A Zero-Error Source Coding Solution to the Russian Cards Problem

Size: px
Start display at page:

Download "A Zero-Error Source Coding Solution to the Russian Cards Problem"

Transcription

1 A Zero-Error Soure Coding Solution to the Russian Cards Problem ESTEBAN LANDERRECHE Institute of Logi, Language and Computation January 24, 2017 Abstrat In the Russian Cards problem, Alie wants to ommuniate her hand from a dek of ards to Bob through one publi announement suh that Cath does not learn her hand. In zero-error soure oding, Alie s goal is to ommuniate her information to Bob with the least amount of bits. Both problems share the goal of Bob learning Alie s information in one announement. However, they have additional objetives: in the Russian Cards ase it is seurity against Cath, for soure oding it is minimizing the ommuniation omplexity. At a first glane, these two additional properties are not mutually exlusive so we ask whether there is a solution that is both optimal and seure at the same time. This would permit us to model the Russian Cards problem as a zero-error soure oding problem to find the optimal seure announement and it will also enrih soure oding by adding the knowledge that it is also seure for an attaker that holds some orrelated information. Finally, we deal with the relationship between these two problems. To ahieve this, we use results of graph theory and design theory, in partiular blok graphs and Steiner systems. 1 Introdution There are many different approahes to the modelling of ommuniation in mathematis. A fruitful area of study in this area is measuring the amount of information exhanged to ommuniate the most by saying the least. Another approah seeks to reate ommuniation that an only be understood by the intended reipients. It is possible to ombine both goals in our modelling, to provide effiient and seure ommuniation. Zero-error soure oding is an example of the former approah whih has some similarities with the Russian Cards problem, a member of the latter. We will try to 1

2 ombine them to see if solutions for one also work for the other and to see what is neessary to ahieve this. Take a situation where three people (Alie, Bob and Cath) have a dek of ards. They randomly distribute the ards between themselves suh that they only know their ards. Suppose everything that is said an be heard and understood by all three people, is there a way for Alie to tell Bob her hand without Cath finding out? This is the question that the Russian Cards problem tries to answer. In essene, what we have is three people with probabilistially orrelated information in whih two of them attempt to ommuniate their knowledge without the information reahing the third person. This seems to suggest a onnetion with zero-error soure oding, whih tries to onstrut the minimal announement suh that Bob an know all of Alie s information. To further study this onnetion, we first define eah problem on its own. 1.1 The Russian Cards Problem The Russian Card problem as it appeared in the 2000 Mosow Mathematial Olympiad is as follows Suppose we have three partiipants- Alie, Bob and Cathwho have a dek with 7 ards represented by the numbers 0 to 6. The ards are dealt within the three in a random manner in a way that only eah player knows his or her ards. Both Alie and Bob reeive 3 ards while Cath is given the remaining one. Alie gets ards 0, 1 and 2, Bob gets 3, 4 and 5 and Cath gets 6. Alie and Bob want to know eah other s ards without Cath learning any of them. However, every ommuniation between Alie and Bob an be heard and understood perfetly by Cath and it is impossible to enrypt the message in a traditional way. Is there a way that they an ommuniate eah other s hand without Cath knowing the position of any ard she doesn t hold? What started as an Olympiad problem has been generalized for larger deks and different distributions of the ards. Other generalizations permit multiple announements, whih opens up a greater set of distributions that have a solutions. However, these examples no longer share the basi struture with zero-error soure oding, so we do no take them into aount. 1.2 Zero-error Soure Coding In zero-error soure oding we have the following: Alie holds some information x Ω where Ω is ommonly known by both Alie and Bob. She 2

3 wants to ommuniate x to Bob, who holds some orrelated information u, of whih Alie knows the form of (but not the ontent). The goal of a soure oding problem is for Alie to ommuniate x to Bob with the least amount of bits possible, taking advantage that x and u are orrelated. This is done by onstruting a onfusability graph G = (V, E) where the verties in V represent the possible values of x (that is eah element of Ω) and two verties v 1, v 2 are joined by an edge if and only if there is a ertain value of u suh that Bob would not be able to distinguish whether Alie holds v 1 or v 2. Given this graph, Alie must only find a minimal vertex oloring and ommuniate to Bob the olor of the vertex x. Bob ould now immediately distinguish whih is the orret vertex through the information enoded in u, as no verties of the same olor are onneted. The minimal olouring of this graph is an optimal solution for zero-error soure oding beause it is the smallest partition over the information that Alie holds whih is still informative to Bob. The oloring of the graph is agreed and indexed beforehand so the ommuniation onsists only of the index of the olor. If there are m olors, the announement will be of length log 2 m. 2 Informativity We have presented two distint problems from very different ontexts and with very different goals. However, they have a similar struture. In both we have an agent attempting to ommuniate his information to the other. While eah problem has additional desirable properties in the announement, they both agree on the fat that an announement must be informative for the reeiving agent. After ommuniation, the reeiver must always know exatly what information the sender holds. We bridge the two problems through this idea. It is very natural to see that the Russian Cards problem an be expressed as a zero-error soure oding problem with an extra ondition and a different goal. Ω is seen as all the possible hands for Alie, where x is the hand that she atually holds. Similarly, u beomes Bob s hand, whih is learly orrelated to Alie s hand. Alie an learly onstrut this graph, as she an think about all the possible hands that Bob an hold and build the edge set aordingly. In partiular this means that any solution that is informative to Bob in the Russian Cards problem is also informative in the soure oding ontext. 3

4 Looking for a onnetion between these two problems indiretly gives us a result for Russian Cards. The informativity of an announement an be tested in a onfusability graph, regardless of the way we onstrut the announement. If an announement ontains two hands that are onneted then there is at least one hand that Bob ould hold that will onsider both these hands as possible. Therefore, we must avoid this at all ost. The independene number of a graph represents the ardinality of the largest set of verties in the graph suh that all the verties are not onneted. Note that no announement an have two onneted verties, as that would mean that for a ertain ard deal, Bob would not be able to distinguish the two onneted hands. This gives us an upper bound on the size of an announement whih annot be higher than the independene number of the onfusability graph of that problem. If our goal is to onnet these two problems we will formally define what we mean by an announement and informativity. The presentation follows the one seen in [LFD15] for the Russian Cards problem, but generalized so that it an also be applied. It is important to note that while generally zeroerror soure oding literature does not expliitly treat an announement as a list of possible values for Alie s information, it an always be seen as suh. Definition 1. Let Ω N be the set of the possible information and A, B Ω be the information that Alie and Bob hold respetively, with A B =. An announement A ( Ω A ) is a list of possible values for A, with (Ω A ) representing all the subsets of Ω with ardinality equal to A. Definition 2. Let ( Ω A ) be the set of every possible information set that Alie may hold. An announement strategy S is a set of announements and a distribution funtion f over S suh that for every set A ( Ω A ) Alie will hoose an appropriate announement A S with the probability dependent on f Definition 3. Let A and B be the information that Alie and Bob hold respetively. An announement A is informative if after the announement Bob knows A, written in this way: A \ B = {A}. An announement strategy is informative if every announement in it is informative. In the Russian Cards setting, Ω represents the dek of ards and A, B (and C) are the hands of eah player. For the soure oding perspetive, eah piee of information is enoded in a natural number. This differs from the lassial presentation in the introdution, where Alie holds one element of Ω instead of a subset. It is easy to show that these two settings are equivalent, but we hoose to present it in this way to show the similiarity with the Russian Cards problem. We define the notion of an announement 4

