392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions
|
|
- Maud Margaret Neal
- 5 years ago
- Views:
Transcription
1 92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm for choosing progressively longer binary block codes with a given minimum distance d produces some surprisingly good linear codes. A binary lexicographic code (or lexicode) C(n,d) of length n and minimum distance d is defined as follows [Conway and Sloane, 986]. First, the binary n-tuples {x (x,x,...,x n ) (F 2 ) n } are put into lexicographical order corresponding to the standard binary representation of the integers in the interval [, 2 n ); i.e., x > x if and only if x 2x 2 n x n > x 2x 2 n x n. Now C(n, d) is constructed by considering the binary n-tuples in lexicographical order, smallest to largest, starting with, and greedily including an n-tuple in C(n,d) if and only if it is at Hamming distance d or greater from all previously chosen n-tuples. For example, to construct the lexicode C(, 2) of length and minimum distance 2, we consider the binary -tuples in the following order and make the following choices: tuple integer include? choices so far yes no 2 no yes, 4 no, 5 yes,, 6 yes,,, 7 no,,, Thus C(, 2) is the (, 2, 2) single-parity-check code of length. (a) ( points) Construct the lexicode C(6, 4) of length 6 and minimum distance 4. Considering the 64 binary 6-tuples in lexicographical order, we first choose. The next 6-tuple with at least 4 ones is ; thus C(4, 4) is the (4,, 4) repetition code. We clearly can achieve a distance of at most 2 from and in the first four coordinates; therefore the next 6-tuple must be. Complementing the first four coordinates gives us the next and final word,. Thus C(6, 4) is the (6, 2, 4) binary linear block code generated by and. (b) ( points) What is the shortest nontrivial lexicode with minimum distance d? A code that contains only the all-zero word is trivial. The next word to be added in a distance-d lexicode must differ from the all-zero word in d places. Thus the shortest nontrivial lexicode with distance d is the code consisting of an all-zero d-tuple and an all-one d-tuple, namely the (d,,d) binary repetition code of length d.
2 (c) ( points) Assume that C(n,d) is a binary linear (n,k,d) block code. Show that C(n,d) is a binary linear (n,k,d) block code, where either k k or k k. Conclude that every lexicode C(n,d) is a binary linear block code. [Hint: let C (n,d) be the (n,k,d) block code obtained by extending all words in C(n,d) by a zero bit. Show that if there exists an (n )-tuple x (F 2 ) n at distance d from all words in C (n,d), then all words in the set C (n,d) x are at distance d from all words in C (n,d), and that there are no other such words.] Following the hint, it is obvious that if we consider the (n )-tuples in lexicographical order, then the words that we select for C(n,d) with x n will be the same as the words that we select for C(n,d), extended by a zero bit, x n. Therefore C (n,d) must be a subcode of C(n,d), and all words x C(n,d) that are not in C (n,d) must have x n. Since C(n,d) is linear (a group) by assumption, and addition of (n )-tuples is componentwise mod-2 addition, it follows that C (n,d) is also a linear code. Let us suppose that there exists a word x with x n that is at distance d from all words in C (n,d); if no such word exists, then C(n,d) C (n,d). Then the translate (coset) C (n,d) x must be a set of (n )-tuples of Hamming weight d or greater. Now let x x c be any other element of this translate, where c C (n,d); then C (n,d)x C (n,d)cx C (n,d)x, since C (n,d)c C (n,d), by the group property of C (n,d). Therefore the set of Hamming distances from x to all elements of C (n,d) is the same as that of x, so all such distances are greater than or equal to d. Finally, the difference between x and any other element of C (n,d) x is a nonzero codeword in C (n,d), and therefore the distance between x and any other element of C (n,d) x is also greater than or equal to d. Therefore all words in the translate C (n,d) x may be selected by the greedy lexicode construction algorithm. Finally, we should show that no other (n )-tuple x with x n can be selected. I confess that I don t know how to prove this; I was hoping that one of you would. Conway and Sloane use a general theorem from combinatorial game theory to prove that C(n, d) must be linear; given linearity, all words in C (n,d) x must be in C(n,d), and there can be no others with x n because only half the codewords c can have c n. Given that C(n,d) linear implies C(n,d) linear and that C(d,d) is linear, we may finally conclude that C(n,d) is a nontrivial linear code for all n d. (d) (2 points) Using the results of part (c), show that we can choose as generators for C(n,d) the generators of C(n,d), extended by a zero bit, plus (if dim C(n,d) > dim C(n,d)) the word in C(n,d) with x n that has the greatest number of low-order zeroes (i.e., the first index k for which x k is as great as possible). Show that such a set of generators for C(n,d) is trellis-oriented (minimum-span). Part (c) shows that we can add at most one generator each time we extend the code length. Therefore the stopping times of all generators are different. 2
