Concatenated group theoretic codes for binary asymmetric channels*

Size: px
Start display at page:

Download "Concatenated group theoretic codes for binary asymmetric channels*"

Transcription

1 Concatenated group theoretic codes for binary asymmetric channels* by SERBAN D. CONSTANTIN and T. R. N. RAO Southern Methodist University Dallas, Texas ABSTRACT A brief description of group theoretic codes is given and their suitability for binary asymmetric channels is exemplified. Previous research has shown the superiority in the information rate of the group theoretic codes over the existing codes for binary asymmetric channels and has left open the problems posed by the encoding/decoding procedures. The present paper introduces more sophisticated codes constructed from the already existing single I-error correcting group theoretic codes. The new class of codes, which we will refer to as concatenated group theoretic codes, will have improved encoding/decoding features while maintaining a high information rate comparable with that of equivalent length group theoretic codes. As their name indicates, a code of length 2n will be obtained by concatenating two sets of group theoretic codes of length n. INTRODUCTION Given an abelian group G of order n + 1, one can put in 1-1 correspondence the binarv vectors of length D with the linear combinations (with coefficients 0 or 1) of non-zero elements of G. The correspondence is rather intuitive and is given by: partition the set of 211 binary vectors V of length n into n + 1 disjoint classes of vectors V o, VI'..., V n The linear combinations corresponding to vectors of a class Vi' will sum up to ai, and vectors of each class will form a group theoretic code. Since one tries to optimize the number of codewords in the code, we shall look for the set Vi> having the most number of vectors (codewords) in it. If the best possible code obtainable by this method is desired, one must consider all abelian groups or order n+ I and look at the classes generated by each group and then select the largest such class. For an n as small as 10, one must use a computer in order to generate all classes of vectors generated by a group of order 11 or higher. The error correcting properties and a more detailed description of group theoretic codes can be found in Reference 1. For a comparison of Hamming code 4 and Kim and Freiman code 3 with the group theoretic codes of the same length the reader is referred to Table I. In this paper Zn will have the standard meaning of the addition modulo n group. MATHEMATICAL CONSIDERATIONS Consider two vectors: n 2 lxi ai~ IXl' 1X2', IXn) i=l ( 1.1) (2.1) ai =l=a o are the non-zero elements of the group and Without loss of generality, assume the group operation to be addition. Moreover, the above correspondence will * The authors' research was supported in part by a grant from National Science Foundation Eng ai' b i i = 1,..., n are real numbers. Without loss of generality let's assume: at ~a2 ~a3:5... :5a n { b t :5b 2 :5b 3 :5..:5b n (2.2) If 1T is a permutation, 1T=(il' i 2,..., in), then by 1T(B) we will denote 837

2 838 National Computer Conference, 1977 TABLE I-Number of Codewords for Single-Error Correcting Codes Group Group Code Theoretic Theoretic Length Kim-Freiman Codes Codes n Hamming Code Code G=Zn+lt ** =4 4* =4 22+2= = = 12 10* = = = = = = = =80 94* 94 II 2 7 = = = = = = = = = = = = = = = = = = = = * Figures in these entries are best possible using this method, due to the fact that there is only one group of order n+ I. See Reference 5 for the number of groups of various order. ** The groups considered were the additive groups of the Galois fields GF(pq). Note: The number of codewords in the group theoretic codes in the above table was generated by computer. t These codes were also obtained by Varshamor. 6 is: This follows immediately from: (a 2 -a 1 )(b 2 -b 1 );===0 by expanding the product. Having proved this, to get the general result we are only one step away. Consider any two permutations 7Tl and 7T2 and assume: M(A, B)=7Tl(A)'7T2(B) (2.5) (2.6) and let p be the largest integer such that the scalar product 7Tl(A)'7T2(B) does not contain ap bp as a term. Then '7Tt(.ii1 )-u2(b), must certainly contain ap;bi+afbp But then using- the trivial case considered above, i.e., substituting ap'bj+aj"bp in the scalar product 7T1(A)'7T2(B) with aj"bj+ap'bp we contradict that M(A, B)=7Tl(A) 7T2(B). Repeating the procedure described until p= 1 we obtain the desired result. Q.E.D. Corollary I: For any arbitrary vector A=(a 1, a2,...,an) i.e., the vector whose elements are the elements of B permuted according to 7T. We are interested in finding 7T* such that A B 7T :s;a B 7T * holds for any other permutation 7T, by A B is meant the scalar product of the two vectors i.e., II A'B= " a b,,(.. I I (2.3) j=1 This maximum scalar product i.e., A'B 7T * will be referred to M(A, B), M acts like an operator on the two vectors A and B into the real numbers. Lemma I For any two vectors A and B satisfying (2.2): Proof M(A'B)=A'B=B'A (2.4) Let's consider first the trivial case, i.e., II M(A, A)=A'A= L aj 2 (2.7) 1=1 Similarly, if we define the operator mea, B) to be: for any permutation 7T, then the following similar result is obtained: Lemma 2 For any two vectors A and B satisfying (2.2): Proof' mea, B)= L aj'bn- i + 1 i=1 II (2.9) Similar to the one for Lemma 1. If the elements of a vector A are non-positive and the elements of a vector B are non-negative the following relations hold: such that What we have to show then to prove the lemma in this case M(A, B)=-m(IAI' B) { mea, B)=-M( A,B) (2.10)

