392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions

Size: px
Start display at page:

Download "392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions"

Transcription

1 92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm for choosing progressively longer binary block codes with a given minimum distance d produces some surprisingly good linear codes. A binary lexicographic code (or lexicode) C(n,d) of length n and minimum distance d is defined as follows [Conway and Sloane, 986]. First, the binary n-tuples {x (x,x,...,x n ) (F 2 ) n } are put into lexicographical order corresponding to the standard binary representation of the integers in the interval [, 2 n ); i.e., x > x if and only if x 2x 2 n x n > x 2x 2 n x n. Now C(n, d) is constructed by considering the binary n-tuples in lexicographical order, smallest to largest, starting with, and greedily including an n-tuple in C(n,d) if and only if it is at Hamming distance d or greater from all previously chosen n-tuples. For example, to construct the lexicode C(, 2) of length and minimum distance 2, we consider the binary -tuples in the following order and make the following choices: tuple integer include? choices so far yes no 2 no yes, 4 no, 5 yes,, 6 yes,,, 7 no,,, Thus C(, 2) is the (, 2, 2) single-parity-check code of length. (a) ( points) Construct the lexicode C(6, 4) of length 6 and minimum distance 4. Considering the 64 binary 6-tuples in lexicographical order, we first choose. The next 6-tuple with at least 4 ones is ; thus C(4, 4) is the (4,, 4) repetition code. We clearly can achieve a distance of at most 2 from and in the first four coordinates; therefore the next 6-tuple must be. Complementing the first four coordinates gives us the next and final word,. Thus C(6, 4) is the (6, 2, 4) binary linear block code generated by and. (b) ( points) What is the shortest nontrivial lexicode with minimum distance d? A code that contains only the all-zero word is trivial. The next word to be added in a distance-d lexicode must differ from the all-zero word in d places. Thus the shortest nontrivial lexicode with distance d is the code consisting of an all-zero d-tuple and an all-one d-tuple, namely the (d,,d) binary repetition code of length d.

2 (c) ( points) Assume that C(n,d) is a binary linear (n,k,d) block code. Show that C(n,d) is a binary linear (n,k,d) block code, where either k k or k k. Conclude that every lexicode C(n,d) is a binary linear block code. [Hint: let C (n,d) be the (n,k,d) block code obtained by extending all words in C(n,d) by a zero bit. Show that if there exists an (n )-tuple x (F 2 ) n at distance d from all words in C (n,d), then all words in the set C (n,d) x are at distance d from all words in C (n,d), and that there are no other such words.] Following the hint, it is obvious that if we consider the (n )-tuples in lexicographical order, then the words that we select for C(n,d) with x n will be the same as the words that we select for C(n,d), extended by a zero bit, x n. Therefore C (n,d) must be a subcode of C(n,d), and all words x C(n,d) that are not in C (n,d) must have x n. Since C(n,d) is linear (a group) by assumption, and addition of (n )-tuples is componentwise mod-2 addition, it follows that C (n,d) is also a linear code. Let us suppose that there exists a word x with x n that is at distance d from all words in C (n,d); if no such word exists, then C(n,d) C (n,d). Then the translate (coset) C (n,d) x must be a set of (n )-tuples of Hamming weight d or greater. Now let x x c be any other element of this translate, where c C (n,d); then C (n,d)x C (n,d)cx C (n,d)x, since C (n,d)c C (n,d), by the group property of C (n,d). Therefore the set of Hamming distances from x to all elements of C (n,d) is the same as that of x, so all such distances are greater than or equal to d. Finally, the difference between x and any other element of C (n,d) x is a nonzero codeword in C (n,d), and therefore the distance between x and any other element of C (n,d) x is also greater than or equal to d. Therefore all words in the translate C (n,d) x may be selected by the greedy lexicode construction algorithm. Finally, we should show that no other (n )-tuple x with x n can be selected. I confess that I don t know how to prove this; I was hoping that one of you would. Conway and Sloane use a general theorem from combinatorial game theory to prove that C(n, d) must be linear; given linearity, all words in C (n,d) x must be in C(n,d), and there can be no others with x n because only half the codewords c can have c n. Given that C(n,d) linear implies C(n,d) linear and that C(d,d) is linear, we may finally conclude that C(n,d) is a nontrivial linear code for all n d. (d) (2 points) Using the results of part (c), show that we can choose as generators for C(n,d) the generators of C(n,d), extended by a zero bit, plus (if dim C(n,d) > dim C(n,d)) the word in C(n,d) with x n that has the greatest number of low-order zeroes (i.e., the first index k for which x k is as great as possible). Show that such a set of generators for C(n,d) is trellis-oriented (minimum-span). Part (c) shows that we can add at most one generator each time we extend the code length. Therefore the stopping times of all generators are different. 2

