Binary Puzzles as an Erasure Decoding Problem

Similar documents
Solving a Binary Puzzle

Discrete Mathematics. The Sudoku completion problem with rectangular hole pattern is NP-complete

MUTUALLY ORTHOGONAL FAMILIES OF LINEAR SUDOKU SOLUTIONS. 1. Introduction

The extended coset leader weight enumerator

The Channel Capacity of One and Two-Dimensional Constrained Codes. Xuerong Yong Department of Computer Science Hong Kong UST

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

2012 IEEE International Symposium on Information Theory Proceedings

Graph-based codes for flash memory

Arrangements, matroids and codes

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

THIS paper is aimed at designing efficient decoding algorithms

Quasi-Cyclic Asymptotically Regular LDPC Codes

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Generalized hashing and applications to digital fingerprinting

On Asymptotic Strategies for GMD Decoding with Arbitrary Error-Erasure Tradeoff

CONSTRUCTING ORDERED ORTHOGONAL ARRAYS VIA SUDOKU. 1. Introduction

Error-correcting Pairs for a Public-key Cryptosystem

Error control codes for parallel asymmetric channels

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Orthogonal diagonal sudoku solutions: an approach via linearity

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

LDPC codes based on Steiner quadruple systems and permutation matrices

An Introduction to Low Density Parity Check (LDPC) Codes

On the Number of 6 6 Sudoku Grids

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

IT is well known [1] that the performance of a messagepassing

Improved Upper Bounds on Sizes of Codes

RECURSIVE CONSTRUCTION OF (J, L) QC LDPC CODES WITH GIRTH 6. Communicated by Dianhua Wu. 1. Introduction

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Upper Bounds on the Capacity of Binary Intermittent Communication

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Constructing c-ary Perfect Factors

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

A Questionable Distance-Regular Graph

Pseudocodewords from Bethe Permanents

A SIMULATION AND GRAPH THEORETICAL ANALYSIS OF CERTAIN PROPERTIES OF SPECTRAL NULL CODEBOOKS

arxiv:cs/ v2 [cs.it] 1 Oct 2006

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

Permutation decoding for the binary codes from triangular graphs

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Practical Polar Code Construction Using Generalised Generator Matrices

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Lecture 19: Elias-Bassalygo Bound

Decoding error-correcting codes with Gröbner bases

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble

The Channel Capacity of Constrained Codes: Theory and Applications

New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices

Construction of Barnes-Wall Lattices from Linear Codes over Rings

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

The Hamming Codes and Delsarte s Linear Programming Bound

Lecture 4: Proof of Shannon s theorem and an explicit code

On the Block Error Probability of LP Decoding of LDPC Codes

IN this paper, we exploit the information given by the generalized

REED-SOLOMON CODE SYMBOL AVOIDANCE

Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels

Structured Low-Density Parity-Check Codes: Algebraic Constructions

THIS work is motivated by the goal of finding the capacity

Maximum Distance Separable Symbol-Pair Codes

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei

Constrained arrays and erasure decoding

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

CSCI3390-Lecture 16: NP-completeness

Chapter 7 Reed Solomon Codes and Binary Transmission

Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Correcting Bursty and Localized Deletions Using Guess & Check Codes

On non-antipodal binary completely regular codes

Constellation Shaping for Communication Channels with Quantized Outputs

Quick Testing of Random Sequences *

In-Memory Computing of Akers Logic Array

arxiv: v1 [cs.ds] 2 Dec 2009

Which Codes Have 4-Cycle-Free Tanner Graphs?