3 Binary Asymmetric Channels 839 Finally, one more result is needed. We want to construct a single error correcting code of length two, over the alphabet {O, 1, 2,..., n}, the only possible single errors occurring in a codeword (i, j) are: { (i,j)~(i-1,j) i*o (2.11) (i, j)~(i, j -1) j *0 Maximizing the number of codewords in such a code is also one of the objectives. Consider the following picture: the third property, i. e., no other code can have more codewords than the code described above. Obviously, the number of possible 2-tuples over the alphabet {O, 1, 2,..., n} is (n+1)2. Let n+1=3m+k, k=(n+ 1) mod 3. Then, the number of codewords in our code is: m (n+ 1)+ L 2'[(n+ 1)-3'i]=3'm 2 +2'm'k+k (2.12) i=l In general, for every codeword (i, j) that we include in our code, we eliminate from the list of potential codewords two other tuples, (i -1, j) and (i, j -1); i.e., the contaminated tuples corresponding to the codeword (i, j). With this observation, one can actually convert the original problem into a tile covering problem, namely we will be concerned with covering an (n+1)x(n+1) rectangle of squares with tiles of the shape and orientation of the one in Figure 2, such that no two tiles overlap and as much as possible of the surface of the (n + 1) x (n + 1) rectangle is covered with tiles. Figure 2 Figure 1 Let (i, j) be the name of the square in the ith row and jth column. The collection of the (i, j) 2-tuples corresponding to the shadowed squares in Figure 1, can easily be checked to form a single error correcting code under the conditions of error occurrence as described by (2.11). Note that no additional square could be shadowed such that the augmented code be still single error correcting. However, this does not pr()ve that no other code could have more codew~rds than' this code... Lemma 4 Consider the following length 2 code over the alphabet {O, 1,2,..., n}: (a) (i, i) is a codeword for i=o, 1, 2,..., n (b) if (i, j) is a codeword, so is (i+ 3, j) and (i, j+ 3) for i+3:5n andj+3:5n Then, such a code is cyclic, is single error correcting and contains the maximum number of codewords. Proof. The first two assertions can be easily disposed of using the definition of the code and (2.11). We shall prove only The simplest upper bound for the number of tiles covering the rectangle is b f t 'l -< [area of the SUrfaceJ _ [(n+ 1)2J max num er 0 I esarea f' 1 t'l a smg e I e because = (3m+k)2J [k2j [--3- =3m 2 +2mk+ "3 =3m 2 +2mk+k But, the upper bound coincides with the number of codewords in our code. Q.E.D. The method of finding such codes can be generalized in different directions. For example, one can build a single error correcting length 2 code the first component can take on values from {O, 1,..., n} and the second component can take on values from {O, 1,..., m}. The code could be constructed using a similar picture as the one on Figure 1 except that the surface will be an (n+1)x(m+l) rectangle. Lemma 5 Given N=m+n, N fixed, the length 2 code with the most number of codewords, is obtained for n=n/2, m=n/2.

4 840 National Computer Conference, 1977 Proof. Area of the (n + 1) x (m + 1) rectangle is maximum when n=m. Q.E.D. U sing extensions of the rules given in Lemma 4, one can build a single error correcting length k code over the alphabet {O, 1,..., n}. Proving the maximality of the number of codewords of the length k code constructed by the rules similar to the ones in Lemma 4 requires more involved calculations. At last, the length 2 code over the alphabet {O, 1,..., n} will be called a weight-code and will be used for constructing the concatenated group theoretic codes. CONSTRUCTION OF CONCATENATED GROVP THEORETIC CODES Let GI and G2 be two abelian groups of the same order n+ 1 (as it will be seen GI and G2 need not necessarily be distinct) and let {Yo, VI'..., Vn} and {Uo, UI,..., Un} be the partitions of the set of 2 n binary vectors of length n into n + I disjoint classes of codes as induced by the two groups G I and G2 respectively. Each class (code) Vi' Vi i=o, 1, 2,..., n is a group theoretic code in itself. Distinguishing the codewords in each class by their weight (i.e., # of ] 's in the codewords) we obtain the following classification TABLE II 2 n Vo aoo aoi '. aon VI Vn a no ani,. ann Vo VI V n bno TABLE III 2... n boo bol,... bon bnl,..:... bnn ajj = # of vectors (codewords) of weight j in the class Vi bij = # of vectors (code words) of weight j in the class Vi The length 2n code we will construct, as its name suggests, will be the result of concatenating codewords from some class Vi with codewords from some class Vj in a manner that will result in a maximum number of codewords of length 2n. For ease of reference, let's adopt the following notations: C the concatenated group theoretic code to be constructed W the weight-code. This is a length 2 code, over the alphabet {O, 1,..., n} as described earlier. C I the set of codes generated by G I i.e.: V 0, VI"'" Vn C2 the set of codes generated by G2 i.e.: Vo, VI,..., Un lower case letters will be used to denote codewords I w I weight of codeword w. Then, a condensed description of C could be given in the following form: C={(WIW2) IIwII =i, IW21 (3.1) =j, (i,j)ew, WIEVk, W2EUI) aki and bij are both the rth largest elements, for some r, in the ith column of Table II and jth column of Table III, respectively} For the case GI and G2 have been selected to be one and the same group, in the above definition (3.1) pick k=l. (See Corollary 1). Given the two groups GI and G2 of order n+ 1, one selects a length 2 weight-code, as described in Lemma 4, determining what weights the codewords to be paired together should have. Let Ci' denote the ith column of Table II and ct denote the jth column of Table III, i, j=o, I, 2,..., n. Then, for every codeword (i, j) of the weight-code W, we will generate codewords (WIW2) of C, WI is a codeword in CI of weight i corresponding to some code V k and W2 is a codeword in C2 of weight j corresponding to some code V I k and I are selected as dictated by Lemma 1 applied to the vectors C/ and C/,. Error detection and correction in C: Let (rlr2) be a received message and let's assume that at most one I-error has occurred to the transmitted message (WIW2) of C. From the construction of C we know (Iwll, IW21)EW. Let i= Irll and j= Ir21. If (i, j) is a valid codeword of W then (rlr2)=(wiw2) and hence no error has occurred. However, if (i, j)f/=w then a single I-error has occurred to the transmitted message (WIW2) and more precisely a single 1- error has occurred to either WI or W2 decreasing the weight of one of the two codewords by 1. Therefore, either i= IWII and j= IW21-I; i.e. the error has occurred in W2 or i = I WI 1-1 and j = I w 21; i. e. the error has occurred in WI' Since W is a single error correcting code we can determine(lwll, IW21> and hence know the single I-error has occurred. Let's suppose the error has occurred in W2 and as a result we have received (rlr2)=(wlr2). By the correspondence (1.1) and the structure of GI we establish the membership of WI in some class (code) V k' Let r be the rank of aki in Ci'. Find then the rth largest element (the element of rank r) in CHI" and let this be b lo +l)' Now we know that r2 must have come from a codeword of VI and since V I is a single ] -error correcting code we can correct r 2 and obtain w2. Thus, we will correct (r 1 r2) and obtain the transmitted message (WIW2) of C. The following example goes through each step of the