3 Suppose that there is a generator g of C (n,d) that starts at the same time as the element of C (n,d)x that we have chosen as our new generator g. Then gg is an element of C (n,d)x that starts later than g, contradiction. Therefore no generator of C (n,d) starts at the same time as the new generator starts. By induction, the starting times of all generators are different. Since all starting and stopping times are different, this set of generators for C(n,d) is trellis-oriented (minimum-span). (e) ( points) Using this method, find a set of trellis-oriented generators for C(8, 4). From part (a), the first two generators (extended to length 8) are and. We can extend to length 7 with the generator x, which is at distance 4 from all words in C (7, 4). (Some of you guessed that would be the next generator, but is lexicographically least.) The latest starting time in the translate C (7, 4) x is attained by or, which may be taken as the next trellis-oriented generator. Finally, we can extend to length 8 with the (lexicographically least) generator x. The latest starting time in the translate C (8, 4) x is attained by, which may be taken as the final trellis-oriented generator. Thus C(8, 4) is generated by {,,, }; i.e., it is the (8,4,4) Reed-Muller code with the standard RM coordinate ordering. Problem F.2 (6 points) In this problem, we will analyze the performance of iterative decoding of a simple concatenated code C on a binary erasure channel (BEC) with erasure probability p, in the limit as the code becomes very long (n ). info bits (,, ) Π u(d) D y(d) Figure. Encoder for concatenated code C. The encoder for a repeat-accumulate (RA) code C is shown in Figure above; it works as follows. A sequence of information bits is first encoded by an encoder for a (,, ) repetition code, which simply repeats each information bit three times. The resulting sequence is then permuted by a large pseudo-random permutation Π. The permuted sequence u(d) is then encoded by a rate-/ 2-state convolutional encoder with input/output relation y(d) u(d)/(d); i.e., the input/output equation is y k u k y k, so the output bit is simply the accumulation of all previous input bits (mod 2). (a) What is the rate of this code C? The rate of the repetition code is. The rate of the convolutional code is ; i.e., it puts one bit out for every one bit in. Therefore the overall code rate is r. (b) Show that the code C is represented by the normal graph of Figure 2.

4 Π Figure 2. Normal graph of concatenated code C. The left-side nodes of Figure 2 represent the repetition code. Since the original information bits are not transmitted, they are regarded as hidden state variables, repeated three times. The repeated bits are permuted in the permutation Π. On the right side, the permuted bits u k are the input bits and the y k are the output bits of a 2-state trellis, whose states are the output bits y k. The trellis constraints are represented explicitly by zero-sum nodes that enforce the constraints y k u k y k. (c) Suppose that the encoded bits are sent over a BEC with erasure probability p. Explain how iterative decoding works in this case, using a schedule that alternates between the left constraints and the right constraints. The outputs of a BEC are either known with certainty or completely unknown (erased). The sum-product algorithm reduces to propagation of known variables through the code graph. If any variable incident on a repetition node becomes known, then all become known. On the other hand, for a zero-sum node, all but one incident variable must be known in order to determine the last incident variable; otherwise all unknown incident variables remain unknown. In detail, we see that initially an input bit u k becomes known if and only if the two adjoining received symbols, y k and y k, are unerased. After passage through Π, these known bits propagate through the repetition nodes to make all equal variables known. After passage through Π, the right-going known bits are propagated through the trellis, with additional input or output bits becoming known whenever two of the three bits in any set {y k,u k,y k } become known. Known input bits u k are then propagated back through Π, and so forth. 4