3 Suppose that there is a generator g of C (n,d) that starts at the same time as the element of C (n,d)x that we have chosen as our new generator g. Then gg is an element of C (n,d)x that starts later than g, contradiction. Therefore no generator of C (n,d) starts at the same time as the new generator starts. By induction, the starting times of all generators are different. Since all starting and stopping times are different, this set of generators for C(n,d) is trellis-oriented (minimum-span). (e) ( points) Using this method, find a set of trellis-oriented generators for C(8, 4). From part (a), the first two generators (extended to length 8) are and. We can extend to length 7 with the generator x, which is at distance 4 from all words in C (7, 4). (Some of you guessed that would be the next generator, but is lexicographically least.) The latest starting time in the translate C (7, 4) x is attained by or, which may be taken as the next trellis-oriented generator. Finally, we can extend to length 8 with the (lexicographically least) generator x. The latest starting time in the translate C (8, 4) x is attained by, which may be taken as the final trellis-oriented generator. Thus C(8, 4) is generated by {,,, }; i.e., it is the (8,4,4) Reed-Muller code with the standard RM coordinate ordering. Problem F.2 (6 points) In this problem, we will analyze the performance of iterative decoding of a simple concatenated code C on a binary erasure channel (BEC) with erasure probability p, in the limit as the code becomes very long (n ). info bits (,, ) Π u(d) D y(d) Figure. Encoder for concatenated code C. The encoder for a repeat-accumulate (RA) code C is shown in Figure above; it works as follows. A sequence of information bits is first encoded by an encoder for a (,, ) repetition code, which simply repeats each information bit three times. The resulting sequence is then permuted by a large pseudo-random permutation Π. The permuted sequence u(d) is then encoded by a rate-/ 2-state convolutional encoder with input/output relation y(d) u(d)/(d); i.e., the input/output equation is y k u k y k, so the output bit is simply the accumulation of all previous input bits (mod 2). (a) What is the rate of this code C? The rate of the repetition code is. The rate of the convolutional code is ; i.e., it puts one bit out for every one bit in. Therefore the overall code rate is r. (b) Show that the code C is represented by the normal graph of Figure 2.
4 Π Figure 2. Normal graph of concatenated code C. The left-side nodes of Figure 2 represent the repetition code. Since the original information bits are not transmitted, they are regarded as hidden state variables, repeated three times. The repeated bits are permuted in the permutation Π. On the right side, the permuted bits u k are the input bits and the y k are the output bits of a 2-state trellis, whose states are the output bits y k. The trellis constraints are represented explicitly by zero-sum nodes that enforce the constraints y k u k y k. (c) Suppose that the encoded bits are sent over a BEC with erasure probability p. Explain how iterative decoding works in this case, using a schedule that alternates between the left constraints and the right constraints. The outputs of a BEC are either known with certainty or completely unknown (erased). The sum-product algorithm reduces to propagation of known variables through the code graph. If any variable incident on a repetition node becomes known, then all become known. On the other hand, for a zero-sum node, all but one incident variable must be known in order to determine the last incident variable; otherwise all unknown incident variables remain unknown. In detail, we see that initially an input bit u k becomes known if and only if the two adjoining received symbols, y k and y k, are unerased. After passage through Π, these known bits propagate through the repetition nodes to make all equal variables known. After passage through Π, the right-going known bits are propagated through the trellis, with additional input or output bits becoming known whenever two of the three bits in any set {y k,u k,y k } become known. Known input bits u k are then propagated back through Π, and so forth. 4