5 Binary Asymmetric Channeis 841 detecting and correcting procedure described in the previous paragraph for a length 16 concatenated group theoretic code generated by the additive group of the Galois field GF(32). Example Consider the additive group G9 of the Galois field GF(3 2 ) whose addition table is given below: X X I+X X X X I+X 2+X 2X 2X 2X I+2X 2+2X 0 I+X I+X 2+X X 1+2X 2+X 2+X X I+X 2+2X 1+2X i+2x 2+2X 2X X 2+2X 2X 1+2X 2 2X I+X 2+X 1+2X 2+2X 2X l+x 2+X 1+2X 2+2X I+2X 2+X X 2+2X 2X 2+2X X I+X 2X 1+2X 0 1+2X 2+2X 1 2 X 1 2 I+X 2+X 1 2+2X 2X X 1+2X 0 1 l+x X X 2+X 0 1 X I+X For each i, i=o, I,...,8 the codewords in Vi form a group theoretic code, and for purposes of clarity, the codewords of such a code, namely of Vo, will be listed out. They are: co=(o,o,o,o,o,o,o,o); c3=(0,0,0,0, 1,0,0, 1); c6=( 1,1,0,0,1,0,0,1); c9=(0,0, 1,1,0,1,1,0); CI2 =(1, 1, 1, 1,0, 1, 1,0); C 15 =( 1,1,1,1, 1, 1, 1, 1); c I8=(0,1,1,0,0,0,1,0); C21 =(0,1,0,0,0,1,0, I); C24=(1,1,1,0,1,1,0,0); C27=(0, 1,1,1,0,1,0,1); c 30 =( 1,0,1,0,0,1,1,1); c1 =( 1,1,0,0,0,0,0,0); c4=(0,0,0,0,0, 1,1,0); c7=(1, 1,0,0,0, 1,1,0); ClO=(O,O,O,O, 1,1,1,1); C 13 =( 1, 1,0,0, 1, 1, 1, 1); c I6=(1,0, 1,0,0,0,0, 1); CI9=( 1,0,0, 1,0, 1,0,0); C22=(0'0, 1,0, 1,1,0,0); c 25=(I, 1,0, 1,0,0,1,1); C28=(0, 1,1,0,1,0,1,1); C31 =(0,1,0,1,1,1,1,0) c2=(0,0, 1,1,0,0,0,0) c5=(1, 1,1,1,0,0,0,0) c8=(0,0, 1,1,1,0,0,1) C ll =(1,1,1,1,1,0,0,1) c 14 =(O,O, 1,1,1,1,1, I) CI7=(0' 1,0, 1,1,0,0,0) c 20=( 1,0,0,0,1,0,1,0) C23=(0,0,0, 1,0,0, 1,1) C26=(1,0, I, 1, 1,0, 1,0) C29=( 1,0,0, 1,1,1,0,1) The distribution by weight of the codewords in the nine classes V 0' VI'..., V 8 induced by G9 into the set of 2 8 binary vectors of length 8 is given by the following table: TABLE IV ~Weight class ~ df 1 U u I! The length 16 concatenated group theoretic code C will be constructed from C1, the set of codes generated by G1=G9; and C2, the set of codes generated by G2=G9. In this case G1 and G 2 will be identical and equal to the addition group of GF(3 2 ). This implies that C1 and C2 will be identical and equal to the set of codes V 0, VI'..., V n. The weightcode W will be the one determined by the names of the shadowed squares of the picture in Figure 1. To each codeword (W1W2) of C it will correspond a codeword (\w1\, \w2\) of Wand conversely to each codeword (i, j) of W there will correspond a set of codewords in C. The number of codewords in C corresponding to a codewoui 'i..il ill.w is giveniu the. fquo,w.ing t,abl~: \w 1\ \w2\ TABLE V i I