5 (d) Show that, as n, if the probability that a left-going iterative decoding message is erased is q r l, then the probability that a right-going messages is erased after a left-side update is given by q l r (q r l ) 2. As n, for any fixed number m of iterations, we may assume that all variables in the m-level computation tree are independent. A right-going message is erased if and only if both left-going messages that are incident on the same repetition node is erased. Thus if these two variables are independent, each with probability q r l of erasure, then q l r (q r l ) 2. (e) Similarly, show that if the probability that a right-going iterative decoding message is erased is q l r, then the probability that a left-going message is erased after a right-side update is given by ( p) 2 q r l ( p pq l r ) 2. [Hint: observe that as n, the right-side message probability distributions become invariant to a shift of one time unit.] For a particular input bit, the messages that contribute to the calculation of the outgoing message look like this: q in p q in p p q in p q in x y x y x x y x y x q out Here p denotes the probability that an output bit y k will be erased on the channel, q in denotes the probability q l r that an input bit u k will still be erased after the previous iteration, and q out denotes the probability q r l that the bit that we are interested in will be erased after this iteration. Again, as n, we may assume that all of these probabilities are independent. Following the hint, we use the symmetry and time-invariance of the trellises on either side of u k to assert that as n the probability of erasure x in all of the messages marked with x will be the same, and similarly that the probability of erasure y in all of the messages marked with y will be the same. The relations between these probabilities are then evidently as follows: x py; y ( q in )( x); q out ( x) 2. Solving the first two equations, we obtain y q in p pq in, x pq in p pq in, and thus q out ( p) 2 ( p pq in ) 2. 5

6 (f) Using a version of the area theorem that is appropriate for this scenario, show that iterative decoding cannot succeed if p 2. The area under the curve of part (d) is The area under the curve of part (e) is q 2 dq. ( p) 2 ( p)2 ( p pq) 2dq p [ p pq Iterative decoding will succeed if and only if the two curves do not cross. In order for the two curves not to cross, the sum of these two areas must be less than the area of the EXIT chart; i.e., p <, which is equivalent to p < 2 ; i.e., the capacity p of the BEC, namely p, must be greater than the rate of the RA code, namely. (For example, in Figure below, the area above the top curve is, whereas the area below the bottom curve is.) 2 (g) The two curves given in parts (d) and (e) are plotted in the EXIT chart below for p.5. Show that iterative decoding succeeds in this case. p.5 ] p. q l r.75 q r l Figure. EXIT chart for iterative decoding of C on a BEC with p.5. The two curves do not cross, so iterative decoding starting at (q r l,q l r ) (, ) must succeed (reach (q r l,q l r ) (, )). 6

7 (h) [Optional; extra credit.] Determine whether or not iterative decoding succeeds for p.6. The easiest way to determine whether iterative decoding succeeds for p.6 is to simulate it using the equations above. We obtain q l r q r l Thus iterative decoding succeeds fairly easily for p.6, even though the capacity of a BEC with p.6 is only.4, not much greater than the rate of the RA code. It is possible therefore that irregular RA codes may be capacity-approaching for the BEC. Even with regular codes, the two EXIT curves are already quite well matched. However, note that only the left degrees can be made irregular, which limits design flexibility. Scores on final exam: 56, 5, 47, 42, 42, 4,,, 7. 7

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

Formally Self-Dual Codes Related to Type II Codes

Formally Self-Dual Codes Related to Type II Codes Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya 464 8602, Japan and Masaaki Harada Department of Mathematical Sciences Yamagata

More information

Concatenated codes (CH 15)

Concatenated codes (CH 15) Concatenated codes (CH 15) Simple (classical, single-level) concatenation Length of concatenated code is n 1 n 2 Dimension of concatenated code is k 1 k 2 If minimum distances of component codes are d