5 (d) Show that, as n, if the probability that a left-going iterative decoding message is erased is q r l, then the probability that a right-going messages is erased after a left-side update is given by q l r (q r l ) 2. As n, for any fixed number m of iterations, we may assume that all variables in the m-level computation tree are independent. A right-going message is erased if and only if both left-going messages that are incident on the same repetition node is erased. Thus if these two variables are independent, each with probability q r l of erasure, then q l r (q r l ) 2. (e) Similarly, show that if the probability that a right-going iterative decoding message is erased is q l r, then the probability that a left-going message is erased after a right-side update is given by ( p) 2 q r l ( p pq l r ) 2. [Hint: observe that as n, the right-side message probability distributions become invariant to a shift of one time unit.] For a particular input bit, the messages that contribute to the calculation of the outgoing message look like this: q in p q in p p q in p q in x y x y x x y x y x q out Here p denotes the probability that an output bit y k will be erased on the channel, q in denotes the probability q l r that an input bit u k will still be erased after the previous iteration, and q out denotes the probability q r l that the bit that we are interested in will be erased after this iteration. Again, as n, we may assume that all of these probabilities are independent. Following the hint, we use the symmetry and time-invariance of the trellises on either side of u k to assert that as n the probability of erasure x in all of the messages marked with x will be the same, and similarly that the probability of erasure y in all of the messages marked with y will be the same. The relations between these probabilities are then evidently as follows: x py; y ( q in )( x); q out ( x) 2. Solving the first two equations, we obtain y q in p pq in, x pq in p pq in, and thus q out ( p) 2 ( p pq in ) 2. 5
6 (f) Using a version of the area theorem that is appropriate for this scenario, show that iterative decoding cannot succeed if p 2. The area under the curve of part (d) is The area under the curve of part (e) is q 2 dq. ( p) 2 ( p)2 ( p pq) 2dq p [ p pq Iterative decoding will succeed if and only if the two curves do not cross. In order for the two curves not to cross, the sum of these two areas must be less than the area of the EXIT chart; i.e., p <, which is equivalent to p < 2 ; i.e., the capacity p of the BEC, namely p, must be greater than the rate of the RA code, namely. (For example, in Figure below, the area above the top curve is, whereas the area below the bottom curve is.) 2 (g) The two curves given in parts (d) and (e) are plotted in the EXIT chart below for p.5. Show that iterative decoding succeeds in this case. p.5 ] p. q l r.75 q r l Figure. EXIT chart for iterative decoding of C on a BEC with p.5. The two curves do not cross, so iterative decoding starting at (q r l,q l r ) (, ) must succeed (reach (q r l,q l r ) (, )). 6
7 (h) [Optional; extra credit.] Determine whether or not iterative decoding succeeds for p.6. The easiest way to determine whether iterative decoding succeeds for p.6 is to simulate it using the equations above. We obtain q l r q r l Thus iterative decoding succeeds fairly easily for p.6, even though the capacity of a BEC with p.6 is only.4, not much greater than the rate of the RA code. It is possible therefore that irregular RA codes may be capacity-approaching for the BEC. Even with regular codes, the two EXIT curves are already quite well matched. However, note that only the left degrees can be made irregular, which limits design flexibility. Scores on final exam: 56, 5, 47, 42, 42, 4,,, 7. 7
Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.
Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial
More informationFormally Self-Dual Codes Related to Type II Codes
Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya 464 8602, Japan and Masaaki Harada Department of Mathematical Sciences Yamagata
More informationConcatenated codes (CH 15)
Concatenated codes (CH 15) Simple (classical, single-level) concatenation Length of concatenated code is n 1 n 2 Dimension of concatenated code is k 1 k 2 If minimum distances of component codes are d
More informationCPS 102: Discrete Mathematics. Quiz 3 Date: Wednesday November 30, Instructor: Bruce Maggs NAME: Prob # Score. Total 60
CPS 102: Discrete Mathematics Instructor: Bruce Maggs Quiz 3 Date: Wednesday November 30, 2011 NAME: Prob # Score Max Score 1 10 2 10 3 10 4 10 5 10 6 10 Total 60 1 Problem 1 [10 points] Find a minimum-cost
More informationProject 1. Implementation. Massachusetts Institute of Technology : Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A.