5 strategy beause the hoie of an announement depends on the partiular information that Alie holds, however a strategy only depends on Ω and how the information is distributed. Therefore, we an define a strategy for any partiular deal of ards/soure oding problem. Note that we have a probability funtion to define whih announement Alie hooses for the ase that there is more than one announement for a partiular hand. In the soure oding paradigm, this funtion is unneessary as we are trying to minimize the total number of announements. It is natural to have only one possible announement per hand, otherwise we ould have redundany. As a matter of fat, the solution using oloring of graphs ensures that there an only be one announement per hand. 2.1 Example We will present an example to see that while the onept of informativity in both problems is equivalent, the problems are not. We will fous on the original problem with seven ards to show that the soure oding protool works. We will all this problem the (3, 3, 1) problem, as this is how the ards are distributed. While this is a Russian Cards problem, we interpret it as a soure oding problem and use the known solution for it. Then, we will see if it fulfills the requirements to be a good solution for the Russian ards problem. The way to solve a zero-error soure oding problem is through a onfusability graph. Alie onstruts a graph where eah vertex represents the information that she may hold (in this ase, every set of three ards) and joins every two verties whih ould be onfused by Bob if he held any valid hand (in this ase, valid refers both to Bob having three ards and not having any ard found in the verties). While we ould onstrut this graph vertex by vertex, there exists a lass of graphs alled Johnson Graphs whih represent exatly that. A Johnson graph J(n, k) is a graph where the verties are the k-element subsets of an n-element set and there is an edge between two verties if and only if they share a k 1 set. Lets take J(7, 3) and have every vertex represent one of Alie s possible hands. This is equivalent to the fat that two verties are onneted if they are indistinguishable for someone holding a n k 1-set. Therefore, the Johnson graph J(7, 3) is the onfusability graph for the (3, 3, 1) Russian ards problem, as Bob holds = 3 ards. Any oloring of this graph will give us a valid solution for the soure oding problem within. We use sage to find the following oloring: 5

6 000 {0, 2, 6}, {2, 3, 4}, {1, 2, 5}, {0, 4, 5}, {0, 1, 3} 001 {1, 5, 6}, {3, 4, 6}, {0, 3, 5}, {0, 1, 4} 010 {3, 4, 5}, {2, 5, 6}, {0, 3, 6}, {1, 4, 6}, {0, 2, 4}, {1, 2, 3} 011 {2, 4, 6}, {2, 3, 5}, {1, 4, 5}, {0, 5, 6}, {0, 3, 4}, {1, 3, 6}, {0, 1, 2} 100 {4, 5, 6}, {2, 3, 6}, {0, 2, 5}, {0, 1, 6}, {1, 3, 5}, {1, 2, 4} 101 {2, 4, 5}, {1, 2, 6}, {3, 5, 6}, {0, 4, 6}, {1, 3, 4}, {0, 2, 3}, {0, 1, 5} In the Olympiad problem, Alie held {0, 1, 2}. Therefore she would announe 011 as her hand is in the fourth announement. In this partiular ase, Cath will not be able to learn the position of any of the ards that either Alie or Bob hold. We know this beause it oinides with the projetive geometri solution seen in the following example, where Alie holds a line: This seems to show that the soure oding strategy is seure, but this is not the ase. Suppose instead of the original distribution of the ards, we have the following deal Alie: 1, 5, 6 Bob: 2, 3, 4 Cath: 0 In this ase, Alie would announe the following: {1, 5, 6}, {3, 4, 6}, {0, 3, 5}, {0, 1, 4} At first glane we an see that Cath learns the position of some of the ards, as no hand in the announement ontains 2. This lets Cath know that Alie annot hold 2, beause it does not appear in any of the possible hands for Alie. Beause Cath holds 0, she then knows Bob holds 2. It is even worse, as Cath an eliminate the last two hands whih shows her that Alie holds 6. Therefore, soure oding alone is not enough to solve the Russian Cards problem, as we need to add other restritions to ensure seurity of the strategy. 6

7 3 Seurity We have seen that solving the soure oding problem related to a Russian Cards problem is not enough to solve the original problem. A generi solution for the soure oding problem does not automatially ensure that Cath does not learn the position of a ard. However, there are many different minimal olorings for a graph and while we found one that does not work, there may be another whih does. For that, we must formalize the onept of seurity and see if it is refleted in some graph olorings. We want to ensure that, regardless of the ards that eah person holds, Cath does not learn the exat position of any ard she does not hold herself. This an be enoded in the following way. Definition 4. Let Ω be the set of ards, A an announement and the size of Cath s hand. If Y is a set of ards, let A \ Y be all the hands in A whih do not ontain an element of Y. We say A is seure if for all C ( Ω ) the following two properties hold The union of all the hands in A that avoid C is equal to Ω \ C, that is X i A\C X i = Ω \ C. The intersetion of all hands in A that avoid C is the empty set, that is X i A\C X i = The first property ensures that Cath does not learn the position of any ard in Alie s hand, the seond one ensures the same does not happen for any ard in Bob s hand. We an see that the inseure announement in the example fails both, as 2 {1, 5, 6} {3, 4, 6} and {1, 5, 6} {3, 4, 6} = {6}. As a matter of fat, no announement for this ase with four hands will be seure. This is beause in an announement every ard must appear in at least two announements. If it only appears in one, there might be the possibility that Cath holds a ard in the same hand and an then onlude that that ard is not held by Alie. The only way that Alie ould prevent this is by having that one ard only appear in the hand that she holds. However, this is not seure, as Cath will know that Alie s hand must be the one holding the ard that appears only one. If Alie held any other ard the announement would not be seure, as we have seen previously, whih means that Cath would know Alie s hand. That would mean that we must have at least 7 2 = 14 ards in the announement, but an announement with four hands has only 12. hene, by the pigeonhole priniple, this is 7