More information

CPS 102: Discrete Mathematics. Quiz 3 Date: Wednesday November 30, Instructor: Bruce Maggs NAME: Prob # Score. Total 60

CPS 102: Discrete Mathematics. Quiz 3 Date: Wednesday November 30, Instructor: Bruce Maggs NAME: Prob # Score. Total 60 CPS 102: Discrete Mathematics Instructor: Bruce Maggs Quiz 3 Date: Wednesday November 30, 2011 NAME: Prob # Score Max Score 1 10 2 10 3 10 4 10 5 10 6 10 Total 60 1 Problem 1 [10 points] Find a minimum-cost

More information

Project 1. Implementation. Massachusetts Institute of Technology : Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A.

Project 1. Implementation. Massachusetts Institute of Technology : Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A. Massachusetts Institute of Technology Handout 18.413: Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A. Spielman Project 1 In this project, you are going to implement the simplest low

More information

MAT 243 Test 2 SOLUTIONS, FORM A

MAT 243 Test 2 SOLUTIONS, FORM A MAT 243 Test 2 SOLUTIONS, FORM A 1. [15 points] Calculate the following quantities: a. 17 mod 4 Solution: 17 17 4 = 17 4 4 = 1. 4 b. 17 div 4 17 Solution: = 4. 4 c. (( 1) mod 12) mod (27 div 5) Solution:

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

Construction C : an inter-level coded version of Construction C

Construction C : an inter-level coded version of Construction C Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very

More information

Complexity-Optimized Low-Density Parity-Check Codes

Complexity-Optimized Low-Density Parity-Check Codes Complexity-Optimized Low-Density Parity-Check Codes Masoud Ardakani Department of Electrical & Computer Engineering University of Alberta, ardakani@ece.ualberta.ca Benjamin Smith, Wei Yu, Frank R. Kschischang

More information

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016)

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016) UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, June 8, 27 Solutions to Practice Final Examination (Spring 26) There are 4 problems, each problem with multiple parts, each part worth points. Your

More information

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)

More information

Graph based codes for distributed storage systems

Graph based codes for distributed storage systems /23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA

More information

EDAA40 At home exercises 1

EDAA40 At home exercises 1 EDAA40 At home exercises 1 1. Given, with as always the natural numbers starting at 1, let us define the following sets (with iff ): Give the number of elements in these sets as follows: 1. 23 2. 6 3.

More information

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Copyright Cengage Learning. All rights reserved. SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All rights reserved.

More information

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you

More information

Error correction guarantees

Error correction guarantees Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if

More information

2 Geometry Solutions

2 Geometry Solutions 2 Geometry Solutions jacques@ucsd.edu Here is give problems and solutions in increasing order of difficulty. 2.1 Easier problems Problem 1. What is the minimum number of hyperplanar slices to make a d-dimensional

More information

1 Counting triangles and cliques

1 Counting triangles and cliques ITCSC-INC Winter School 2015 26 January 2014 notes by Andrej Bogdanov Today we will talk about randomness and some of the surprising roles it plays in the theory of computing and in coding theory. Let

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

CS 512, Spring 2017: Take-Home End-of-Term Examination

CS 512, Spring 2017: Take-Home End-of-Term Examination CS 512, Spring 2017: Take-Home End-of-Term Examination Out: Tuesday, 9 May 2017, 12:00 noon Due: Wednesday, 10 May 2017, by 11:59 am Turn in your solutions electronically, as a single PDF file, by placing

More information

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms Chapter 3 Greedy Algorithms Greedy algorithms are algorithms prone to instant gratification. Without looking too far ahead, at each step they make a locally optimum choice, with the hope that it will lead

More information

Explicit Polar Codes with Small Scaling Exponent

Explicit Polar Codes with Small Scaling Exponent Explicit Polar Codes with Small Scaling Exponent arxiv:9.886v [cs.it] 24 Jan 29 Hanwen Yao University of California San Diego 95 Gilman Drive, La Jolla, CA 9293 hay25@ucsd.edu Alexander Vardy University