Massachusetts Institute of Technology Handout 18.413: Error Correcting Codes Laboratory March 4, 2004 Professor Daniel A. Spielman Project 1 In this project, you are going to implement the simplest low
More informationMAT 243 Test 2 SOLUTIONS, FORM A
MAT 243 Test 2 SOLUTIONS, FORM A 1. [15 points] Calculate the following quantities: a. 17 mod 4 Solution: 17 17 4 = 17 4 4 = 1. 4 b. 17 div 4 17 Solution: = 4. 4 c. (( 1) mod 12) mod (27 div 5) Solution:
More informationDiversity Coloring for Distributed Storage in Mobile Networks
Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring
More informationConstruction C : an inter-level coded version of Construction C
Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very
More informationComplexity-Optimized Low-Density Parity-Check Codes
Complexity-Optimized Low-Density Parity-Check Codes Masoud Ardakani Department of Electrical & Computer Engineering University of Alberta, ardakani@ece.ualberta.ca Benjamin Smith, Wei Yu, Frank R. Kschischang
More informationUCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016)
UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, June 8, 27 Solutions to Practice Final Examination (Spring 26) There are 4 problems, each problem with multiple parts, each part worth points. Your
More informationLinear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions
Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator
More information5. Lecture notes on matroid intersection
Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)
More informationGraph based codes for distributed storage systems
/23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA
More informationEDAA40 At home exercises 1
EDAA40 At home exercises 1 1. Given, with as always the natural numbers starting at 1, let us define the following sets (with iff ): Give the number of elements in these sets as follows: 1. 23 2. 6 3.
More informationSEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION
CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Copyright Cengage Learning. All rights reserved. SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All rights reserved.
More informationMC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points
MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you
More informationError correction guarantees
Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if
More information2 Geometry Solutions
2 Geometry Solutions jacques@ucsd.edu Here is give problems and solutions in increasing order of difficulty. 2.1 Easier problems Problem 1. What is the minimum number of hyperplanar slices to make a d-dimensional
More information1 Counting triangles and cliques
ITCSC-INC Winter School 2015 26 January 2014 notes by Andrej Bogdanov Today we will talk about randomness and some of the surprising roles it plays in the theory of computing and in coding theory. Let
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationCS 512, Spring 2017: Take-Home End-of-Term Examination
CS 512, Spring 2017: Take-Home End-of-Term Examination Out: Tuesday, 9 May 2017, 12:00 noon Due: Wednesday, 10 May 2017, by 11:59 am Turn in your solutions electronically, as a single PDF file, by placing
More informationFebruary 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms
Chapter 3 Greedy Algorithms Greedy algorithms are algorithms prone to instant gratification. Without looking too far ahead, at each step they make a locally optimum choice, with the hope that it will lead
More informationExplicit Polar Codes with Small Scaling Exponent
Explicit Polar Codes with Small Scaling Exponent arxiv:9.886v [cs.it] 24 Jan 29 Hanwen Yao University of California San Diego 95 Gilman Drive, La Jolla, CA 9293 hay25@ucsd.edu Alexander Vardy University
More informationA greedy, partially optimal proof of the Heine-Borel Theorem
A greedy, partially optimal proof of the Heine-Borel Theorem James Fennell September 28, 2017 Abstract The Heine-Borel theorem states that any open cover of the closed interval Œa; b contains a finite
More informationLOW-density parity-check (LDPC) codes have attracted
2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,
More information6. Lecture notes on matroid intersection
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm
More informationQED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C:
Lecture 3: Lecture notes posted online each week. Recall Defn Hamming distance: for words x = x 1... x n, y = y 1... y n of the same length over the same alphabet, d(x, y) = {1 i n : x i y i } i.e., d(x,
More informationAMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.
AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a
More informationWe show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C.