6 842 National Computer Conference, 1977 Let and (3.3) (Vji'Vkl)={(VIV2) IvlEVji, V2EVkl} Then, using the notation (3.3), the set of codewords (WIW2) of C corresponding to the codeword (2, 5) of W is: {(V 0 2 V0 5 ), (V/'VI 5 ), (V2 2 V2 5),., (Vl'V 8 5 )} which comprises a total of 176 codewords. To see how detection and correction is done when a single I-error has occurred, let: r=(r Ir2)=( l) be the received message and assume (WIW2) of C was the actually transmitted message. For the above received message we have: i= Irll= 1( ) 1=4,j= Ir21= 1( )1=3 and since (4, 3) is not a codeword of Wand assuming a single I-error has occurred, the codeword of W corresponding to the transmitted message should have been (4, 4). Thus, r2 is in error. Since it must be that rl =( ) EV 3 1 V 3 41 = 8 and 8 is the largest element in the 4th column of Table IV. Since there are seven other entries equal to 8, suppose the following pairing of codewords of C 1 and C2 corresponding to the codeword (4, 4) of W, has been done: (except for (Vo 4. Vo 4) all the other pairings are done arbitrarily; yet one must know before trying to correct transmitted messages what the pairings are). Therefore, rl must have been paired with a codeword of weight 4 from V 6' However and the error has occurred in the third position as given by Thus the transmitted message was (WIW 2 )= (lo ). The number of code words in C as given in Table V is 2470 and comparing it with the Kim & Freiman code of length 16 or the Hamming code of the same length (see Table I) we see a definite improvement in the information rate. Although the number of codewords in C is slightly less than the number of code words in the group theoretic code of length 16, efficiency could be gained in the encoding/ decoding process. If ROM was to be used for encoding and decoding purposes, smaller size ROM could be utilized if a message m=(m 1 m 2 ) was encoded as: and decoded as: (mlm2)~{~~:~} ~WIW2)EC Longer weight-codes could be used in generating concatenated group theoretic codes, but it appears as though this would have a negative impact on the encoding/decoding procedures and maybe in the correction process while accomplishing a high information rate. An optimal concatenation (pairing) of three or more smaller codewords into a longer code is also not apparent, and could be regarded as a natural generalization of the method presented in this paper. CONCLUSIONS The future research to be pursued by the authors of this paper will be focused in the direction of finding efficient encoding/decoding procedures for both group theoretic codes as well as concatenated group theoretic codes. Finding an efficient encoding/decoding procedure for the two types of codes is believed to be possible due to the structure of the two codes inherited from the groups that have generated them. REFERENCES I. Constantin, Serban D. and T. R. N. Rao, "Group Theoretic Codes for Binary Asymmetric Channels," Technical Report CS 76014, Department of Computer Science, Southern Methodist University, Dallas, TX. 2. Rao, T. R. N. and A. S. Chawla, "Asymmetric Error Codes for Some LSI Semiconductor Memories," 7th Annual Southeastern Symposium on System Theory, March pp Kim, Wan H. and Charles V. Freiman, "Single Error Correcting Codes for Asymmetric Channels," I.R.E. Transactions on Information Theory, June Peterson, W. W. and E. J. Weldon, Jr., Error Correcting Codes, M.I.T. Press, Cambridge, Massachusetts, Hall, Marshall Jr., The Theory of Groups, Macmillan, Varshamor, R. R., "A Class of Codes for Asymmetric Channels and a Problem from the Additive Theory of Numbers," Trans. on Information Theory, January 1973, pp

code V(n,k) := words module

code V(n,k) := words module Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible

More information

Permutation group and determinants. (Dated: September 19, 2018)

Permutation group and determinants. (Dated: September 19, 2018) Permutation group and determinants (Dated: September 19, 2018) 1 I. SYMMETRIES OF MANY-PARTICLE FUNCTIONS Since electrons are fermions, the electronic wave functions have to be antisymmetric. This chapter

More information

Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes

Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes 4.1 Introduction Much of the pioneering research on cyclic codes was carried out by Prange [5]inthe 1950s and considerably

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

1.6 Congruence Modulo m

1.6 Congruence Modulo m 1.6 Congruence Modulo m 47 5. Let a, b 2 N and p be a prime. Prove for all natural numbers n 1, if p n (ab) and p - a, then p n b. 6. In the proof of Theorem 1.5.6 it was stated that if n is a prime number

More information

MATHEMATICS ON THE CHESSBOARD

MATHEMATICS ON THE CHESSBOARD MATHEMATICS ON THE CHESSBOARD Problem 1. Consider a 8 8 chessboard and remove two diametrically opposite corner unit squares. Is it possible to cover (without overlapping) the remaining 62 unit squares

More information

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees. 7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}

More information

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

Tilings with T and Skew Tetrominoes

Tilings with T and Skew Tetrominoes Quercus: Linfield Journal of Undergraduate Research Volume 1 Article 3 10-8-2012 Tilings with T and Skew Tetrominoes Cynthia Lester Linfield College Follow this and additional works at: http://digitalcommons.linfield.edu/quercus