Lecture 8: Shannon s Noise Models

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke

Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles

Fountain Uncorrectable Sets and Finite-Length Analysis

On the Classification of Splitting (v, u c, ) BIBDs

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

Optimal Block-Type-Decodable Encoders for Constrained Systems

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

Lecture 12. Block Diagram

IN this paper, we consider the capacity of sticky channels, a

Codes over Subfields. Chapter Basics

On a perturbation method for determining group of invariance of hierarchical models

Error Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class

Phase Transitions of Random Codes and GV-Bounds

This research was partially supported by the Faculty Research and Development Fund of the University of North Carolina at Wilmington

New Constructions for De Bruijn Tori

Asymptotically good sequences of curves and codes

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes

The Continuing Miracle of Information Storage Technology Paul H. Siegel Director, CMRR University of California, San Diego

On Weight Enumerators and MacWilliams Identity for Convolutional Codes

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS

Explicit Ramsey graphs and orthonormal labelings

Optimum Binary-Constrained Homophonic Coding

A Comparison of Two Achievable Rate Regions for the Interference Channel

On the exact bit error probability for Viterbi decoding of convolutional codes

Transcription:

Binary Puzzles as an Erasure Decoding Problem Putranto Hadi Utomo Ruud Pellikaan Eindhoven University of Technology Dept. of Math. and Computer Science PO Box 513. 5600 MB Eindhoven p.h.utomo@tue.nl g.r.pellikaan@tue.nl Appeared in: Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (J. Roland, F. Horlin. Eds.) pp. 129-134, 2015 Corrected version July 28, 2016 Abstract Binary puzzles are interesting puzzles with certain rules. A solved binary puzzle is an n n binary array such that there are no three consecutive ones and also no three consecutive zeros in each row and each column, the number of ones and zeros must be equal in each row and in each column, every two rows and every two columns must be distinct. Binary puzzles can be seen as constrained arrays. Usually constrained codes and arrays are used for modulation purposes. In this paper we investigate these arrays from an erasure correcting point of view. We give lower and upper bound for the rate of these codes, the probability of correct erasure decoding and erasure decoding algorithms. 1 Introduction Sudokus are nowadays very popular puzzles and they are studied for their mathematical structure [2, 5, 18]. For instance the minimal number of entries that can be specified in a single 9 9 puzzle to ensure a unique solution was in [14] conjectured to be 17, and this was proved by means of the chromatic polynomial of the Sudoku graph [7]. Furthermore the erasure correcting capabilities and decoding algorithms of the collection of n n a Sudokus are considered [13, 16]. The asymptotic rate is still an open problem [1, 7]. Solving an n n Sudoku puzzle is an NP-hard problem [17]. The binary puzzle is also an interesting puzzle with certain rules and is the focus of this paper. We look at the mathematical theory behind it. The solved binary puzzle is an n n binary array that satisfies: 1. no three consecutive ones and also no three consecutive zeros in each row and each column, 2. every row and column is balanced, that is the number of ones and zeros must be equal in each row and in each column, 3. every two rows and every two columns must be distinct. Figure 1 is an example of a binary puzzle. There is only one solution satisfying all three conditions. But there are 3 solutions satisfying (1) and (2). The solution satisfying three all conditions is given in Figure 2. Figure 3 and 4 are solved puzzles where the third constraint is excluded.

Figure 1: Unsolved Puzzle Figure 2: Solved Puzzle Figure 3: Solved Binario Puzzle with repetition of column/row allowed Figure 4: Solved Binario Puzzle with repetition of column/row allowed