219 Lemma J For all languages A, B, C the following hold i. A m A, (reflexive) ii. if A m B and B m C, then A m C, (transitive) iii. if A m B and B is Turing-recognizable, then so is A, and iv. if A m
More informationA geometric non-existence proof of an extremal additive code
A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento
More informationComparison of Decoding Algorithms for Concatenated Turbo Codes
Comparison of Decoding Algorithms for Concatenated Turbo Codes Drago Žagar, Nenad Falamić and Snježana Rimac-Drlje University of Osijek Faculty of Electrical Engineering Kneza Trpimira 2b, HR-31000 Osijek,
More informationError-Correcting Codes
Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The
More informationCHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism
CHAPTER 2 Graphs 1. Introduction to Graphs and Graph Isomorphism 1.1. The Graph Menagerie. Definition 1.1.1. A simple graph G = (V, E) consists of a set V of vertices and a set E of edges, represented
More informationModern Communications Chapter 5. Low-Density Parity-Check Codes
1/14 Modern Communications Chapter 5. Low-Density Parity-Check Codes Husheng Li Min Kao Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville Spring, 2017 2/14 History
More informationAtCoder World Tour Finals 2019
AtCoder World Tour Finals 201 writer: rng 58 February 21st, 2018 A: Magic Suppose that the magician moved the treasure in the order y 1 y 2 y K+1. Here y i y i+1 for each i because it doesn t make sense
More informationLecture 22 Tuesday, April 10
CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,
More informationLOW-density parity-check (LDPC) codes are widely
1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationGraph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California
Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)
More informationDiscrete mathematics
Discrete mathematics Petr Kovář petr.kovar@vsb.cz VŠB Technical University of Ostrava DiM 470-2301/02, Winter term 2018/2019 About this file This file is meant to be a guideline for the lecturer. Many
More informationKnow the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.
The first exam will be on Wednesday, September 22, 2010. The syllabus will be sections 1.1 and 1.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive
More informationMaximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube
Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long
More informationarxiv:cs/ v1 [cs.it] 8 Feb 2007
Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber Institute for Information Transmission, University
More informationITERATIVE decoders have gained widespread attention
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents
More informationUse of the LDPC codes Over the Binary Erasure Multiple Access Channel
Use of the LDPC codes Over the Binary Erasure Multiple Access Channel Sareh Majidi Ivari A Thesis In the Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements
More informationUnit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers
Contents STRAND B: Number Theory Unit 7 Number System and Bases Student Text Contents Section 7. Number System 7.2 Binary Numbers 7.3 Adding and Subtracting Binary Numbers 7.4 Multiplying Binary Numbers
More informationSolution for Homework set 3
TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities
More informationK 4 C 5. Figure 4.5: Some well known family of graphs
08 CHAPTER. TOPICS IN CLASSICAL GRAPH THEORY K, K K K, K K, K K, K C C C C 6 6 P P P P P. Graph Operations Figure.: Some well known family of graphs A graph Y = (V,E ) is said to be a subgraph of a graph
More information6. Advanced Topics in Computability
227 6. Advanced Topics in Computability The Church-Turing thesis gives a universally acceptable definition of algorithm Another fundamental concept in computer science is information No equally comprehensive
More informationHW Graph Theory SOLUTIONS (hbovik) - Q
1, Diestel 9.3: An arithmetic progression is an increasing sequence of numbers of the form a, a+d, a+ d, a + 3d.... Van der Waerden s theorem says that no matter how we partition the natural numbers into
More informationAlgorithms - Ch2 Sorting
Algorithms - Ch2 Sorting (courtesy of Prof.Pecelli with some changes from Prof. Daniels) 1/28/2015 91.404 - Algorithms 1 Algorithm Description Algorithm Description: -Pseudocode see conventions on p. 20-22
More informationScribe: Virginia Williams, Sam Kim (2016), Mary Wootters (2017) Date: May 22, 2017
CS6 Lecture 4 Greedy Algorithms Scribe: Virginia Williams, Sam Kim (26), Mary Wootters (27) Date: May 22, 27 Greedy Algorithms Suppose we want to solve a problem, and we re able to come up with some recursive
More informationThe Extraction and Complexity Limits of Graphical Models for Linear Codes
1 The Extraction and omplexity Limits of Graphical Models for Linear odes Thomas R. Halford and Keith M. hugg ommunication Sciences Institute Department of Electrical Engineering - Systems University of
More informationINTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES
INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES RACHEL CARANDANG Abstract. This paper provides an overview of the homology groups of a 2- dimensional complex. It then demonstrates a proof of the Invariance
More informationCOUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074
COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME CHRIS BURNS AND BENJAMIN PURCELL Department of Mathematics Oberlin College Oberlin OH 44074 Abstract. Ralf Stephan recently
More informationA New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods
SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY /$ IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 2, FEBRUARY 2007 599 Results on Punctured Low-Density Parity-Check Codes and Improved Iterative Decoding Techniques Hossein Pishro-Nik, Member, IEEE,
More informationECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014
Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate
More informationLECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS
Department of Computer Science University of Babylon LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS By Faculty of Science for Women( SCIW), University of Babylon, Iraq Samaher@uobabylon.edu.iq
More informationCSC 373 Lecture # 3 Instructor: Milad Eftekhar
Huffman encoding: Assume a context is available (a document, a signal, etc.). These contexts are formed by some symbols (words in a document, discrete samples from a signal, etc). Each symbols s i is occurred
More informationLECTURES 3 and 4: Flows and Matchings
LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that
More informationExam 3 Practice Problems
Exam 3 Practice Problems HONOR CODE: You are allowed to work in groups on these problems, and also to talk to the TAs (the TAs have not seen these problems before and they do not know the solutions but
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationDesign and Analysis of Algorithms
CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization
More informationHow Do More Golay Sequences Arise?