8 impossible. We an generalize this last fat: If Cath has ards, eah ard must appear in at least + 1 hands in the announement. From here, we get that a seure announement must have at least (a + b + )( + 1) ards. This is neessary for our first ondition to hold, but not suffiient. We an see this by looking at the first announement in our previous example. {0, 2, 6}, {2, 3, 4}, {1, 2, 5}, {0, 4, 5}, {0, 1, 3} If Cath holds 0 she will know that Alie holds 2. Therefore we need stronger restritions to ensure seurity. To do this, we must first properly haraterize the graphs that we are onstruting. To onstrut the onfusability graph G = (V, E) indued by the Russian Cards problem (a, b, ) with V = ( Ω k ) and E V V Create a vertex for eah hand Alie an hold Join two verties if there is a hand that Bob ould hold suh that he ould not distinguish between the two hands. That is, Clearly G is regular and symmetri. (H, K) E H K a + Lemma 5. Let G = (V, E) be a graph indued by the Russian Cards problem (a, b, ). For any x V, x has i=1 ( a i )(b+ i ) neighbors. Proof. If we want to see how many verties y exist suh that x y = a + i for any i we hoose the i ards that we take away from x, whih gives us ( a i ) and the ards with whih we an replae them (b+ i ). By adding all the verties that differ from 1 to ards we get exatly i=1 ( a i )( ) b + i To ensure seurity, we have to prevent the situation where Cath an eliminate all hands in an announement that ontain a partiular ard. Beause we have to reate announements that work for every possible Cath hand, we have to make sure that if ards x and y appear together in a hand in the announement, there must be a hand in the same announement where x appears and y does not (and vieversa). However, as Cath s hands grow, so does this restrition. If Cath has two ards, then for every three ards 8

9 x, y and z in a hand in the announement there must be at least one hand that ontains x but not y and z. In general, if Cath has ards, for eah hand H in an announement, there must be at least + 1 other hands in the announement, eah one ontaining exatly one of the elements of H. This ondition is neessary to fulfill the seond property of seurity, as we defined it previously. To fulfill the first property, for any + 1-set ontained in a hand, there must be another hand in the announement suh that it ontains none of the ards in the set. Here, we run into a problem with our approah. Graph theory alone permits us to define loal relationships and not the relationships that we have just mentioned. Therefore, we annot represent these properties in the graph. Of ourse, we an find olorings and only aept one if these onditions are met, but we annot affirm whether there exists a minimal oloring that fulfills these properties without heking all of them. Therefore, purely graph theoreti tools are not enough in this ase and we need more robust mathematial strutures, in partiular Steiner systems, a type of blok designs. These systems are a subset of ( Ω a ) suh that every (a )-set appears exatly in one element of the system. This is enough to ensure that the previous properties hold. These designs have graphs assoiated to them and they happen to be equivalent to the graphs we have onstruted (when these designs exist). The Johnson Graph J(7, 3) is the blok graph of the 2-(7, 3, 1)-design. In [SS14], it is shown that an optimal announement strategy for a (a, b, ) deal is a large set of t-(a + b +, a, 1)-designs, with t = a. This is equivalent to the minimal oloring in suh graph, whenever the large set exists. Swanson & Stinson proved that the solution reated by t-(a + b +, a, 1)- designs is not only informative and optimal, but also seure. Not ontent with the definition of seurity that we presented, they also proved a stronger notion of seurity. They showed that for any set X of t ards, the probability that Alie holds X aording to Cath does not hange before and after the announement. This prevents Cath from gaining probabilisti information about Alie s hand, whih might be desirable depending on the importane of the privay of the information. They refer to this notion as t-perfet seurity. Definition 6. Let Ω be the set of ards, S an announement strategy and the size of Cath s hand. An announement A S for A ( Ω A ) is t-perfetly seure if for every t-set Y and every C ( Ω ), if Y C = then P(Y A C, A) P(Y A C) = 1 9

10 An announement strategy S is t-perfetly seure if every announement in it is t-perfetly seure. When the t is not diretly relevant, we will refer to this simply as perfet seurity. This gives us a powerful tool to ensure seurity in our announement. For that, we delve deeper into design theory, partiularly in the study of Steiner systems. We will first return to our example to see some examples of seurity. 3.1 Continued Example We go bak to the (3, 3, 1) ase. Note that we have ( 7 3 ) = 35 possible hands and that the independene number of the assoiated Johnson graph J(7, 3) is 7. Our first instint is that given that 7 divides 35, we might have a valid protool with five announements with seven ards eah. Unfortunately, this is impossible, as the hromati number of J(7, 3) is 6. Therefore, a protool must have at least six different possible announements. As a matter of fat, suh announement does exist and is the following 6-oloring of J(7, 3) (presented in [SS14]): {0, 1, 3}, {1, 2, 4}, {2, 3, 5}, {3, 4, 6}, {0, 4, 5}, {1, 5, 6}, {0, 2, 6} {0, 2, 3}, {1, 3, 4}, {2, 4, 5}, {3, 5, 6}, {0, 4, 6}, {0, 1, 5}, {1, 2, 6} {0, 2, 4}, {0, 3, 5}, {1, 2, 3}, {0, 1, 6}, {1, 4, 5}, {2, 5, 6} {0, 1, 2}, {2, 3, 4}, {4, 5, 6}, {1, 3, 5}, {0, 3, 6} {1, 2, 5}, {0, 5, 6}, {1, 4, 6}, {0, 3, 4}, {2, 3, 6} {3, 4, 5}, {0, 1, 4}, {0, 2, 5}, {2, 4, 6}, {1, 3, 6} Note that as antiipated, this is not perfetly seure, as we an see with the fourth announement. If Cath holds 6, the ards 1, 2 and 3 seem more likely than the rest as they appear twie in the redued list while the other ards appear only one. On the other hand, we have the geometri protool that was previously mentioned. This protool is perfetly seure for the (3, 3, 1) problem although it is pretty ineffiient as there are four possible announements per hand. However, we an optimize it by eliminating ertain redundant announements to have only two hoies per hand (also from [SS14]): 10

