Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Similar documents
Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences

Bounding the Entropic Region via Information Geometry

Characterizing the Region of Entropic Vectors via Information Geometry

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables

Symmetries in the Entropy Space

Entropic Vectors: Polyhedral Computation & Information Geometry

Symmetries in Entropy Space

Symmetry in Network Coding

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

A computational approach for determining rate regions and codes using entropic vector bounds

A new computational approach for determining rate regions and optimal codes for coded networks

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions

Algebraic matroids are almost entropic

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids

Entropy Vectors and Network Information Theory

Partition Symmetrical Entropy Functions*

Matroid Bounds on the Region of Entropic Vectors

Received: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018

Amobile satellite communication system, like Motorola s

Network Combination Operations Preserving the Sufficiency of Linear Network Codes

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

New arcs in projective Hjelmslev planes over Galois rings

SHANNON S information measures refer to entropies, conditional

Network Coding on Directed Acyclic Graphs

Entropic and informatic matroids

Entropy inequalities and linear rank inequalities

Capacity Region of the Permutation Channel

16 Chapter 3. Separation Properties, Principal Pivot Transforms, Classes... for all j 2 J is said to be a subcomplementary vector of variables for (3.

Appendix PRELIMINARIES 1. THEOREMS OF ALTERNATIVES FOR SYSTEMS OF LINEAR CONSTRAINTS

1 The Erdős Ko Rado Theorem

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors

MAIN THEOREM OF GALOIS THEORY

Simplified Composite Coding for Index Coding

THE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES

The Shannon s basic inequalities refer to the following fundamental properties of entropy function:

Boolean Inner-Product Spaces and Boolean Matrices

Integer programming: an introduction. Alessandro Astolfi

Groups and Symmetries

Rectilinear Polygon Exchange Transformations via Cut-and-Project Methods

arxiv: v1 [cs.it] 17 Sep 2015

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES

IRRATIONAL ROTATION OF THE CIRCLE AND THE BINARY ODOMETER ARE FINITARILY ORBIT EQUIVALENT

arxiv: v1 [math.ra] 13 Jan 2009

Basic Algorithms for Permutation Groups

Secret Sharing. Qi Chen. December 14, 2015

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Total Ordering on Subgroups and Cosets

A proof of Freiman s Theorem, continued. An analogue of Freiman s Theorem in a bounded torsion group

Some New Large Sets of Geometric Designs

TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS

ECE 4400:693 - Information Theory

The Capacity Region for Multi-source Multi-sink Network Coding

On designs and Steiner systems over finite fields

14 : Theory of Variational Inference: Inner and Outer Approximation

Mic ael Flohr Representation theory of semi-simple Lie algebras: Example su(3) 6. and 20. June 2003

Characteristic-Dependent Linear Rank Inequalities and Network Coding Applications

Belief Propagation, Information Projections, and Dykstra s Algorithm

ON THE NUMBER OF COMPONENTS OF A GRAPH

Orbits of D-maximal sets in E

Permutation Groups. John Bamberg, Michael Giudici and Cheryl Praeger. Centre for the Mathematics of Symmetry and Computation

Today s exercises. 5.17: Football Pools. 5.18: Cells of Line and Hyperplane Arrangements. Inclass: PPZ on the formula F

Representations and Linear Actions

Networks and Matroids

Conditional Information Inequalities for Entropic and Almost Entropic Points

The rank of connection matrices and the dimension of graph algebras

The Support Splitting Algorithm and its Application to Code-based Cryptography

Rate region for a class of delay mitigating codes and P2P networks

SUBLATTICES OF LATTICES OF ORDER-CONVEX SETS, III. THE CASE OF TOTALLY ORDERED SETS

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

An Introduction to Transversal Matroids

LIFTED CODES OVER FINITE CHAIN RINGS

Isomorphisms between pattern classes

Draft. On Limiting Expressions for the Capacity Region of Gaussian Interference Channels. Mojtaba Vaezi and H. Vincent Poor

Security in Locally Repairable Storage

Computability Theoretic Properties of Injection Structures

Permutation invariant proper polyhedral cones and their Lyapunov rank

Graphical Models and Independence Models

On Linear Subspace Codes Closed under Intersection

On the norm form inequality F (x) h.