More information

A greedy, partially optimal proof of the Heine-Borel Theorem

A greedy, partially optimal proof of the Heine-Borel Theorem A greedy, partially optimal proof of the Heine-Borel Theorem James Fennell September 28, 2017 Abstract The Heine-Borel theorem states that any open cover of the closed interval Œa; b contains a finite

More information

LOW-density parity-check (LDPC) codes have attracted

LOW-density parity-check (LDPC) codes have attracted 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

QED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C:

QED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C: Lecture 3: Lecture notes posted online each week. Recall Defn Hamming distance: for words x = x 1... x n, y = y 1... y n of the same length over the same alphabet, d(x, y) = {1 i n : x i y i } i.e., d(x,

More information

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12. AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a

More information

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C.

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C. 219 Lemma J For all languages A, B, C the following hold i. A m A, (reflexive) ii. if A m B and B m C, then A m C, (transitive) iii. if A m B and B is Turing-recognizable, then so is A, and iv. if A m

More information

A geometric non-existence proof of an extremal additive code

A geometric non-existence proof of an extremal additive code A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento

More information

Comparison of Decoding Algorithms for Concatenated Turbo Codes

Comparison of Decoding Algorithms for Concatenated Turbo Codes Comparison of Decoding Algorithms for Concatenated Turbo Codes Drago Žagar, Nenad Falamić and Snježana Rimac-Drlje University of Osijek Faculty of Electrical Engineering Kneza Trpimira 2b, HR-31000 Osijek,

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism CHAPTER 2 Graphs 1. Introduction to Graphs and Graph Isomorphism 1.1. The Graph Menagerie. Definition 1.1.1. A simple graph G = (V, E) consists of a set V of vertices and a set E of edges, represented

More information

Modern Communications Chapter 5. Low-Density Parity-Check Codes

Modern Communications Chapter 5. Low-Density Parity-Check Codes 1/14 Modern Communications Chapter 5. Low-Density Parity-Check Codes Husheng Li Min Kao Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville Spring, 2017 2/14 History

More information

AtCoder World Tour Finals 2019

AtCoder World Tour Finals 2019 AtCoder World Tour Finals 201 writer: rng 58 February 21st, 2018 A: Magic Suppose that the magician moved the treasure in the order y 1 y 2 y K+1. Here y i y i+1 for each i because it doesn t make sense

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

LOW-density parity-check (LDPC) codes are widely

LOW-density parity-check (LDPC) codes are widely 1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

Discrete mathematics

Discrete mathematics Discrete mathematics Petr Kovář petr.kovar@vsb.cz VŠB Technical University of Ostrava DiM 470-2301/02, Winter term 2018/2019 About this file This file is meant to be a guideline for the lecturer. Many

More information

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element. The first exam will be on Wednesday, September 22, 2010. The syllabus will be sections 1.1 and 1.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

arxiv:cs/ v1 [cs.it] 8 Feb 2007

arxiv:cs/ v1 [cs.it] 8 Feb 2007 Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber Institute for Information Transmission, University

More information

ITERATIVE decoders have gained widespread attention

ITERATIVE decoders have gained widespread attention IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents

More information

Use of the LDPC codes Over the Binary Erasure Multiple Access Channel

Use of the LDPC codes Over the Binary Erasure Multiple Access Channel Use of the LDPC codes Over the Binary Erasure Multiple Access Channel Sareh Majidi Ivari A Thesis In the Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements

More information

Unit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers

Unit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers Contents STRAND B: Number Theory Unit 7 Number System and Bases Student Text Contents Section 7. Number System 7.2 Binary Numbers 7.3 Adding and Subtracting Binary Numbers 7.4 Multiplying Binary Numbers

More information

Solution for Homework set 3

Solution for Homework set 3 TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

More information

K 4 C 5. Figure 4.5: Some well known family of graphs

K 4 C 5. Figure 4.5: Some well known family of graphs 08 CHAPTER. TOPICS IN CLASSICAL GRAPH THEORY K, K K K, K K, K K, K C C C C 6 6 P P P P P. Graph Operations Figure.: Some well known family of graphs A graph Y = (V,E ) is said to be a subgraph of a graph