How Do More Golay Sequences Arise? Frank Fiedler Jonathan Jedwab May 13, 2005 (revised May 17, 2006) Abstract In 1999 Davis and Jedwab gave a direct construction of Golay complementary sequences over Z
More informationP( Hit 2nd ) = P( Hit 2nd Miss 1st )P( Miss 1st ) = (1/15)(15/16) = 1/16. P( Hit 3rd ) = (1/14) * P( Miss 2nd and 1st ) = (1/14)(14/15)(15/16) = 1/16
CODING and INFORMATION We need encodings for data. How many questions must be asked to be certain where the ball is. (cases: avg, worst, best) P( Hit 1st ) = 1/16 P( Hit 2nd ) = P( Hit 2nd Miss 1st )P(
More informationSolutions to the Second Midterm Exam
CS/Math 240: Intro to Discrete Math 3/27/2011 Instructor: Dieter van Melkebeek Solutions to the Second Midterm Exam Problem 1 This question deals with the following implementation of binary search. Function
More informationCSC 310, Fall 2011 Solutions to Theory Assignment #1
CSC 310, Fall 2011 Solutions to Theory Assignment #1 Question 1 (15 marks): Consider a source with an alphabet of three symbols, a 1,a 2,a 3, with probabilities p 1,p 2,p 3. Suppose we use a code in which
More informationBasic Graph Theory with Applications to Economics
Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements
More informationArchive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker
Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker version: 15 January 2013 Source file: arch110fall12.tex page 2: Handout 1, Course specification.
More informationSome announcements. Announcements for game due (via ) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17
Hamming Codes Some announcements Announcements for game due (via email) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17 Today s Goals Learn about error correcting codes and how they
More informationAn Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences
Theory and Applications of Graphs Volume 5 Issue 2 Article 2 July 2018 An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences Kai Wang Georgia Southern University, kwang@georgiasouthern.edu
More informationGreedy Algorithms CHAPTER 16
CHAPTER 16 Greedy Algorithms In dynamic programming, the optimal solution is described in a recursive manner, and then is computed ``bottom up''. Dynamic programming is a powerful technique, but it often
More informationSEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION
CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Alessandro Artale UniBZ - http://www.inf.unibz.it/ artale/ SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All
More informationThe Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code
Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationIntroduction to Sets and Logic (MATH 1190)
Introduction to Sets and Logic () Instructor: Email: shenlili@yorku.ca Department of Mathematics and Statistics York University Dec 4, 2014 Outline 1 2 3 4 Definition A relation R from a set A to a set
More information8.2 Paths and Cycles
8.2 Paths and Cycles Degree a b c d e f Definition The degree of a vertex is the number of edges incident to it. A loop contributes 2 to the degree of the vertex. (G) is the maximum degree of G. δ(g) is
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 7 January 30, 2012 CPSC 467b, Lecture 7 1/44 Public-key cryptography RSA Factoring Assumption Computing with Big Numbers Fast Exponentiation
More information1 Format. 2 Topics Covered. 2.1 Minimal Spanning Trees. 2.2 Union Find. 2.3 Greedy. CS 124 Quiz 2 Review 3/25/18
CS 124 Quiz 2 Review 3/25/18 1 Format You will have 83 minutes to complete the exam. The exam may have true/false questions, multiple choice, example/counterexample problems, run-this-algorithm problems,
More informationCyclic base orders of matroids
Cyclic base orders of matroids Doug Wiedemann May 9, 2006 Abstract This is a typewritten version, with many corrections, of a handwritten note, August 1984, for a course taught by Jack Edmonds. The purpose
More information6. Finding Efficient Compressions; Huffman and Hu-Tucker
6. Finding Efficient Compressions; Huffman and Hu-Tucker We now address the question: how do we find a code that uses the frequency information about k length patterns efficiently to shorten our message?