Binary and Sudoku puzzle can be seen as constrained arrays. Usually constrained codes and arrays are used for modulation purposes [8, 9]. We investigate these arrays from an erasure correcting point of view. We give lower and upper bound for the rate of these codes, the probability of correct erasure decoding and erasure decoding algorithms. 2 Constrained sequences and constrained array Let C be a code in Q n, where the alphabet Q has q elements. Recall that the (information) rate of C is defined by R(C) = log q C. n In the following Q = F 2, n = lm and F l m 2 is the set of binary l m arrays. Define: A l m = {X F l m 2 X satisfies (1) }; B l m = {X F l m 2 X satisfies (2) }; C l m = {X F l m 2 X satisfies (3) }; D l m = {X F l m 2 X satisfies (1), (2) and (3) }. The theory of constrained sequences, that is for l = 1, is well established and uses the theory of graphs and the eigenvalues of the incidence matrix to give a linear recurrence. An explicit formula for the number of such sequences of a given length m can be expressed in terms of the eigenvalues. The asymptotical rate is equal to log q (λ max ), where λ max is the largest eigenvalue. See [8, 9]. Shannon [15] showed already that the following relation holds for m 1: Asymptotically this gives A 1 (m+2) = A 1 (m+1) + A 1 m. R(A 1 m ) log 2 ( 1 2 + 1 2 5 ), for m The number of balanced sequence is equal to a number of combination of ones, that is B 1 2m = ( ) 2m m and asymptotically R(B1 2m ) 1, for m. It was shown [6, 10, 11] that the balanced property does not ( influence the asymptotic rate of constrained sequences. So R(A 1 2m B 1 2m ) log 1 + ) 1 2 2 2 5, for m. We expect that a similar result holds for balanced constrained arrays. For arrays we know that ( ) 2l m l B2l 2m ( ) 2l 2m. l From these inequalities it is can be shown that, asymptotically: 1 R(B 2 2m 2m) 1, for m Four arbitrary elements of B 2m 2m gives an element of B 4m 4m. So B 4m 4m B 2m 2m 4. Therefore R(B 2m 2m ) is increasing in m.

Now, consider C l m. We clearly have that C l m 2 m (2 m 1) (2 m n + 1). Furthermore, if m = n, C (n+1) (n+1) C n n (2 2n+1 2n2 n + n 2 ). This implies that, asymptotically: R(C 2m 2m ) 1, for m The size of D 2m 2m can be approximated by smaller building blocks such that the conditions are still satisfied [4]. There are exactly two building block of size 2 2. Hence, R(D 2m 2m ) 1 log (2m) 2 2 (2 m2 ) = 1, for m 1. 4 Numerically, we have m A 2m 2m B 2m 2m C 2m 2m D 2m 2m Size Rate Size Rate Size Rate Size Rate 1 16 1 2 0.25 10 0.83 2 0.25 2 2030 0.69 90 0.41 33864 0.94 76 0.39 3 3858082 0.61???? 5868 0.34 3 Erasure Channel Suppose Q is a set of an alphabet and C is a code in Q n. Define ˆQ = Q { }, where the symbol - denotes a blank, that is an erasure, and Ĉ = {r ˆQ n r is obtained from a c C by erasures}. Suppose r is the received word given that c is sent. We have d(r, c) is the Hamming distance between r and c. Since the errors are only blanks, d(r, c) equal to the number of blanks in r. Let c(r) be a closest codeword to r, then d(r, C) = d(r, c(r)). Let p be the probability that a symbol is erased, and let P ed,c (p) denote the probability of correct erasure decoding. Then P ed,c (p) = c C P (c) r Ĉ c(r)=c P (r c) Suppose E i (C) = {r Ĉ d(r, C) = i} and E i(c) = E i (C). Define the homogenous erasure distance enumerator for code C by E C (X, Y ) = n E i (C)X n i Y i i=0 Proposition 3.1 P ed,c (p) = 1 C E C(1 p, p)