Assignment 1: From the Definition of Convexity to Helley Theorem

Cayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian Random Variables

Lipschitz matchbox manifolds

MEP123: Master Equality Polyhedron with one, two or three rows

The rise and fall of uncountable models

Tiling problems in music theory

Dissimilarity Vectors of Trees and Their Tropical Linear Spaces

Cut-Set Bound and Dependence Balance Bound

Lossy Distributed Source Coding

Capacity Theorems for Distributed Index Coding

arxiv: v1 [math.lo] 14 Jan 2008

LOWER BOUNDARY HYPERPLANES OF THE CANONICAL LEFT CELLS IN THE AFFINE WEYL GROUP W a (Ãn 1) Jian-yi Shi

Hidden Markov Model. Ying Wu. Electrical Engineering and Computer Science Northwestern University Evanston, IL 60208

PART III. Outline. Codes and Cryptography. Sources. Optimal Codes (I) Jorge L. Villar. MAMME, Fall 2015

AN ALGEBRAIC APPROACH TO GENERALIZED MEASURES OF INFORMATION

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi

Transcription:

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer Engineering Drexel University, Philadelphia, PA yunshu.liu@drexel.edu & jwalsh@ece.drexel.edu 2015-09-30 Thanks to NSF CCF-1053702

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

The Region of Entropic Vectors Γ N Joint entropy viewed as a vector For N discrete random variables, there is a 2 N 1 dimensional vector h = (h A A N ) R 2N 1 associated with it, we call it entropic vectors. For example: N = 2: h = {h 1 h 2 h 12 } N = 3: h = {h 1 h 2 h 12 h 3 h 13 h 23 h 123 } The Region of Entropic vectors: all valid entropic vectors Γ N = {h R2N 1 h is entropic} Examples of two random variables Γ 2 (Polyhedral cone): h 1 + h 2 h 12, h 12 h 1 and h 12 h 2 Motivation to study the Region of Entropic Vectors Calculate Network Coding capacity region Determine the limit of large coded distributed storage system

The Region of Entropic Vectors Γ N Shannon-Type Information inequality { Γ N = h R 2N 1 h A + h B h A B + h A B A, B N h P h Q 0 Q P N } Relationship between Γ n and Γ n Γ 2 = Γ 2 and Γ 3 = Γ 3: All the Information inequalities on N 3 variables are Shannon-Type. (0 1 1) (1 1 1) h 12 = H(X 1,X 2 ) (1 0 1) For N = 2, Use h 1 + h 2 h 12, h 12 h 1 and h 12 h 2, we get Γ 2 (0 0 0) h 2 = H(X 2 ) h 1 = H(X 1 )

The Region of Entropic Vectors Γ N Γ 2 and Γ 3 are polyhedral cone and fully characterized. Γ 4 is an unknown convex cone, we use outer bound and inner bound to approximate it. Outer bound for Γ N : non-shannon type Inequality Shannon Outer bound N ZY Outer bound + N For N 4 we have Γ N Γ N, indicating non-shannon type Information inequalities exist for N 4 Entropic region N Better Outer bound ++ N First Non-Shannon-Type Information inequality(zhang-yeung 1 ): 2I(C; D) I(A; B) + I(A; C, D) + 3I(C; D A) + I(C; D B) 1 Zhen Zhang and Raymond W. Yeung, On Characterization of Entropy Function via Information Inequalities, IEEE Trans. on Information Theory July 1998.