More information

Permutations. = f 1 f = I A

Permutations. = f 1 f = I A Permutations. 1. Definition (Permutation). A permutation of a set A is a bijective function f : A A. The set of all permutations of A is denoted by Perm(A). 2. If A has cardinality n, then Perm(A) has

More information

Colouring tiles. Paul Hunter. June 2010

Colouring tiles. Paul Hunter. June 2010 Colouring tiles Paul Hunter June 2010 1 Introduction We consider the following problem: For each tromino/tetromino, what are the minimum number of colours required to colour the standard tiling of the

More information

Hamming Codes and Decoding Methods

Hamming Codes and Decoding Methods Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP

More information

Static Mastermind. Wayne Goddard Department of Computer Science University of Natal, Durban. Abstract

Static Mastermind. Wayne Goddard Department of Computer Science University of Natal, Durban. Abstract Static Mastermind Wayne Goddard Department of Computer Science University of Natal, Durban Abstract Static mastermind is like normal mastermind, except that the codebreaker must supply at one go a list

More information

Non-overlapping permutation patterns

Non-overlapping permutation patterns PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)

More information

MA 524 Midterm Solutions October 16, 2018

MA 524 Midterm Solutions October 16, 2018 MA 524 Midterm Solutions October 16, 2018 1. (a) Let a n be the number of ordered tuples (a, b, c, d) of integers satisfying 0 a < b c < d n. Find a closed formula for a n, as well as its ordinary generating

More information

Combinatorics and Intuitive Probability

Combinatorics and Intuitive Probability Chapter Combinatorics and Intuitive Probability The simplest probabilistic scenario is perhaps one where the set of possible outcomes is finite and these outcomes are all equally likely. A subset of the

More information

p 1 MAX(a,b) + MIN(a,b) = a+b n m means that m is a an integer multiple of n. Greatest Common Divisor: We say that n divides m.

p 1 MAX(a,b) + MIN(a,b) = a+b n m means that m is a an integer multiple of n. Greatest Common Divisor: We say that n divides m. Great Theoretical Ideas In Computer Science Steven Rudich CS - Spring Lecture Feb, Carnegie Mellon University Modular Arithmetic and the RSA Cryptosystem p- p MAX(a,b) + MIN(a,b) = a+b n m means that m

More information

Permutations and codes:

Permutations and codes: Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22

More information

ORTHOGONAL space time block codes (OSTBC) from

ORTHOGONAL space time block codes (OSTBC) from 1104 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 3, MARCH 2009 On Optimal Quasi-Orthogonal Space Time Block Codes With Minimum Decoding Complexity Haiquan Wang, Member, IEEE, Dong Wang, Member,

More information

ON MULTIPLICATIVE SEMIGROUPS OF RESIDUE CLASSES

ON MULTIPLICATIVE SEMIGROUPS OF RESIDUE CLASSES ON MULTIPLICATIVE SEMIGROUPS OF RESIDUE CLASSES E. T. PARKER1 The set of residue classes, modulo any positive integer, is commutative and associative under the operation of multiplication. The author made

More information

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016 Signal Power Consumption in Digital Communication using Convolutional Code with Compared to Un-Coded Madan Lal Saini #1, Dr. Vivek Kumar Sharma *2 # Ph. D. Scholar, Jagannath University, Jaipur * Professor,

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

Determinants, Part 1

Determinants, Part 1 Determinants, Part We shall start with some redundant definitions. Definition. Given a matrix A [ a] we say that determinant of A is det A a. Definition 2. Given a matrix a a a 2 A we say that determinant

More information

Week 1. 1 What Is Combinatorics?

Week 1. 1 What Is Combinatorics? 1 What Is Combinatorics? Week 1 The question that what is combinatorics is similar to the question that what is mathematics. If we say that mathematics is about the study of numbers and figures, then combinatorics

More information

Chapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations

Chapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations Chapter 1 The alternating groups 1.1 Introduction The most familiar of the finite (non-abelian) simple groups are the alternating groups A n, which are subgroups of index 2 in the symmetric groups S n.

More information

Math 127: Equivalence Relations

Math 127: Equivalence Relations Math 127: Equivalence Relations Mary Radcliffe 1 Equivalence Relations Relations can take many forms in mathematics. In these notes, we focus especially on equivalence relations, but there are many other

More information

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin

More information

Pattern Avoidance in Unimodal and V-unimodal Permutations

Pattern Avoidance in Unimodal and V-unimodal Permutations Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is

More information

Constructions of Coverings of the Integers: Exploring an Erdős Problem

Constructions of Coverings of the Integers: Exploring an Erdős Problem Constructions of Coverings of the Integers: Exploring an Erdős Problem Kelly Bickel, Michael Firrisa, Juan Ortiz, and Kristen Pueschel August 20, 2008 Abstract In this paper, we study necessary conditions

More information

Stupid Columnsort Tricks Dartmouth College Department of Computer Science, Technical Report TR

Stupid Columnsort Tricks Dartmouth College Department of Computer Science, Technical Report TR Stupid Columnsort Tricks Dartmouth College Department of Computer Science, Technical Report TR2003-444 Geeta Chaudhry Thomas H. Cormen Dartmouth College Department of Computer Science {geetac, thc}@cs.dartmouth.edu

More information

Digital Communication Systems ECS 452

Digital Communication Systems ECS 452 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20