11 {2, 5, 6}, {2, 3, 4}, {1, 4, 5}, {1, 3, 6}, {0, 4, 6}, {0, 3, 5}, {0, 1, 2} {2, 5, 6}, {2, 3, 4}, {1, 4, 6}, {1, 3, 5}, {0, 4, 5}, {0, 3, 6}, {0, 1, 2} {3, 4, 5}, {2, 4, 6}, {1, 3, 6}, {1, 2, 5}, {0, 5, 6}, {0, 2, 3}, {0, 1, 4} {3, 4, 5}, {2, 4, 6}, {1, 5, 6}, {1, 2, 3}, {0, 3, 6}, {0, 2, 5}, {0, 1, 4} {3, 4, 6}, {2, 3, 5}, {1, 4, 5}, {1, 2, 6}, {0, 5, 6}, {0, 2, 4}, {0, 1, 3} {3, 4, 6}, {2, 3, 5}, {1, 5, 6}, {1, 2, 4}, {0, 4, 5}, {0, 2, 6}, {0, 1, 3} {3, 5, 6}, {2, 4, 5}, {1, 3, 4}, {1, 2, 6}, {0, 4, 6}, {0, 2, 3}, {0, 1, 5} {3, 5, 6}, {2, 4, 5}, {1, 4, 6}, {1, 2, 3}, {0, 3, 4}, {0, 2, 6}, {0, 1, 5} {4, 5, 6}, {2, 3, 6}, {1, 3, 4}, {1, 2, 5}, {0, 3, 5}, {0, 2, 4}, {0, 1, 6} {4, 5, 6}, {2, 3, 6}, {1, 3, 5}, {1, 2, 4}, {0, 3, 4}, {0, 2, 5}, {0, 1, 6} This announement is the best perfetly seure announement, with a ommuniation omplexity of 10 (4 bits) while our previous solution is 6 (3 bits). Here, there is a trade off between perfet seurity and optimality. It is important to note that none of these options would qualify as optimal in the soure oding paradigm, where the optimum is 5 (exept for the partiularity that the ommuniation omplexity of 5 and 6 are equivalent in bits). 4 Results in Steiner Systems In the proess of treating the Russian Cards problem as a zero-error soure oding problem, we found that in order to ensure seurity we would need tools stronger than the ones given to us by graph theory. The graphs we are interested in orresponded to blok graphs for Steiner systems, whenever these systems exist. We present a more formal treatment of these systems in the following work, noting that if we get a minimal oloring for our graph we will also get a large set of Steiner systems. Definition 7. A blok design (or simply, design) t-(v, k, r) is a set X of v elements and a olletion of k-subsets of X (alled bloks) suh that every t-subset of X appears in exatly r bloks. Definition 8. A Steiner system S(t, k, v) is a set X of v elements and a olletion of k-subsets of X (alled bloks) suh that every t-subset of X appears in exatly one blok. A Steiner system is equivalent to a t-(v, k, 1)-design. Definition 9. A large set of Steiner systems S(t, k, v) is a set of Steiner systems suh that every k-subset of X appears in exatly one Steiner system as a blok. 11

12 We know that these designs exist whenever we have the divisibility ondition by [Kee14], and that the onstrution is not trivial. However, we do not know if the large sets exist. For example, designs of the form S(2, 7, 3) do exist (the Fano plane). However, if we had a large set of S(2, 7, 3) systems, we would have a strategy for the (3, 3, 1) Russian Cards problem. However, as we have seen previously, this strategy does not exist. THis is onsistent with results in design theory presented in [SS14]. Lemma 10. A Steiner system S(t, k, v) has (v t ) ( k t ) bloks. Proof. Every t-subset of our set of v elements must appear in the system, so a design must have ( v t ) elements distributed within its bloks of k elements. Every blok fits ( k t ) elements, so there must be ( v t ) /( k t ) for eah t-subset to appear exatly one. Lemma 11. A large set of Steiner systems S(t, k, v) has ( v t k t ) designs. Proof. Every k-subset of our set of v elements must appear in the large set, so a large set must have ( v k ) elements distributed within its designs of ( v t ) /( k t ) elements. Every design fits ( v t ) elements, so there must be (v k ) ( v t ) for eah /( k t ) k-subset to appear exatly one. We an easily redue this to ( v t k t ). It is important to know what the [SS14] refers to by an optimal strategy. We showed that the optimal announement strategy for (3, 3, 1) has 6 possible announements. However this learly is not a large set of Steiner systems. Therefore, an optimal strategy in this ase refers not to the solution with lowest m, but speifially with the solution (whih may or may not exist) equal to the following bound, presented in [SS14]. Lemma 12. Suppose a > and there exists a strategy for Alie that is informative for Bob. Then the number of announements m is bound by ( ) b + 2 m. Definition 13. Let (a, b, ) be the sizes of Alie, Bob and Cath s hands. We say an announement strategy is design-optimal if it ontains exatly ( b+2 ) announements. With this, we present the following theorem from [SS14] 12

13 Theorem 14. Suppose that a >. A design-optimal (a, b, )-strategy for Alie that is informative for Bob is equivalent to a large set of t-(a + b +, a, 1)-designs, where t = a. To find a solution for the Russian Cards problem, we first generate the onfusability graph G and then we find the hromati number χ(g). An optimal informative announement strategy has χ(g) possible announements, any strategy with less announements would either have uninformative announements or not have relevant announements for ertain hands. If we want this minimal announement to be t-perfetly seure then the graph must orrespond to the blok graph of a Steiner system. By [Kee14], a Steiner system S(t, k, v) exists if and only if ( k i r i ) divides (v i r i ) for every 0 i r 1. This means that there are ertain Russian Cards problems that annot be haraterized by designs. While the graph exists, it does not orrespond to a blok graph and therefore we annot apply these results to it. This does not mean a seure solution does not exist, only that it is not a design and it is not t-perfetly seure. Even if a Steiner system exists, the large set might not exist. There are no general proofs for the existene of large sets, but results exists for partiular values, for example k = 3. The following theorem provides a neessary and suffiient ondition to see if large sets of the form S(a, a, a + b + ) exists. Theorem 15. Take 0 < < a b N suh that ( a i r i ) divides (a+b+ i r i ) for every 0 i r 1. There is a large set of S(a, a, a + b + ) Steiner systems if and only if the hromati number of the graph G indued by the Russian Cards problem (a, b, ) is equal to ( b+2 ) Proof. Suppose suh design exists. By Theorem 14 it is an optimal solution to the Russian Cards problem (a, b, ). Beause a large set ontains ( b+2 ) designs, then we an olor G by ( b+2 ) olors and we annot olor it with less beause the design is optimal. By Theorem 14 we know that every informative announement strategy with ( b+2 )-oloring is a large set of S(a, a, a + b + ) Steiner systems. With this result we know that, for given (a, b, ), if χ(g) is larger than ( b+2 ), suh large sets annot exist. While this result is not new, we have built it from the onnetion of the Russian Cards problem and zero-error soure oding. Design theory permits us to onnet graph olorings with our notion of seurity, although unfortunately they do not work for all examples. The lak of existene of a large set of designs means that we have to take deisions regarding what we think is more important: optimality or seurity. 13