The Region of Entropic Vectors Γ N Inner bound for Γ 4 (N =4): Ingleton Inequality Ingleton ij = I(X k ; X l X i ) + I(X k ; X l X j ) + I(X i ; X j ) I(X k ; X l ) Shannon Outer bound 4 ZY Outer bound + 4 Entropic region 4 Better Outer bound ++ 4 How to generate better inner bounds from distributions? Ingleton ij 0 Ingleton Inner bound

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Equivalence of k-atom Supports An example of 3-variable 4-atom support (0, 0, 0) > α (0, 2, 2) > β (1, 0, 1) > γ (1) (1, 1, 3) > 1 α β γ In distribution support (1), each row corresponding to one outcome/atom, each column represent a variable. Assign variables from left to right as X 1, X 2 and X 3 such that X = (X 1, X 2, X 3 ). If we assume X 1 = 2, X 2 = 3 and X 3 = 4, then X has totally 24 outcomes, among these outcomes, only 4 of them have non-zero probability, we call it a 4-atom distribution support.

Equivalence of k-atom Supports Equivalence of two k-atom supports Two k-atom supports X, X, X = X = k, will be said to be equivalent, for the purposes of tracing out the entropy region, if they yield the same set of entropic vectors, up to a permutation of the random variables. 4-atom support A 2 3 (0, 0, 0) 6(0, 2, 2) 7 4(1, 0, 1) 5 (1, 1, 3) 4-atom support B 2 3 (1, 2, 1) 6(3, 4, 1) 7 4(1, 3, 0) 5 (2, 1, 0) same set of entropic vectors

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Orbit data structure Orbit of elements under group action Let a finite group G acting on a finite set X, For x X, the orbit of x under G is defined as G(x) = {gx g G} Transversal T of the Orbit G(x) under group G transversal is the collection of canonical representative of the orbit G(x), e.g. least under some ordering of X. X Transversal x Orbit G(x) z} {

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Non-isomorphic k-atom supports set partitions A set partition of N k 1 is a set B = {B 1,..., B t } consisting of t subsets B 1,..., B t of N k 1 that are pairwise disjoint B i B j =, i j, and whose union is N k 1, so that Nk 1 = t i=1 B i. Let Π(N k 1 ) denote the set of all set partitions of Nk 1. The cardinality of Π(N k 1 ) is commonly known as Bell numbers. Examples of set partitions Π(N 3 1 ) = {{{1, 2, 3}}, {{1, 2}, {3}}, {{1, 3}, {2}}, {{2, 3}, {1}}, {{1}, {2}, {3}}}, Π(N 4 1 ) = {{{1, 2, 3, 4}}, {{1, 2, 3}, {4}}, {{1, 2, 4}, {3}}, {{1, 3, 4}, {2}}, {{2, 3, 4}, {1}}, {{1, 2}, {3, 4}}, {{1, 3}, {2, 4}}, {{1, 4}, {2, 3}}, {{1, 2}, {3}, {4}}, {{1, 3}, {2}, {4}}, {{1, 4}, {2}, {3}}, {{2, 3}, {1}, {4}}, {{2, 4}, {1}, {3}}, {{3, 4}, {1}, {2}}, {{1}, {2}, {3}, {4}}}.

Non-isomorphic k-atom supports Lattice of Π(N 4 1 ): the set of all set partitions for k = 4 {{1, 2, 3, 4}} {{1, 4}, {2, 3}} {{2, 3, 4}, {1}} {{1, 2, 4}, {3}} {{1, 3}, {2, 4}} {{1, 2, 3}, {4}} {{1, 3, 4}, {2}} {{1, 2}, {3, 4}} {{2, 3}, {1}, {4}} {{1, 4}, {2}, {3}} {{2, 4}, {1}, {3}} {{1, 3}, {2}, {4}} {{1, 2}, {3}, {4}} {{3, 4}, {1}, {2}} {{1}, {2}, {3}, {4}}

Non-isomorphic k-atom supports Outcome for each variables in a k-atom support is a set partition, entropy remain unchanged for set partitions under symmetric group S k Consider the 4-atom support in (1) (0, 0, 0) (0, 2, 2) (1, 0, 1) (1, 1, 3) outcome of X 1 can be encoded as {{1, 2}, {3, 4}} outcome of X 2 can be encoded as {{1, 3}, {2}, {4}} outcome of X 3 can be encoded as {{1}, {2}, {3}, {4}} The symmetric group S k induces a natural group action on a set partition B Π(N k 1 ), B = {B 1,..., B t } with π S k π(b) := {π(b 1 ),..., π(b t )}. (2)

