 exsts f the feld sze s suffcently large. Observe that t (0, + g 1,, g 1 t (0, 1 (59 ( E mt ω n s m t 1 (60 ( E = ns ω+ 1. (61 Thus, when consderng all the snk nodes, we have at most ( E n s ω+ 1 (6 vectors that cannot be chosen as g. If > ( E, (63 then there exsts a vector that can be chosen as g for = 1,, ω. Fx g 1,, g ω that satsfy (57. We proof by nducton that (58 holds for these g any snk node t. If (58 does not hold for = 1, then there exsts a non-zero vector αg 1 t (0,, where α F. Snce t (0, s closed under scalar multplcaton α 0, we have g 1 t (0,, a contradcton to (57 holdng for g 1. Assume (58 holds for k 1. If (58 does not hold for = k, then there exsts a non-zero vector k α g t (0,, (64 =1 where α F. If α k = 0, k 1 α g t (0,, (65 =1 a contradcton to the assumpton that (58 holds for = k 1. Thus α k 0. Agan, by t (0, beng closed under scalar multplcaton, we have k 1 g k t (0, α 1 k α g (66 =1 t (0, + g 1,, g k 1, (67 a contradcton to g k satsfyng (57. The proof s completed. The neualty m ( m =0 APPENDIX PROOF OF AN INEQUALITY < m+1 r =0 for r m/ can be establshed by consderng m ( m =0 = < =0 m+1 (m +1 m+1 m+1 =0 (68 (69, (70 where (70 holds because (m +1 m+1 > 1 gven that r m/. REFERENCES [1] N. Ca R. W. Yeung, Network codng error correcton, n Proc. IEEE ITW 0, 00. [] R. W. Yeung N. Ca, Network error correcton, part I: basc concepts upper bounds, Communcatons n Informaton Systems, vol. 6, no. 1, pp , 006. [3] N. Ca R. W. Yeung, Network error correcton, part II: lower bounds, Communcatons n Informaton Systems, vol. 6, no. 1, pp , 006. [4] Z. Zhang, Network error correcton codng n packetzed networks, n Proc. IEEE ITW 06, Oct [5] S. Yang R. W. Yeung, Characterzatons of network error correcton/detecton erasure correcton, n Proc. NetCod 07, Jan [6] R. W. Yeung, S.-Y. R. L, N. Ca, Z. Zhang, Network codng theory, Foundaton Trends n Communcatons Informaton Theory, vol., no. 4 5, pp , 005. [7] R. Koetter M. Medard, An algebrac approach to network codng, IEEE/ACM Trans. Networkng, vol. 11, no. 5, pp , Oct [8] R. Ahlswede, N. Ca, S.-Y. R. L, R. W. Yeung, Network nformaton flow, IEEE Trans. Inform. Theory, vol. 46, no. 4, pp , July 000. [9] S. Yang, C. K. Nga, R. W. Yeung, Constructon of lnear network codes that acheve a refned Sngleton bound, submtted to ISIT 07. [10] S.-Y. R. L, R. W. Yeung, N. Ca, Lnear network codng, IEEE Trans. Inform. Theory, vol. 49, no., pp , Feb [11] S. Jagg, P. Sers, P. A. Chou, M. Effros, S. Egner, K. Jan, L. Tolhuzen, Polynomal tme algorthms for multcast network code constructon, IEEE Trans. Inform. Theory, vol. 51, no. 6, pp , June 005. V. CONCLUDING REMARKS Refned versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton n [1] [3] are obtaned. Ths refned Sngleton bound s also shown to be tght for lnear message sets. By employng the tools of network Hammng weght, the proofs presented here are consderably smpler more transparent.

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

The Fundamental Theorem of Distributed Storage Systems Revisited

The Fundamental Theorem of Distributed Storage Systems Revisited The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

9 Characteristic classes

9 Characteristic classes THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.

} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q. Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Smarandache-Zero Divisors in Group Rings

Smarandache-Zero Divisors in Group Rings Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the

More information

Self-complementing permutations of k-uniform hypergraphs

Self-complementing permutations of k-uniform hypergraphs Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Long MDS Codes for Optimal Repair Bandwidth

Long MDS Codes for Optimal Repair Bandwidth Long MDS Codes for Optmal Repar Bandwdth Zhyng Wang, Itzhak Tamo, and Jehoshua Bruck Electrcal Engneerng Department, Calforna Insttute of Technology, Pasadena, CA 91125, USA Electrcal and Computer Engneerng,

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

Linear Algebra and its Applications

Linear Algebra and its Applications Lnear Algebra and ts Applcatons 4 (00) 5 56 Contents lsts avalable at ScenceDrect Lnear Algebra and ts Applcatons journal homepage: wwwelsevercom/locate/laa Notes on Hlbert and Cauchy matrces Mroslav Fedler