More information

Playing with Permutations: Examining Mathematics in Children s Toys

Playing with Permutations: Examining Mathematics in Children s Toys Western Oregon University Digital Commons@WOU Honors Senior Theses/Projects Student Scholarship -0 Playing with Permutations: Examining Mathematics in Children s Toys Jillian J. Johnson Western Oregon

More information

Solutions to Exercises Chapter 6: Latin squares and SDRs

Solutions to Exercises Chapter 6: Latin squares and SDRs Solutions to Exercises Chapter 6: Latin squares and SDRs 1 Show that the number of n n Latin squares is 1, 2, 12, 576 for n = 1, 2, 3, 4 respectively. (b) Prove that, up to permutations of the rows, columns,

More information

Greedy Flipping of Pancakes and Burnt Pancakes

Greedy Flipping of Pancakes and Burnt Pancakes Greedy Flipping of Pancakes and Burnt Pancakes Joe Sawada a, Aaron Williams b a School of Computer Science, University of Guelph, Canada. Research supported by NSERC. b Department of Mathematics and Statistics,

More information

The next several lectures will be concerned with probability theory. We will aim to make sense of statements such as the following:

The next several lectures will be concerned with probability theory. We will aim to make sense of statements such as the following: CS 70 Discrete Mathematics for CS Fall 2004 Rao Lecture 14 Introduction to Probability The next several lectures will be concerned with probability theory. We will aim to make sense of statements such

More information

Exercises to Chapter 2 solutions

Exercises to Chapter 2 solutions Exercises to Chapter 2 solutions 1 Exercises to Chapter 2 solutions E2.1 The Manchester code was first used in Manchester Mark 1 computer at the University of Manchester in 1949 and is still used in low-speed

More information

Wilson s Theorem and Fermat s Theorem

Wilson s Theorem and Fermat s Theorem Wilson s Theorem and Fermat s Theorem 7-27-2006 Wilson s theorem says that p is prime if and only if (p 1)! = 1 (mod p). Fermat s theorem says that if p is prime and p a, then a p 1 = 1 (mod p). Wilson

More information

Lecture 2: Sum rule, partition method, difference method, bijection method, product rules

Lecture 2: Sum rule, partition method, difference method, bijection method, product rules Lecture 2: Sum rule, partition method, difference method, bijection method, product rules References: Relevant parts of chapter 15 of the Math for CS book. Discrete Structures II (Summer 2018) Rutgers

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

Lecture 13 February 23

Lecture 13 February 23 EE/Stats 376A: Information theory Winter 2017 Lecture 13 February 23 Lecturer: David Tse Scribe: David L, Tong M, Vivek B 13.1 Outline olar Codes 13.1.1 Reading CT: 8.1, 8.3 8.6, 9.1, 9.2 13.2 Recap -

More information

28,800 Extremely Magic 5 5 Squares Arthur Holshouser. Harold Reiter.

28,800 Extremely Magic 5 5 Squares Arthur Holshouser. Harold Reiter. 28,800 Extremely Magic 5 5 Squares Arthur Holshouser 3600 Bullard St. Charlotte, NC, USA Harold Reiter Department of Mathematics, University of North Carolina Charlotte, Charlotte, NC 28223, USA hbreiter@uncc.edu

More information

SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODES

SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODES Discrete Mathematics, Algorithms and Applications Vol 4, No 3 (2012) 1250022 (8 pages) c World Scientific Publishing Company DOI: 101142/S179383091250022X SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem The Chinese Remainder Theorem 8-3-2014 The Chinese Remainder Theorem gives solutions to systems of congruences with relatively prime moduli The solution to a system of congruences with relatively prime

More information

PERMANENTLY OPTIMAL STRATEGIES IN EXTENSIVE GAMES

PERMANENTLY OPTIMAL STRATEGIES IN EXTENSIVE GAMES PERMANENTLY OPTIMAL STRATEGIES IN EXTENSIVE GAMES W. H. CLINGMAN I. Introduction. The objective of this study is to develop a relationship between the information pattern in extensive games and the existence

More information

18.204: CHIP FIRING GAMES

18.204: CHIP FIRING GAMES 18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on

More information

Fast Sorting and Pattern-Avoiding Permutations

Fast Sorting and Pattern-Avoiding Permutations Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

How Many Mates Can a Latin Square Have?

How Many Mates Can a Latin Square Have? How Many Mates Can a Latin Square Have? Megan Bryant mrlebla@g.clemson.edu Roger Garcia garcroge@kean.edu James Figler figler@live.marshall.edu Yudhishthir Singh ysingh@crimson.ua.edu Marshall University

More information

Permutation Groups. Definition and Notation

Permutation Groups. Definition and Notation 5 Permutation Groups Wigner s discovery about the electron permutation group was just the beginning. He and others found many similar applications and nowadays group theoretical methods especially those

More information

Some constructions of mutually orthogonal latin squares and superimposed codes

Some constructions of mutually orthogonal latin squares and superimposed codes University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Some constructions of mutually orthogonal

More information

ON MODULI FOR WHICH THE FIBONACCI SEQUENCE CONTAINS A COMPLETE SYSTEM OF RESIDUES S. A. BURR Belt Telephone Laboratories, Inc., Whippany, New Jersey