14 5 Conlusion and Further Researh We have found a onnetion between the Russian Cards problem and zeroerror soure oding. Both problems are seen extensions of the same problem in whih Alie wants to ommuniate information to Bob, who holds some orrelated information. However, eah problem adds an additional ondition: seurity in Russian ards and minimal ommuniation omplexity for soure oding. We have seen that these two onditions are equivalent if the Steiner system S(a, a, a + b + ) exists (in the soure oding paradigm, Cath s hand represents Bob s unertainty). We also saw that in other ases, this is not true and we must make a hoie between seurity and optimality. This means that while the two problems are similar and oasionally equivalent, it is not always the ase that an optimal solution will be seure. While we saw that we an present a Russian Cards problem in the form a soure oding problem, the opposite is not always true. In partiular, Russian Cards problems have very well behaved onfusability graphs (regular, symmetri). However, it ould be interesting to see if the onept of seurity ould be extended to all of soure oding, seeing where seurity does not affet optimality. By adding an additional restrition to soure oding we reate a new problem in whih optimality of ommuniation is not the only onern, whih might help model situations in whih we do not want the method of data ompression itself prevents the information from being ompromised. If there is no perfetly seure minimal oloring, then we are faed with one hoie of what we value the most: optimality or seurity. For the first ase, we know that every oloring will be informative, so we must look for the smallest (referring to the number of olors) seure oloring. However, this oloring would not be perfetly seure. If we want perfet seurity we will need a oloring that leads to an equitable protool and for that we need all the sets to be of the same size. This means that the oloring must have a number of olors that divides the number of hands. We would then rejet many possible olorings, some of whih may have less olors, but not a number that divides the number of possible hands. A natural line to ontinue the researh is finding whether optimal announements preserve stronger notions of seurity (but weaker than perfet seurity), like ε-strong seurity presented in [LFD15], where the quotient of probabilities of a hand should be between 1 ε and 1 + ε. If we are more interested in minimizing the number of announements, it might be interesting to onsider announement strategies in whih the distri- 14

15 bution funtion hanges depending on Alie s hand. If a S(a, a + b +, a) system does not exist, we know that there is no oloring for the onfusability graph suh that it entails a perfetly seure announement. Therefore, there is no perfetly seure strategy in whih every hand appears exatly one, at least some hands appear in more than one announement. This entails two possibilities, either some hands appear in more announements than others or they all appear the same number of times. The seond ase would hardly be optimal, so it ould be interesting to fous on what Swanson and Stinson all non equitable strategies to find strategies that an be seure and have a low number of possible announements. Referenes BJL99. Thomas Beth, Dieter Jungnikel, and Hanfried Lenz. Design theory, volume 69. Cambridge University Press, Kee14. Peter Keevash. The existene of designs. arxiv preprint arxiv: , LFD15. Esteban Landerrehe and David Fernández-Duque. A ase study in almost-perfet seurity for unonditionally seure ommuniation. Designs, Codes and Cryptography, pages 1 24, OK98. RW. SS14. Alon Orlitsky and J. Körner. Zero-error information theory. IEEE Transations on Information Theory, 44(6): , Todd Rowland and Eri W. Weisstein. Steiner system. mathworld.wolfram.om/steinersystem.html. From MathWorld A Wolfram Web Resoure. Colleen M Swanson and Douglas R Stinson. Combinatorial solutions providing improved seurity for the generalized russian ards problem. Designs, Codes and Cryptography, 72(2): ,

Nested Codes with Multiple Interpretations

Nested Codes with Multiple Interpretations Nested Codes with Multiple Interpretations Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daniel J. Costello, Jr. Department of Eletrial Engineering University of Notre Dame, Notre Dame, IN 46556, US Email: {lxiao,

More information

1 a 7 b 21 c 6 m d blue e car

1 a 7 b 21 c 6 m d blue e car Cambridge Essentials Mathematis Core 7 S1.1 Answers S1.1 Answers 1 a 7 b 21 6 m d blue e ar 2 a 2 b 0 3 a 120 b Pizza 4 a Table 1 Number of people in vehile 1 2 3 4 More than 4 Number of vehiles 12 28

More information

Windchimes, Hexagons, and Algebra

Windchimes, Hexagons, and Algebra University of Nebraska - Linoln DigitalCommons@University of Nebraska - Linoln ADAPT Lessons: Mathematis Lesson Plans from the ADAPT Program 1996 Windhimes, Hexagons, and Algebra Melvin C. Thornton University

More information

EFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION

EFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION EFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION Control Systems Tehnology group Tehnishe Universiteit Eindhoven Eindhoven, The Netherlands Dennis Bruijnen,

More information

Solutions to Problem Set 5

Solutions to Problem Set 5 Massahusetts Institute of Tehnology 6.042J/18.062J, Fall 05: Mathematis for Computer Siene Otober 28 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised Otober 12, 2005, 909 minutes Solutions to Problem

More information

Effect of Pulse Shaping on Autocorrelation Function of Barker and Frank Phase Codes

Effect of Pulse Shaping on Autocorrelation Function of Barker and Frank Phase Codes Columbia International Publishing Journal of Advaned Eletrial and Computer Engineering Researh Artile Effet of Pulse Shaping on Autoorrelation Funtion of Barker and Frank Phase Codes Praveen Ranganath

More information

Performance Study on Multimedia Fingerprinting Employing Traceability Codes

Performance Study on Multimedia Fingerprinting Employing Traceability Codes Performane Study on Multimedia Fingerprinting Employing Traeability Codes Shan He and Min Wu University of Maryland, College Park, U.S.A. Abstrat. Digital fingerprinting is a tool to protet multimedia

More information

t = 0 t = 8 (2 cycles)

t = 0 t = 8 (2 cycles) A omputation-universal two-dimensional 8-state triangular reversible ellular automaton Katsunobu Imai, Kenihi Morita Faulty of Engineering, Hiroshima University, Higashi-Hiroshima 739-8527, Japan fimai,

More information

Fully Joint Diversity Combining, Adaptive Modulation, and Power Control

Fully Joint Diversity Combining, Adaptive Modulation, and Power Control Fully Joint Diversity Combining, Adaptive Modulation, and Power Control Zied Bouida, Khalid A. Qaraqe, and Mohamed-Slim Alouini Dept. of Eletrial and Computer Eng. Texas A&M University at Qatar Eduation

More information

Power Budgeted Packet Scheduling for Wireless Multimedia

Power Budgeted Packet Scheduling for Wireless Multimedia Power Budgeted Paket Sheduling for Wireless Multimedia Praveen Bommannavar Management Siene and Engineering Stanford University Stanford, CA 94305 USA bommanna@stanford.edu Niholas Bambos Eletrial Engineering

More information

Analysis of a Modified RC4 Algorithm

Analysis of a Modified RC4 Algorithm International Journal of Computer Appliations (0975 8887) Analysis of a Modified RC4 Algorithm T.D.B Weerasinghe MS.Eng, BS.Eng (Hons), MIEEE, AMIE (SL) Software Engineer IFS R&D International, 363, Udugama,

More information

Objectives. Presentation Outline. Digital Modulation Lecture 04

Objectives. Presentation Outline. Digital Modulation Lecture 04 Digital Modulation Leture 04 Filters Digital Modulation Tehniques Rihard Harris Objetives To be able to disuss the purpose of filtering and determine the properties of well known filters. You will be able