More informationDiscrete Mathematics Lecture 4. Harper Langston New York University
Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a
More informationA TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3
A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 ANDREW J. HANSON AND JI-PING SHA In this paper we present a systematic and explicit algorithm for tessellating the algebraic surfaces (real 4-manifolds) F
More informationClustering Using Graph Connectivity
Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the
More informationCS525 Winter 2012 \ Class Assignment #2 Preparation
1 CS525 Winter 2012 \ Class Assignment #2 Preparation Ariel Stolerman 2.26) Let be a CFG in Chomsky Normal Form. Following is a proof that for any ( ) of length exactly steps are required for any derivation
More informationSorting Algorithms. CSE21 Winter 2017, Day 2 (B00), Day 1-2 (A00) January 11, 2017
Sorting Algorithms CSE21 Winter 2017, Day 2 (B00), Day 1-2 (A00) January 11, 2017 Sorting (or Ordering) Section 3.1 in Rosen vs. * Assume elements of the set to be sorted have some underlying order Why
More informationGraph Theory Questions from Past Papers
Graph Theory Questions from Past Papers Bilkent University, Laurence Barker, 19 October 2017 Do not forget to justify your answers in terms which could be understood by people who know the background theory
More informationFast Sorting and Selection. A Lower Bound for Worst Case
Lists and Iterators 0//06 Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 0 Fast Sorting and Selection USGS NEIC. Public domain government
More informationA Toolkit for List Recovery. Nick Wasylyshyn A THESIS. Mathematics
A Toolkit for List Recovery Nick Wasylyshyn A THESIS in Mathematics Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for the Degree of Master of Arts
More informationlooking ahead to see the optimum
! Make choice based on immediate rewards rather than looking ahead to see the optimum! In many cases this is effective as the look ahead variation can require exponential time as the number of possible
More informationCSE Winter 2015 Quiz 2 Solutions
CSE 101 - Winter 2015 Quiz 2 s January 27, 2015 1. True or False: For any DAG G = (V, E) with at least one vertex v V, there must exist at least one topological ordering. (Answer: True) Fact (from class)
More informationExperiment # 5. Introduction to Error Control Codes
ECE 417 Winter 2003 Experiment # 5 Introduction to Error Control Codes 1 Purpose The purpose for this experiment is to provide you with an introduction to the field of error control coding. This will be
More informationarxiv: v4 [math.gr] 16 Apr 2015
On Jones subgroup of R. Thompson group F arxiv:1501.0074v4 [math.gr] 16 Apr 015 Gili Golan, Mark Sapir April 17, 015 Abstract Recently Vaughan Jones showed that the R. Thompson group F encodes in a natural
More informationModule 7. Independent sets, coverings. and matchings. Contents
Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................
More informationFramework for Design of Dynamic Programming Algorithms
CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied
More informationFor 100% Result Oriented IGNOU Coaching and Project Training Call CPD: ,
ASSIGNMENT OF MCS-031(ADA) Question 1: (a) Show, through appropriate examples or otherwise, that the following three characteristics of an algorithm are independent (i) finiteness An algorithm must terminate
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 52, NO 4, APRIL 2006 1425 Tradeoff Functions for Constrained Systems With Unconstrained Positions T Lei Poo, Member, IEEE, Panu Chaichanavong, Member, IEEE,
More informationCS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague December 16, CS1800 Discrete Structures Final
CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague December 16, 2016 Instructions: CS1800 Discrete Structures Final 1. The exam is closed book and closed notes. You may
More information