More information

6. Advanced Topics in Computability

6. Advanced Topics in Computability 227 6. Advanced Topics in Computability The Church-Turing thesis gives a universally acceptable definition of algorithm Another fundamental concept in computer science is information No equally comprehensive

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 9.3: An arithmetic progression is an increasing sequence of numbers of the form a, a+d, a+ d, a + 3d.... Van der Waerden s theorem says that no matter how we partition the natural numbers into

More information

Algorithms - Ch2 Sorting

Algorithms - Ch2 Sorting Algorithms - Ch2 Sorting (courtesy of Prof.Pecelli with some changes from Prof. Daniels) 1/28/2015 91.404 - Algorithms 1 Algorithm Description Algorithm Description: -Pseudocode see conventions on p. 20-22

More information

Scribe: Virginia Williams, Sam Kim (2016), Mary Wootters (2017) Date: May 22, 2017

Scribe: Virginia Williams, Sam Kim (2016), Mary Wootters (2017) Date: May 22, 2017 CS6 Lecture 4 Greedy Algorithms Scribe: Virginia Williams, Sam Kim (26), Mary Wootters (27) Date: May 22, 27 Greedy Algorithms Suppose we want to solve a problem, and we re able to come up with some recursive

More information

The Extraction and Complexity Limits of Graphical Models for Linear Codes

The Extraction and Complexity Limits of Graphical Models for Linear Codes 1 The Extraction and omplexity Limits of Graphical Models for Linear odes Thomas R. Halford and Keith M. hugg ommunication Sciences Institute Department of Electrical Engineering - Systems University of

More information

INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES

INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES RACHEL CARANDANG Abstract. This paper provides an overview of the homology groups of a 2- dimensional complex. It then demonstrates a proof of the Invariance

More information

COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074

COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074 COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME CHRIS BURNS AND BENJAMIN PURCELL Department of Mathematics Oberlin College Oberlin OH 44074 Abstract. Ralf Stephan recently

More information

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY /$ IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY /$ IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY 2007 599 Results on Punctured Low-Density Parity-Check Codes and Improved Iterative Decoding Techniques Hossein Pishro-Nik, Member, IEEE,

More information

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS Department of Computer Science University of Babylon LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS By Faculty of Science for Women( SCIW), University of Babylon, Iraq Samaher@uobabylon.edu.iq

More information

CSC 373 Lecture # 3 Instructor: Milad Eftekhar

CSC 373 Lecture # 3 Instructor: Milad Eftekhar Huffman encoding: Assume a context is available (a document, a signal, etc.). These contexts are formed by some symbols (words in a document, discrete samples from a signal, etc). Each symbols s i is occurred

More information

LECTURES 3 and 4: Flows and Matchings

LECTURES 3 and 4: Flows and Matchings LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that

More information

Exam 3 Practice Problems

Exam 3 Practice Problems Exam 3 Practice Problems HONOR CODE: You are allowed to work in groups on these problems, and also to talk to the TAs (the TAs have not seen these problems before and they do not know the solutions but

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization

More information

How Do More Golay Sequences Arise?

How Do More Golay Sequences Arise? How Do More Golay Sequences Arise? Frank Fiedler Jonathan Jedwab May 13, 2005 (revised May 17, 2006) Abstract In 1999 Davis and Jedwab gave a direct construction of Golay complementary sequences over Z

More information

P( Hit 2nd ) = P( Hit 2nd Miss 1st )P( Miss 1st ) = (1/15)(15/16) = 1/16. P( Hit 3rd ) = (1/14) * P( Miss 2nd and 1st ) = (1/14)(14/15)(15/16) = 1/16

P( Hit 2nd ) = P( Hit 2nd Miss 1st )P( Miss 1st ) = (1/15)(15/16) = 1/16. P( Hit 3rd ) = (1/14) * P( Miss 2nd and 1st ) = (1/14)(14/15)(15/16) = 1/16 CODING and INFORMATION We need encodings for data. How many questions must be asked to be certain where the ball is. (cases: avg, worst, best) P( Hit 1st ) = 1/16 P( Hit 2nd ) = P( Hit 2nd Miss 1st )P(