More information

Interference mitigation by distributed beam forming optimization

Interference mitigation by distributed beam forming optimization English Interferene mitigation by distributed beam forming optimization Matthias Kashub, Christian M. Blankenhorn, Christian M. Mueller and Thomas Werthmann Abstrat Inter-ell interferene is a major issue

More information

Chapter 3 Amplitude Modulation. Wireless Information Transmission System Lab. Institute of Communications Engineering National Sun Yat-sen University

Chapter 3 Amplitude Modulation. Wireless Information Transmission System Lab. Institute of Communications Engineering National Sun Yat-sen University Chapter 3 Amplitude Modulation Wireless Information Transmission System Lab. Institute of Communiations Engineering National Sun Yat-sen University Outline 3.1 Introdution 3.2 Amplitude Modulation 3.3

More information

An Adaptive Distance-Based Location Update Algorithm for PCS Networks

An Adaptive Distance-Based Location Update Algorithm for PCS Networks An Adaptive Distane-Based Loation Update Algorithm for PCS Networks Abstrat - In this paper, we propose a stohasti model to ompute the optimal update boundary for the distane-based loation update algorithm.

More information

REET Energy Conversion. 1 Electric Power System. Electric Power Systems

REET Energy Conversion. 1 Electric Power System. Electric Power Systems REET 2020 Energy Conversion 1 Eletri Power System Eletri Power Systems An Eletri Power System is a omplex network of eletrial omponents used to reliably generate, transmit and distribute eletri energy

More information

Module 5 Carrier Modulation. Version 2 ECE IIT, Kharagpur

Module 5 Carrier Modulation. Version 2 ECE IIT, Kharagpur Module 5 Carrier Modulation Version ECE II, Kharagpur Lesson 5 Quaternary Phase Shift Keying (QPSK) Modulation Version ECE II, Kharagpur After reading this lesson, you will learn about Quaternary Phase

More information

CHAPTER 3 BER EVALUATION OF IEEE COMPLIANT WSN

CHAPTER 3 BER EVALUATION OF IEEE COMPLIANT WSN CHAPTER 3 EVALUATIO OF IEEE 8.5.4 COMPLIAT WS 3. OVERVIEW Appliations of Wireless Sensor etworks (WSs) require long system lifetime, and effiient energy usage ([75], [76], [7]). Moreover, appliations an

More information

Considerations and Challenges in Real Time Locating Systems Design

Considerations and Challenges in Real Time Locating Systems Design Considerations and Challenges in Real Time Loating Systems Design Dr. Brian Gaffney DeaWave Ltd. Email: brian.gaffney@deawave.om Abstrat Real Time Loating Systems (RTLS) are a ombination of hardware and

More information

Serial PN Acquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communication

Serial PN Acquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communication 01 IEEE 14th International Conferene on High Performane Computing and Communiations Serial PN Aquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communiation

More information

Design Modification of Rogowski Coil for Current Measurement in Low Frequency

Design Modification of Rogowski Coil for Current Measurement in Low Frequency Design Modifiation of Rogowski Coil for Current Measurement in Low Frequeny M. Rezaee* and H. Heydari* Abstrat: The priniple objet of this paper is to offer a modified design of Rogowski oil based on its

More information

Selection strategies for distributed beamforming optimization

Selection strategies for distributed beamforming optimization EUROPEAN COOPERATION IN THE FIELD OF SCIENTIFIC AND TECHNICAL RESEARCH COST 2100 TD(10)11036 Ålborg, Denmark 2010/June/02-04 EURO-COST SOURCE: Institute of Communiation Networks and Computer Engineering

More information

EDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES

EDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES www.ijrar.om INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 EDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES 1 Priya Singh Patel, 2 Prof. Manisha Rathore Abstrat:

More information

Digitally Demodulating Binary Phase Shift Keyed Data Signals

Digitally Demodulating Binary Phase Shift Keyed Data Signals Digitally Demodulating Binary Phase Shift Keyed Signals Cornelis J. Kikkert, Craig Blakburn Eletrial and Computer Engineering James Cook University Townsville, Qld, Australia, 4811. E-mail: Keith.Kikkert@ju.edu.au,

More information

Micro-Piezoelectric Head Technology of Color Inkjet Printer

Micro-Piezoelectric Head Technology of Color Inkjet Printer DPP2: International Conferene on Digital Prodution Printing and Industrial Appliations Miro-Piezoeletri Head Tehnology of Color Inkjet Printer Takao Mimura & Shinri Sakai SEIKO EPSON Corporation Shiojiri-shi,

More information

EE (082) Chapter IV: Angle Modulation Lecture 21 Dr. Wajih Abu-Al-Saud

EE (082) Chapter IV: Angle Modulation Lecture 21 Dr. Wajih Abu-Al-Saud EE 70- (08) Chapter IV: Angle Modulation Leture Dr. Wajih Abu-Al-Saud Effet of Non Linearity on AM and FM signals Sometimes, the modulated signal after transmission gets distorted due to non linearities

More information

Metrol. Meas. Syst., Vol. XVIII (2011), No. 2, pp METROLOGY AND MEASUREMENT SYSTEMS. Index , ISSN

Metrol. Meas. Syst., Vol. XVIII (2011), No. 2, pp METROLOGY AND MEASUREMENT SYSTEMS. Index , ISSN METROLOGY AND MEASUREMENT SYSTEMS Index 330930, ISSN 0860-8229 www.metrology.pg.gda.pl DAC TESTING USING MODULATED SIGNALS Pavel Fexa, Josef Vedral, Jakub Svatoš CTU Prague, Faulty of Eletrial Engineering

More information

Detecting Moving Targets in SAR Via Keystoning and Phase Interferometry

Detecting Moving Targets in SAR Via Keystoning and Phase Interferometry 5 The MITRE Corporation. All rights reserved. Approved for Publi Release; Distribution Unlimited. Deteting Moving Targets in SAR Via Keystoning and Phase Interferometry Dr. P. K. Sanyal, Dr. D. M. Zasada,

More information

Performance of Random Contention PRMA: A Protocol for Fixed Wireless Access

Performance of Random Contention PRMA: A Protocol for Fixed Wireless Access Int. J. Communiations, Network and System Sienes, 2011, 4, 417-423 doi:10.4236/ijns.2011.47049 Published Online July 2011 (http://www.sirp.org/journal/ijns) Performane of Random Contention PRMA: A Protool

More information

Location Fingerprint Positioning Based on Interval-valued Data FCM Algorithm

Location Fingerprint Positioning Based on Interval-valued Data FCM Algorithm Available online at www.sienediret.om Physis Proedia 5 (01 ) 1939 1946 01 International Conferene on Solid State Devies and Materials Siene Loation Fingerprint Positioning Based on Interval-valued Data