Non-isomorphic k-atom supports Use combinations of N set partitions to represent distribution supports for N variables Let Ξ N be the collection of all sets of N set partitions of N k 1 whose meet is the finest partition (the set of singletons), Ξ N := ξ ξ Π(Nk 1 ), ξ = N, N B = {{i}}. (3) B ξ where meet of two partitions B, B is defined as { } B B = B i B j B i B, B j B, B i B j i=1 The symmetric group S k induces a natural group action on Ξ N of subsets of N partitions from Π(N k 1 ) with π S k π(ξ) := {π(b 1 ),..., π(b N )}. (4)

Non-isomorphic k-atom supports Ξ N represent all the necessary distribution supports to calculate entropic vectors for N variables and k atoms, selecting one representative from each equivalence class will lead us to a list of all non-isomorphic k-atom, N-variable supports. Transversal Orbit G( ) z} { N The problem of generating the list of all non-isomorphic k-atom, N-variable supports is equivalent to obtaining a transversal of the orbits Ξ N //S k of S k acting on Ξ N, the set of all subsets of N set partitions of the set N k 1 whose meets are the set of singletons {{1}, {2},..., {N}}.

Non-isomorphic k-atom supports Calculate transversal via the algorithm of Snakes and Ladders 2 For given set N k 1, the algorithm of Snakes and Ladders first compute the transversal of Ξ 1, then it recursively increase the subsets size i, where the enumeration of Ξ i is depending on the result of Ξ i 1 : Ξ 1 Ξ 2 Ξ N 1 Ξ N Number of non-isomorphic k-atom, N-variable supports N\k 3 4 5 6 7 2 2 8 18 48 112 3 2 31 256 2437 25148 4 1 75 2665 105726 5107735 5 0 132 22422 3903832 6 0 187 161118 2 Anton Betten, Michael Braun, Harald Fripertinger etc., Error-Correcting Linear Codes: Classification by Isometry and Applications, Springer 2006 pp. 709 710.

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Maximal Ingleton Violation and the Four Atom Conjecture Ingleton score Given a probability distribution, we define the Ingleton score to be Ingleton score = Ingleton ij (5) H(X i X j X k X l ) Four Atom Conjecture: the lowest reported Ingleton score is approximately -0.0894, it is attained by (6) (0, 0, 0, 0) > 0.35 (0, 1, 1, 0) > 0.15 (1, 0, 1, 0) > 0.15 (6) (1, 1, 1, 1) > 0.35

Maximal Ingleton Violation and the Four Atom Conjecture Number of non-isomorphic Ingleton violating supports for four variables number of atoms k 3 4 5 6 7 all supports 1 75 2665 105726 5107735 Ingleton violating 0 1 29 1255 60996 The only Ingleton violating 5-atom support that is not grown from 4-atom support (6) with a Ingleton score -0.02423 (0, 0, 0, 0) (0, 0, 1, 1) (0, 1, 1, 0) (1, 0, 1, 0) (1, 1, 1, 0) (7)

Outline The Region of Entropic Vectors Γ N Enumerating Canonical k-atom Supports Equivalence of k-atom Supports Orbit data structure Non-isomorphic k-atom supports Mapping the Entropy Region with k-atom Distributions Maximal Ingleton Violation and the Four Atom Conjecture Optimizing Inner Bounds to Entropy from k-atom Distribution

Optimizing Inner Bounds to Entropy from k-atom Distribution Shannon Outer bound 4 Random cost functions Ingleton cost function k-atom inner bound generation for four variables Randomly generate enough cost functions from the gap between Shannon outer bound and Ingleton inner bound Given a k-atom supports, find the distribution that optimize the each of the cost function, save it if it violate Ingleton Taking the convex hull of all the entropic vectors from the k-atom distributions that violate Ingleton kl to get the k-atom inner bound

Optimizing Inner Bounds to Entropy from k-atom Distribution The volume increase within pyramid G4 34 are included as more atoms inner and outer bounds percent of pyramid Shannon 100 Outer bound from Dougherty etc. 3 96.5 4,5,6 atoms inner bound 57.8 4,5 atoms inner bound 57.1 4 atoms inner bound 55.9 4 atom conjecture point only 43.5 3 atoms inner bound 0 3 Randall Dougherty, Chris Freiling, Kenneth Zeger, Non-Shannon Information Inequalities in Four Random Variables, arxiv:1104.3602v1.