More information

Solutions to the Second Midterm Exam

Solutions to the Second Midterm Exam CS/Math 240: Intro to Discrete Math 3/27/2011 Instructor: Dieter van Melkebeek Solutions to the Second Midterm Exam Problem 1 This question deals with the following implementation of binary search. Function

More information

CSC 310, Fall 2011 Solutions to Theory Assignment #1

CSC 310, Fall 2011 Solutions to Theory Assignment #1 CSC 310, Fall 2011 Solutions to Theory Assignment #1 Question 1 (15 marks): Consider a source with an alphabet of three symbols, a 1,a 2,a 3, with probabilities p 1,p 2,p 3. Suppose we use a code in which

More information

Basic Graph Theory with Applications to Economics

Basic Graph Theory with Applications to Economics Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements

More information

Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker

Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker version: 15 January 2013 Source file: arch110fall12.tex page 2: Handout 1, Course specification.

More information

Some announcements. Announcements for game due (via ) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17

Some announcements. Announcements for game due (via  ) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17 Hamming Codes Some announcements Announcements for game due (via email) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17 Today s Goals Learn about error correcting codes and how they

More information

An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences

An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences Theory and Applications of Graphs Volume 5 Issue 2 Article 2 July 2018 An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences Kai Wang Georgia Southern University, kwang@georgiasouthern.edu

More information

Greedy Algorithms CHAPTER 16

Greedy Algorithms CHAPTER 16 CHAPTER 16 Greedy Algorithms In dynamic programming, the optimal solution is described in a recursive manner, and then is computed ``bottom up''. Dynamic programming is a powerful technique, but it often

More information

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Alessandro Artale UniBZ - http://www.inf.unibz.it/ artale/ SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All

More information

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Introduction to Sets and Logic (MATH 1190)

Introduction to Sets and Logic (MATH 1190) Introduction to Sets and Logic () Instructor: Email: shenlili@yorku.ca Department of Mathematics and Statistics York University Dec 4, 2014 Outline 1 2 3 4 Definition A relation R from a set A to a set

More information

8.2 Paths and Cycles

8.2 Paths and Cycles 8.2 Paths and Cycles Degree a b c d e f Definition The degree of a vertex is the number of edges incident to it. A loop contributes 2 to the degree of the vertex. (G) is the maximum degree of G. δ(g) is

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 7 January 30, 2012 CPSC 467b, Lecture 7 1/44 Public-key cryptography RSA Factoring Assumption Computing with Big Numbers Fast Exponentiation

More information

1 Format. 2 Topics Covered. 2.1 Minimal Spanning Trees. 2.2 Union Find. 2.3 Greedy. CS 124 Quiz 2 Review 3/25/18

1 Format. 2 Topics Covered. 2.1 Minimal Spanning Trees. 2.2 Union Find. 2.3 Greedy. CS 124 Quiz 2 Review 3/25/18 CS 124 Quiz 2 Review 3/25/18 1 Format You will have 83 minutes to complete the exam. The exam may have true/false questions, multiple choice, example/counterexample problems, run-this-algorithm problems,

More information

Cyclic base orders of matroids

Cyclic base orders of matroids Cyclic base orders of matroids Doug Wiedemann May 9, 2006 Abstract This is a typewritten version, with many corrections, of a handwritten note, August 1984, for a course taught by Jack Edmonds. The purpose

More information

6. Finding Efficient Compressions; Huffman and Hu-Tucker

6. Finding Efficient Compressions; Huffman and Hu-Tucker 6. Finding Efficient Compressions; Huffman and Hu-Tucker We now address the question: how do we find a code that uses the frequency information about k length patterns efficiently to shorten our message?