ON MODULI FOR WHICH THE FIBONACCI SEQUENCE CONTAINS A COMPLETE SYSTEM OF RESIDUES S. A. BURR Belt Telephone Laboratories, Inc., Whippany, New Jersey ON MODULI FOR WHICH THE FIBONACCI SEQUENCE CONTAINS A COMPLETE SYSTEM OF RESIDUES S. A. BURR Belt Telephone Laboratories, Inc., Whippany, New Jersey Shah [1] and Bruckner [2] have considered the problem

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Degrees of Freedom Region for the MIMO X Channel

Degrees of Freedom Region for the MIMO X Channel Degrees of Freedom Region for the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, California, 9697, USA Email: syed@uci.edu Shlomo Shamai

More information

Reading 14 : Counting

Reading 14 : Counting CS/Math 240: Introduction to Discrete Mathematics Fall 2015 Instructors: Beck Hasti, Gautam Prakriya Reading 14 : Counting In this reading we discuss counting. Often, we are interested in the cardinality

More information

The Product Rule The Product Rule: A procedure can be broken down into a sequence of two tasks. There are n ways to do the first task and n

The Product Rule The Product Rule: A procedure can be broken down into a sequence of two tasks. There are n ways to do the first task and n Chapter 5 Chapter Summary 5.1 The Basics of Counting 5.2 The Pigeonhole Principle 5.3 Permutations and Combinations 5.5 Generalized Permutations and Combinations Section 5.1 The Product Rule The Product

More information

A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA

A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA JOEL LOUWSMA, ADILSON EDUARDO PRESOTO, AND ALAN TARR Abstract. Krakowski and Regev found a basis of polynomial identities satisfied

More information

The number of mates of latin squares of sizes 7 and 8

The number of mates of latin squares of sizes 7 and 8 The number of mates of latin squares of sizes 7 and 8 Megan Bryant James Figler Roger Garcia Carl Mummert Yudishthisir Singh Working draft not for distribution December 17, 2012 Abstract We study the number

More information

Three Pile Nim with Move Blocking. Arthur Holshouser. Harold Reiter.

Three Pile Nim with Move Blocking. Arthur Holshouser. Harold Reiter. Three Pile Nim with Move Blocking Arthur Holshouser 3600 Bullard St Charlotte, NC, USA Harold Reiter Department of Mathematics, University of North Carolina Charlotte, Charlotte, NC 28223, USA hbreiter@emailunccedu

More information

X = {1, 2,...,n} n 1f 2f 3f... nf

X = {1, 2,...,n} n 1f 2f 3f... nf Section 11 Permutations Definition 11.1 Let X be a non-empty set. A bijective function f : X X will be called a permutation of X. Consider the case when X is the finite set with n elements: X {1, 2,...,n}.

More information

Bounding the Size of k-tuple Covers

Bounding the Size of k-tuple Covers Bounding the Size of k-tuple Covers Wolfgang Bein School of Computer Science Center for the Advanced Study of Algorithms University of Nevada, Las Vegas bein@egr.unlv.edu Linda Morales Department of Computer

More information

Constellation Labeling for Linear Encoders

Constellation Labeling for Linear Encoders IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 6, SEPTEMBER 2001 2417 Constellation Labeling for Linear Encoders Richard D. Wesel, Senior Member, IEEE, Xueting Liu, Member, IEEE, John M. Cioffi,

More information

Asymptotic Results for the Queen Packing Problem

Asymptotic Results for the Queen Packing Problem Asymptotic Results for the Queen Packing Problem Daniel M. Kane March 13, 2017 1 Introduction A classic chess problem is that of placing 8 queens on a standard board so that no two attack each other. This

More information

Distribution of Aces Among Dealt Hands

Distribution of Aces Among Dealt Hands Distribution of Aces Among Dealt Hands Brian Alspach 3 March 05 Abstract We provide details of the computations for the distribution of aces among nine and ten hold em hands. There are 4 aces and non-aces

More information

Partizan Kayles and Misère Invertibility

Partizan Kayles and Misère Invertibility Partizan Kayles and Misère Invertibility arxiv:1309.1631v1 [math.co] 6 Sep 2013 Rebecca Milley Grenfell Campus Memorial University of Newfoundland Corner Brook, NL, Canada May 11, 2014 Abstract The impartial

More information

Enumeration of Two Particular Sets of Minimal Permutations

Enumeration of Two Particular Sets of Minimal Permutations 3 47 6 3 Journal of Integer Sequences, Vol. 8 (05), Article 5.0. Enumeration of Two Particular Sets of Minimal Permutations Stefano Bilotta, Elisabetta Grazzini, and Elisa Pergola Dipartimento di Matematica

More information

Notes on 4-coloring the 17 by 17 grid

Notes on 4-coloring the 17 by 17 grid otes on 4-coloring the 17 by 17 grid lizabeth upin; ekupin@math.rutgers.edu ugust 5, 2009 1 or large color classes, 5 in each row, column color class is large if it contains at least 73 points. We know

More information

Math 3338: Probability (Fall 2006)

Math 3338: Probability (Fall 2006) Math 3338: Probability (Fall 2006) Jiwen He Section Number: 10853 http://math.uh.edu/ jiwenhe/math3338fall06.html Probability p.1/7 2.3 Counting Techniques (III) - Partitions Probability p.2/7 Partitioned

More information

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif PROJECT 5: DESIGNING A VOICE MODEM Instructor: Amir Asif CSE4214: Digital Communications (Fall 2012) Computer Science and Engineering, York University 1. PURPOSE In this laboratory project, you will design