Optimizing Inner Bounds to Entropy from k-atom Distribution Three dimensional projection of 4-atom inner bound(3-d projection introduced by F. Matúš and L. Csirmaz 3 )

Optimizing Inner Bounds to Entropy from k-atom hold on Distribution.3.25.2.15.1.05 Figure : Comparison of contour plots of inner bound created from k atom distributions for k {4, 5, 6}. For each contour value, the inner most line is k = 4 while the outermost line is k = 6. The numerical inner bounds generated from only four atom distributions are quite good in this space.

Conclusion Results summary Formulation and algorithms for listing non-isomorphic distribution supports for Entropic Vectors Ingleton violating non-isomorphic distribution supports Numerical inner bound generated by optimizing k-atom distributions

Thanks! Questions?

Theorem Let G act on the finite set X. Assume that we can compute stabilizers, group 9.6.9 : P(X) extensions and orbits on points for subgroups of G. Furthermore, let f {0, 1} be a test function which is G-invariant andhereditary(inthesenseof9.5.1 Appendix: the algorithm and 9.5.2). Then Algorithm 9.6.10 ofcomputes Snake the orbits of G on and P Ladder ( f ) (X) =P(X) f 1 ({1}), the set of admissible subsets of X. Algorithm (orbits on subsets) Input: orbit ( G, P ( f ) i (X) ) =(Ti, σi, ϕi) Output: orbit ( G, P ( f ) i+1 (X)) =(T i+1, σ i+1, ϕ i+1) (0) for R T i do (1) compute orbit(gr, X \ R) := (T R, σr, ϕr) 710 (2) end 9. The for General Case (3) T i+1 := 9.6.10 (4) for R T i (in increasing order) do (5) for x T R (in increasing order) with f (R {x}) =1 and for which ψr(x) has not yet been defined do (6) GR,x := σr(x) jwalsh@ece.drexel.edu (7) H := GR,x (8) for all r R which are least in their H-orbit do (9) t := ϕ i((r \{r}) {x}) (10) S := ((R \{r}) {x})t (11) h := ϕs(rt) (12) y := rth (now: (R {x})th = S {y}, S T i, y T S) (13) if S = R and y = x then (case 1 of 9.6.1) (14) H := H, th (th is an automorphism of R {x}) (15) else (case 2 of 9.6.1) (16) ψ S(y) := (th) 1 (th is an isomorphism from R {x} to S {y}) (17) end if (18) end for (19) append R {x} to T i+1 (20) σ i+1(r {x}) := H (= G R {x} ) (21) end for (22) end for (23) return (T i+1, σ i+1, ϕ i+1) Where the function ϕ i+1 is defined as follows.

(now: (R {x})th = S {y}, S T y T S) (13) i, if S = R and y = x then (case 1 of 9.6.1) (14) H := H, th Appendix: the algorithm (th is an automorphism of Snake of R {x}) and Ladder (15) else (case 2 of 9.6.1) (16) ψ S(y) := (th) 1 (th is an isomorphism from R {x} to S {y}) (17) end if (18) end for (19) append R {x} to T i+1 (20) σ i+1(r {x}) := H (= G R {x} ) (21) end for (22) end for (23) return (T i+1, σ i+1, ϕ i+1) Where the function ϕ i+1 is defined as follows. (24) function ϕi+1(f) (25) z := max F, Z := F \{z} (a set of size i) (26) t := ϕ i(z) (27) S := Zt (28) h := ϕ S(zt), y := zth (29) if ψ S(y) has been defined then (30) return thψs(y) (31) else (32) return th (33) end if (34) end function Proof: The proof is by induction. The orbits of subsets of size 0 are trivially known. The orbits of subsetsof size 1 are knownby assumption. Now assume jwalsh@ece.drexel.edu