More information

Discrete Mathematics Lecture 4. Harper Langston New York University

Discrete Mathematics Lecture 4. Harper Langston New York University Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a

More information

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 ANDREW J. HANSON AND JI-PING SHA In this paper we present a systematic and explicit algorithm for tessellating the algebraic surfaces (real 4-manifolds) F

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

CS525 Winter 2012 \ Class Assignment #2 Preparation

CS525 Winter 2012 \ Class Assignment #2 Preparation 1 CS525 Winter 2012 \ Class Assignment #2 Preparation Ariel Stolerman 2.26) Let be a CFG in Chomsky Normal Form. Following is a proof that for any ( ) of length exactly steps are required for any derivation

More information

Sorting Algorithms. CSE21 Winter 2017, Day 2 (B00), Day 1-2 (A00) January 11, 2017

Sorting Algorithms. CSE21 Winter 2017, Day 2 (B00), Day 1-2 (A00) January 11, 2017 Sorting Algorithms CSE21 Winter 2017, Day 2 (B00), Day 1-2 (A00) January 11, 2017 Sorting (or Ordering) Section 3.1 in Rosen vs. * Assume elements of the set to be sorted have some underlying order Why

More information

Graph Theory Questions from Past Papers

Graph Theory Questions from Past Papers Graph Theory Questions from Past Papers Bilkent University, Laurence Barker, 19 October 2017 Do not forget to justify your answers in terms which could be understood by people who know the background theory

More information

Fast Sorting and Selection. A Lower Bound for Worst Case

Fast Sorting and Selection. A Lower Bound for Worst Case Lists and Iterators 0//06 Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 0 Fast Sorting and Selection USGS NEIC. Public domain government

More information

A Toolkit for List Recovery. Nick Wasylyshyn A THESIS. Mathematics

A Toolkit for List Recovery. Nick Wasylyshyn A THESIS. Mathematics A Toolkit for List Recovery Nick Wasylyshyn A THESIS in Mathematics Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for the Degree of Master of Arts

More information

looking ahead to see the optimum

looking ahead to see the optimum ! Make choice based on immediate rewards rather than looking ahead to see the optimum! In many cases this is effective as the look ahead variation can require exponential time as the number of possible

More information

CSE Winter 2015 Quiz 2 Solutions

CSE Winter 2015 Quiz 2 Solutions CSE 101 - Winter 2015 Quiz 2 s January 27, 2015 1. True or False: For any DAG G = (V, E) with at least one vertex v V, there must exist at least one topological ordering. (Answer: True) Fact (from class)

More information

Experiment # 5. Introduction to Error Control Codes

Experiment # 5. Introduction to Error Control Codes ECE 417 Winter 2003 Experiment # 5 Introduction to Error Control Codes 1 Purpose The purpose for this experiment is to provide you with an introduction to the field of error control coding. This will be

More information

arxiv: v4 [math.gr] 16 Apr 2015

arxiv: v4 [math.gr] 16 Apr 2015 On Jones subgroup of R. Thompson group F arxiv:1501.0074v4 [math.gr] 16 Apr 015 Gili Golan, Mark Sapir April 17, 015 Abstract Recently Vaughan Jones showed that the R. Thompson group F encodes in a natural

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Framework for Design of Dynamic Programming Algorithms

Framework for Design of Dynamic Programming Algorithms CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied

More information

For 100% Result Oriented IGNOU Coaching and Project Training Call CPD: ,

For 100% Result Oriented IGNOU Coaching and Project Training Call CPD: , ASSIGNMENT OF MCS-031(ADA) Question 1: (a) Show, through appropriate examples or otherwise, that the following three characteristics of an algorithm are independent (i) finiteness An algorithm must terminate

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 52, NO 4, APRIL 2006 1425 Tradeoff Functions for Constrained Systems With Unconstrained Positions T Lei Poo, Member, IEEE, Panu Chaichanavong, Member, IEEE,

More information

CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague December 16, CS1800 Discrete Structures Final

CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague December 16, CS1800 Discrete Structures Final CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague December 16, 2016 Instructions: CS1800 Discrete Structures Final 1. The exam is closed book and closed notes. You may

More information