Proposition 3.2 Let C Q m and D Q n. We have Corollary 3.3 Corollary 3.4 4 Binary Puzzle Solver E C D (X, Y ) = E C (X, Y ) E D (X, Y ) P ed,c D (p) = (P ed,c (p)) (P ed,d (p)) P ed,c n(p) = (P ed,c (p)) n Binary puzzle can be seen as a SAT problem. Since each cell in the binary puzzle can only take the values 0 and 1, we can express the puzzle as an array of binary variables, where false corresponds to 0 and true to 1. Next, we express each condition in terms of a logical expression. Suppose we have an 2m 2m array in the variables x ij. The array satisfies the first condition, that there are no three consecutive ones and also no three consecutive zeros in each row and each column, if and only if the expression below is true: ( 2m ( 2m { 2m 2 { 2m 2 ([ ([ ( k+2 j=k ( k+2 i=k x ij )] x ij )] [ [ ( k+2 j=k ( k+2 i=k x ij )])}) x ij )])}) For satisfying the second condition on balancedness, the following expression must be true ( 2m,j) m+1 ( 2m ) m+1 x ik x i,jk 2m 1 i 1 < <i m+1 2m 1 i 1 < <i m+1 2m ( m+1,j) x ik 2m 1 j 1 < <j m+1 2m 1 j 1 < <j m+1 2m ( m+1 ) x i,jk. Note that the complexity of this expression grows as ( ) 2m m which is exponentially in m. An alternative polynomial expression can be obtained. The satisfiability of the third condition, that every two rows and every two columns must be distinct, is equal to ( { 2m }) [(x i,j1 x i,j2 ) (x i,j1 x i,j2 )] 1 j 1 <j 2 2m ( 1 i 1 <i 2 2m { 2m }) [(x i1,j x i2,j) (x i1,j x i2,j)]. It is shown in [3] that the binary puzzle is NP-complete.

References [1] C. Atkins and J. Sayir, Density evolution for SUDOKU codes on the erasure channel, Proc. 8th Int. Symp. on Turbo Codes and Iterative Information Processing (ISTC), 2014. [2] R.A. Bailey, P.J. Cameron and R. Connelly, Sudoku, gerechte designs, resolutions, affine space, spreads, reguli, and Hamming codes, Amer. Math. Monthly, 115(5):383 404, 2008. [3] M. De Biasi, Binary puzzle is NP-complete, http://nearly42.org [4] T. Etzion and K.G. Paterson, Zero/positive capacities of two-dimensional runlength-constrained arrays, IEEE Trans. Information Theory, 51(9):3186 3199, Sept 2005. [5] B. Felgenhauer and A.F. Jarvis, Mathematics of Sudoku I, II Mathematical Spectrum 39:15 22, 54 58, 2006. [6] H.C. Ferreira, J.H. Weber, C.H. Heymann and K.A.S. Immink Markers to construct dc free (d, k) constrained balanced block codes using Knuths inversion Electronics Letters, 48(19):1209-1211, Sept 2012. [7] A.M. Herzberg and M. Ram Murty, Sudoku squares and chromatic polynomials, Notices Amer. Math. Soc. 54 (6):708 717, July 2007. [8] H.D.L. Hollmann. Modulation Codes. Philips Electronics N.V., PhD thesis Techn. Univ. Eindhoven, 1996. [9] K.A.S. Immink, P.H. Siegel, and J.K. Wolf, Codes for digital recorders, IEEE Transactions on Information Theory, 44(6):2260 2299, Oct 1998. [10] K.A.S. Immink and J.H. Weber, Very efficient balanced codes, IEEE Transactions on Selected Areas in Communications,, 28(2):188 192, Feb 2010. [11] D.E. Knuth, Efficient balanced codes, IEEE Transactions on Information Theory,, 32(1):51 53, Jan 1986. [12] J.H. van Lint. Introduction to Coding Theory. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1982. [13] L.A. Phillips, S. Perkins, P.A. Roach and D.H. Smith, Erasure correction capabilities of Sudoku and related combinatorial structures, Proc. 4th Research Student Workshop, University of Glamorgan, 65 69, 2009. [14] http://staffhome.ecm.uwa.edu.au/~00013890/sudokumin.php [15] C.E. Shannon, A mathematical theory of communication, Bell System Technical Journal, 27(10):379 423, October 1948. [16] E. Soedarmadji and R. McEliece, Iterative Decoding for Sudoku and Latin Square Codes, Proceeings 45th Annual Allerton Conference on Communication, Control, and Computing, 488 494, 2007. [17] T. Yato and T. Seta, Complexity and completeness of finding another solution and its application to puzzles, Proc. National Meeting of the Information Processing Society of Japan (IPSJ), 2002. [18] http://en.wikipedia.org/wiki/mathematics_of_sudoku