More information

The Classification of Quadratic Rook Polynomials of a Generalized Three Dimensional Board

The Classification of Quadratic Rook Polynomials of a Generalized Three Dimensional Board Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 3 (2017), pp. 1091-1101 Research India Publications http://www.ripublication.com The Classification of Quadratic Rook Polynomials

More information

Peeking at partizan misère quotients

Peeking at partizan misère quotients Games of No Chance 4 MSRI Publications Volume 63, 2015 Peeking at partizan misère quotients MEGHAN R. ALLEN 1. Introduction In two-player combinatorial games, the last player to move either wins (normal

More information

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies

More information

Computer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes

Computer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes Computer Science 1001.py Lecture 25 : Intro to Error Correction and Detection Codes Instructors: Daniel Deutch, Amiram Yehudai Teaching Assistants: Michal Kleinbort, Amir Rubinstein School of Computer

More information

5 Symmetric and alternating groups

5 Symmetric and alternating groups MTHM024/MTH714U Group Theory Notes 5 Autumn 2011 5 Symmetric and alternating groups In this section we examine the alternating groups A n (which are simple for n 5), prove that A 5 is the unique simple

More information

On Information Theoretic Interference Games With More Than Two Users

On Information Theoretic Interference Games With More Than Two Users On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu

More information

WIRELESS communication channels vary over time

WIRELESS communication channels vary over time 1326 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 Outage Capacities Optimal Power Allocation for Fading Multiple-Access Channels Lifang Li, Nihar Jindal, Member, IEEE, Andrea Goldsmith,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

Degrees of Freedom of Wireless X Networks

Degrees of Freedom of Wireless X Networks Degrees of Freedom of Wireless X Networks 1 Viveck R. Cadambe, Syed A. Jafar Center for Pervasive Communications and Computing Electrical Engineering and Computer Science University of California Irvine,

More information

Section II.9. Orbits, Cycles, and the Alternating Groups

Section II.9. Orbits, Cycles, and the Alternating Groups II.9 Orbits, Cycles, Alternating Groups 1 Section II.9. Orbits, Cycles, and the Alternating Groups Note. In this section, we explore permutations more deeply and introduce an important subgroup of S n.

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

An Algorithm for Packing Squares

An Algorithm for Packing Squares Journal of Combinatorial Theory, Series A 82, 4757 (997) Article No. TA972836 An Algorithm for Packing Squares Marc M. Paulhus Department of Mathematics, University of Calgary, Calgary, Alberta, Canada

More information

arxiv: v1 [math.co] 24 Nov 2018

arxiv: v1 [math.co] 24 Nov 2018 The Problem of Pawns arxiv:1811.09606v1 [math.co] 24 Nov 2018 Tricia Muldoon Brown Georgia Southern University Abstract Using a bijective proof, we show the number of ways to arrange a maximum number of

More information

arxiv: v1 [cs.cc] 21 Jun 2017

arxiv: v1 [cs.cc] 21 Jun 2017 Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik

More information

Permutation Groups. Every permutation can be written as a product of disjoint cycles. This factorization is unique up to the order of the factors.

Permutation Groups. Every permutation can be written as a product of disjoint cycles. This factorization is unique up to the order of the factors. Permutation Groups 5-9-2013 A permutation of a set X is a bijective function σ : X X The set of permutations S X of a set X forms a group under function composition The group of permutations of {1,2,,n}

More information

Congruence properties of the binary partition function

Congruence properties of the binary partition function Congruence properties of the binary partition function 1. Introduction. We denote by b(n) the number of binary partitions of n, that is the number of partitions of n as the sum of powers of 2. As usual,

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

LESSON 2: THE INCLUSION-EXCLUSION PRINCIPLE

LESSON 2: THE INCLUSION-EXCLUSION PRINCIPLE LESSON 2: THE INCLUSION-EXCLUSION PRINCIPLE The inclusion-exclusion principle (also known as the sieve principle) is an extended version of the rule of the sum. It states that, for two (finite) sets, A

More information

Three-player impartial games

Three-player impartial games Three-player impartial games James Propp Department of Mathematics, University of Wisconsin (November 10, 1998) Past efforts to classify impartial three-player combinatorial games (the theories of Li [3]

More information

THE TAYLOR EXPANSIONS OF tan x AND sec x

THE TAYLOR EXPANSIONS OF tan x AND sec x THE TAYLOR EXPANSIONS OF tan x AND sec x TAM PHAM AND RYAN CROMPTON Abstract. The report clarifies the relationships among the completely ordered leveled binary trees, the coefficients of the Taylor expansion

More information

THE use of balanced codes is crucial for some information

THE use of balanced codes is crucial for some information A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes Elie N. Mambou and Theo G. Swart, Senior Member, IEEE arxiv:70.008v [cs.it] Jun 07 Abstract We introduce a new construction

More information

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department

More information

Introduction to Combinatorial Mathematics

Introduction to Combinatorial Mathematics Introduction to Combinatorial Mathematics George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 300 George Voutsadakis (LSSU) Combinatorics April 2016 1 / 97

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Solutions for the Practice Questions

Solutions for the Practice Questions Solutions for the Practice Questions Question 1. Find all solutions to the congruence 13x 12 (mod 35). Also, answer the following questions about the solutions to the above congruence. Are there solutions

More information

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen and Lewis H. Liu Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information