More information

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations Quantum Network Code for Multple-Uncast Network wth Quantum Invertble Lnear Operatons Seunghoan Song Graduate School of Mathematcs, Nagoya Unversty, Nagoya, Japan m702a@mathnagoya-uacjp Masahto Hayash

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

PRIMES 2015 reading project: Problem set #3

PRIMES 2015 reading project: Problem set #3 PRIMES 2015 readng project: Problem set #3 page 1 PRIMES 2015 readng project: Problem set #3 posted 31 May 2015, to be submtted around 15 June 2015 Darj Grnberg The purpose of ths problem set s to replace

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Coding over an Erasure Channel with a Large Alphabet Size

Coding over an Erasure Channel with a Large Alphabet Size 1 Codng over an Erasure Channel wth a Large Alphabet Sze Shervan Fashand, Shahab Oves Gharan and Amr K. Khandan ECE Dept., Unversty of Waterloo, Waterloo, O, Canada, 2L3G1 emal: sfashand,shahab,khandan}@cst.uwaterloo.ca

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Genericity of Critical Types

Genericity of Critical Types Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1. 7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)

More information

Spectral Graph Theory and its Applications September 16, Lecture 5

Spectral Graph Theory and its Applications September 16, Lecture 5 Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

P.P. PROPERTIES OF GROUP RINGS. Libo Zan and Jianlong Chen

P.P. PROPERTIES OF GROUP RINGS. Libo Zan and Jianlong Chen Internatonal Electronc Journal of Algebra Volume 3 2008 7-24 P.P. PROPERTIES OF GROUP RINGS Lbo Zan and Janlong Chen Receved: May 2007; Revsed: 24 October 2007 Communcated by John Clark Abstract. A rng

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

The Second Eigenvalue of Planar Graphs

The Second Eigenvalue of Planar Graphs Spectral Graph Theory Lecture 20 The Second Egenvalue of Planar Graphs Danel A. Spelman November 11, 2015 Dsclamer These notes are not necessarly an accurate representaton of what happened n class. The

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

MEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x

MEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x MEM633 Lectures 7&8 Chapter 4 Descrptons of MIMO Systems 4- Drect ealzatons y() s s su() s y () s u () s ( s)( s) s y() s u (), s y() s u() s s s y() s u(), s y() s u() s ( s)( s) s () ( s ) y ( s) u (

More information

Quantum and Classical Information Theory with Disentropy

Quantum and Classical Information Theory with Disentropy Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

General viscosity iterative method for a sequence of quasi-nonexpansive mappings

General viscosity iterative method for a sequence of quasi-nonexpansive mappings Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,

More information

Erasure List-Decodable Codes from Random and Algebraic Geometry Codes

Erasure List-Decodable Codes from Random and Algebraic Geometry Codes Erasure Lst-Decodable Codes from Random and Algebrac Geometry Codes Yang Dng, Lngfe Jn and Chaopng Xng arxv:40.276v [cs.it] 3 Jan 204 Abstract Erasure lst decodng was ntroduced to correct a larger number

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Mixed-integer vertex covers on bipartite graphs

Mixed-integer vertex covers on bipartite graphs Mxed-nteger vertex covers on bpartte graphs Mchele Confort, Bert Gerards, Gacomo Zambell November, 2006 Abstract Let A be the edge-node ncdence matrx of a bpartte graph G = (U, V ; E), I be a subset the

More information

Solutions to the 71st William Lowell Putnam Mathematical Competition Saturday, December 4, 2010

Solutions to the 71st William Lowell Putnam Mathematical Competition Saturday, December 4, 2010 Solutons to the 7st Wllam Lowell Putnam Mathematcal Competton Saturday, December 4, 2 Kran Kedlaya and Lenny Ng A The largest such k s n+ 2 n 2. For n even, ths value s acheved by the partton {,n},{2,n

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

MDS Array Codes for Correcting a Single Criss-Cross Error

MDS Array Codes for Correcting a Single Criss-Cross Error 1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Wreless Informaton Transmsson System Lab Chapter 6 BCH Codes Insttute of Communcatons Engneerng Natonal Sun Yat-sen Unversty Outlne Bnary Prmtve BCH Codes Decodng of the BCH Codes Implementaton of Galos

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

An Introduction to Morita Theory

An Introduction to Morita Theory An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

Expected Value and Variance

Expected Value and Variance MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Decoding of the Triple-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Triple-Error-Correcting Binary Quadratic Residue Codes Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at http://pubs.scepub.com/acs/// Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be

More information

STEINHAUS PROPERTY IN BANACH LATTICES

STEINHAUS PROPERTY IN BANACH LATTICES DEPARTMENT OF MATHEMATICS TECHNICAL REPORT STEINHAUS PROPERTY IN BANACH LATTICES DAMIAN KUBIAK AND DAVID TIDWELL SPRING 2015 No. 2015-1 TENNESSEE TECHNOLOGICAL UNIVERSITY Cookevlle, TN 38505 STEINHAUS

More information