More information

Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks

Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks Optimal Joint Routing and Sheduling in Millimeter-Wave Cellular Networks Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer and Matthias Hollik SEEMOO, Tehnishe Universität Darmstadt Simula@UiB, Bergen Norway Institute

More information

A Quadrature Downconversion Autocorrelation Receiver Architecture for UWB

A Quadrature Downconversion Autocorrelation Receiver Architecture for UWB A Quadrature Downonversion Autoorrelation Reeiver Arhiteture for UWB Simon Lee, Sumit Bagga, Wouter A. Serdijn Eletronis Researh Laboratory, Faulty of Eletrial Engineering, Mathematis and Computer Siene

More information

Generating 4-Level and Multitone FSK Using a Quadrature Modulator

Generating 4-Level and Multitone FSK Using a Quadrature Modulator Generating 4-Level and Multitone FSK Using a Quadrature Modulator Page 1 of 9 Generating 4-Level and Multitone FSK Using a Quadrature Modulator by In a reent olumn (lik on the Arhives botton at the top

More information

DSP First Lab 05: FM Synthesis for Musical Instruments - Bells and Clarinets

DSP First Lab 05: FM Synthesis for Musical Instruments - Bells and Clarinets DSP First Lab 05: FM Synthesis for Musial Instruments - Bells and Clarinets Pre-Lab and Warm-Up: You should read at least the Pre-Lab and Warm-up setions of this lab assignment and go over all exerises

More information

Layered Space-Time Codes for Wireless Communications Using Multiple Transmit Antennas

Layered Space-Time Codes for Wireless Communications Using Multiple Transmit Antennas Layered Spae-Time Codes for Wireless Communiations Using Multiple Transmit Antennas Da-shan Shiu and Joseph M. Kahn University of California at Bereley Abstrat Multiple-antenna systems provide very high

More information

Sensor Network with Data Transfer over Power Supply Wires

Sensor Network with Data Transfer over Power Supply Wires Sensor Network with Data Transfer over Power Supply Wires Vašek V., Dolinay J. and Dostálek P. Abstrat This artile desribes system whih allows reating sensor networks where sensors ommuniate with a entral

More information

Single Parity Check Turbo Product Codes for the DVB-RCT Standard

Single Parity Check Turbo Product Codes for the DVB-RCT Standard Single Parity Chek Turbo Produt Codes for the DVB-RCT Standard Angelo Pinelli Martins Samia National Institute of Teleommuniations - Inatel P.O. Box 05-37540-000 Santa Rita do Sapuaí - MG Brazil angelo.pinelli@inatel.br

More information

Multilevel PWM Waveform Decomposition and Phase-Shifted Carrier Technique

Multilevel PWM Waveform Decomposition and Phase-Shifted Carrier Technique Multilevel PWM Waveform Deomposition and Phase-Shifted Carrier Tehnique R. Naderi* and A. Rahmati* Abstrat: Multilevel PWM waveforms an be deomposed into several multilevel PWM omponents. Phase-shifted

More information

Study of the Variance in the Histogram Test of ADCs

Study of the Variance in the Histogram Test of ADCs Study of the Variane in the Histogram Test of ADCs F. Corrêa Alegria and A. Cruz Serra Teleommuniations Institute and Department of Eletrial and Computer Engineering Instituto Superior Ténio, Tehnial University

More information

Interpreting CDMA Mobile Phone Testing Requirements

Interpreting CDMA Mobile Phone Testing Requirements Appliation Note 54 nterpreting CDMA Mobile Phone Testing Requirements Most people who are not intimately familiar with the protool involved with S-95A & J- STD-008 (CDMA) phones will enounter some onfusion

More information

Freezing Simulates Non-Freezing Tile Automata

Freezing Simulates Non-Freezing Tile Automata Freezing Simulates Non-Freezing Tile Automata ameron halk 1, Austin Luhsinger 2, Eri Martinez 2, Robert Shweller 2, Andrew Winslow 2, and Tim Wylie 2 1 Department of Eletrial and omputer Engineering, University

More information

Virtual Radar Imaging for Sensor Networks

Virtual Radar Imaging for Sensor Networks Virtual Radar Imaging for Sensor Networks Bharath Ananthasubramaniam Shool of Eletrial and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93117 bharath@ee.usb.edu Upamanyu

More information

Dispersion and Dispersion Slope Compensation of an Optical Delay Line Filter (DLF) based on Mach-Zehnder Interferometers

Dispersion and Dispersion Slope Compensation of an Optical Delay Line Filter (DLF) based on Mach-Zehnder Interferometers Dispersion and Dispersion Slope Compensation of an Optial Delay Line Filter (DLF) based on Mah-Zehnder Interferometers P.Pavithra 1, K.Karthika 2 1,2 Department of Eletronis and Communiation Engineering,

More information

A Robust Image Restoration by Using Dark channel Removal Method

A Robust Image Restoration by Using Dark channel Removal Method Volume 6, Issue 3, Marh 2017, ISSN: 2278 1323 A Robust Image Restoration by Using Dark hannel Removal Method Ankit Jain 1 (MTeh. sholar), Prof. Mahima Jain 2 Department Of Computer Siene And Engineering,

More information

Figure 4.11: Double conversion FM receiver

Figure 4.11: Double conversion FM receiver 74 4.8 FM Reeivers FM reeivers, like their AM ounterparts, are superheterodyne reeivers. Figure 4.11 shows a simplified blok diagram for a double onversion superheterodyne FM reeiver Figure 4.11: Double

More information

A Study on The Performance of Multiple-beam Antenna Satellite Receiving System Dezhi Li, Bo Zeng, Qun Wu*

A Study on The Performance of Multiple-beam Antenna Satellite Receiving System Dezhi Li, Bo Zeng, Qun Wu* 16 nd International Conferene on Mehanial, Eletroni and Information Tehnology Engineering (ICMITE 16) ISBN: 978-1-6595-34-3 A Study on The Performane of Multiple-beam Antenna Satellite Reeiving System

More information

ANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS

ANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS ANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS Thomas Pany (1), Bernd Eissfeller (2), Jón Winkel (3) (1) University

More information

Considering Capacitive Component in the Current of the CSCT Compensator

Considering Capacitive Component in the Current of the CSCT Compensator Proeedings of the World Congress on Engineering and Computer Siene 8 WCECS 8, Otober - 4, 8, San Franiso, SA Considering Capaitive Component in the Current of the CSCT Compensator Mohammad Tavakoli Bina,

More information

Turbo-coded Multi-alphabet Binary CPM for Concatenated Continuous Phase Modulation

Turbo-coded Multi-alphabet Binary CPM for Concatenated Continuous Phase Modulation no symbol mapping is required, and also the inner ode an be ombined with the CPE in the trellis oded modulation sense [4]. Simulation shows that the use of non-binary outer enoder an give typially.3db

More information

Optimization of Energy Detector Receivers for UWB Systems

Optimization of Energy Detector Receivers for UWB Systems ) Optimization of Energy Detetor Reeivers for UWB Systems Mustafa E Şahin, İsmail Güvenç, and Hüseyin Arslan Eletrial Engineering Department, University of South Florida 4202 E Fowler Avenue, ENB-118,

More information

Whole Numbers and Introduction to Algebra

Whole Numbers and Introduction to Algebra CHAPER Should I buy or lease a ar? What are the benefits of eah? Whih hoie fits my needs? Does leasing a ar or buying a ar save me the most money? urn to Putting Your Skills to Work on page 62 to find

More information

DESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR APPLICATION

DESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR APPLICATION International Journal of Emerging Tehnologies and Engineering (IJETE) ISSN: 238 8 ICRTIET-21 Conferene Proeeding, 3 th -31 st August 21 11 DESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR

More information

Hierarchical Extreme-Voltage Stress Test of Analog CMOS ICs for Gate-Oxide Reliability Enhancement*

Hierarchical Extreme-Voltage Stress Test of Analog CMOS ICs for Gate-Oxide Reliability Enhancement* Hierarhial Extreme-Voltage Stress Test of Analog MOS Is for Gate-Oxide Reliability Enhanement* hin-long Wey Department of Eletrial Engineering National entral University hung-li, Taiwan lway@ee.nu.edu.tw

More information

Negative to Positive CFS-244 April 19, 2004

Negative to Positive CFS-244 April 19, 2004 egative to ositive CFS-244 April 19, 2004 www.-f-systems.om ersonal ote This report has a lot of algebra and basi physis of photography in it, but it is not "roket siene." evertheless, it is quite triky

More information

Design and Performance of a 24 GHz Band FM-CW Radar System and Its Application

Design and Performance of a 24 GHz Band FM-CW Radar System and Its Application Frequeny Design and Performane of a 24 GHz Band FM-CW Radar System and Its Appliation Kazuhiro Yamaguhi, Mitsumasa Saito, Kohei Miyasaka and Hideaki Matsue Tokyo University of Siene, Suwa CQ-S net In.,

More information

Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs

Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs Effiient Mehanisms to Provide Convoy Member and Vehile Sequene Authentiation in VANETs Ahren Studer, Mark Luk, Adrian Perrig Eletrial and Computer Engineering Carnegie Mellon University {astuder, mluk,

More information

A comparison of scheduling algorithms in HSDPA

A comparison of scheduling algorithms in HSDPA A omparison of sheduling algorithms in HSDPA Stefan M. Sriba and Fambirai Takawira Shool of Eletrial, Eletroni and Computer Engineering, University of KwaZulu-Natal King George V Avenue, Durban, 404, South

More information

Co-Siting Criteria for Wind Turbine Generators and Transmitter Antennas

Co-Siting Criteria for Wind Turbine Generators and Transmitter Antennas CONFTELE '99 ISBN 972-98115-0-4 Pro. CONFTELE 1999 - II Conf. de Teleomuniações, Sesimbra, Portugal, 466-470, Abr 1999 1 Co-Siting Criteria for Wind Turbine Generators and Transmitter Antennas Carlos Salema,

More information

Vision-based Quality Inspection for Components with Small Diameter and Deep Hole

Vision-based Quality Inspection for Components with Small Diameter and Deep Hole Vision-based Quality Inspetion for Components with Small Diameter and Deep Hole Shool of Computer and Control Engineering University of Chinese Aademy of Sienes Beijing 100049, China Xinyi Gong, Hu Su,

More information

Thank you for your interest in hosting a Divided We Fail House Party!

Thank you for your interest in hosting a Divided We Fail House Party! Thank you for your interest in hosting a Divided We Fail House Party! Although Amerians onsistently rate health and finanial seurity as their top domesti onerns, many of the nation s leaders have given

More information

ACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS

ACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS ACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS Xun Li, Ben S. Cazzolato and Colin H. Hansen Shool of Mehanial Engineering, University of Adelaide Adelaide SA 5005, Australia.

More information

A Dual-Threshold ATI-SAR Approach for Detecting Slow Moving Targets

A Dual-Threshold ATI-SAR Approach for Detecting Slow Moving Targets A Dual-Threshold ATI-SAR Approah for Deteting Slow Moving Targets Yuhong Zhang, Ph. D., Stiefvater Consultants Abdelhak Hajjari, Ph. D. Researh Assoiates for Defense Conversion In. Kyungjung Kim, Ph. D.,

More information

Abstract. 1. Introduction. 2. Fading

Abstract. 1. Introduction. 2. Fading An Interative Simulation for Flat Fading P.Marihamy*, J.Senthilkumar and V.Vijayarangan ECE Dept., National Engineering College Kovilpatti -68 503, India. * Nizwa College of Tehnology, Sultanate of Oman

More information

An Acquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Access

An Acquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Access 6 IEEE Ninth International Symposium on Spread Spetrum Tehniques and Appliations An Aquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Aess Shin ihi TACHIKAWA Nagaoka University of

More information

Limitations and Capabilities of the Slanted Spectrogram Analysis Tool for SAR-Based Detection of Multiple Vibrating Targets

Limitations and Capabilities of the Slanted Spectrogram Analysis Tool for SAR-Based Detection of Multiple Vibrating Targets Limitations and Capabilities of the Slanted Spetrogram Analysis Tool for SAR-Based Detetion of Multiple Vibrating Targets Adebello Jelili, Balu Santhanam, and Majeed Hayat Department of Eletrial and Computer

More information

CHAPTER-8 Spread Spectrum Modulation Introduction: Problem of radio transmission Solution Firstly Secondly

CHAPTER-8 Spread Spectrum Modulation Introduction: Problem of radio transmission Solution Firstly Secondly CHAPER-8 Spread Spetrum Modulation Introdution: Initially developed for military appliations during II world war, that was less sensitive to intentional interferene or jamming y third parties. Spread spetrum

More information

Reprint from IASTED International Conference on Signal and Image Processing (SIP 99). Nassau, Bahamas, October, 1999.

Reprint from IASTED International Conference on Signal and Image Processing (SIP 99). Nassau, Bahamas, October, 1999. Reprint from IASTED International Conferene on Signal and Image Proessing (SIP 99). Nassau, Bahamas, Otober, 1999. 1 Filter Networks Mats Andersson Johan Wiklund Hans Knutsson Computer Vision Laboratory,

More information

A 24 GHz Band FM-CW Radar System for Detecting Closed Multiple Targets with Small Displacement

A 24 GHz Band FM-CW Radar System for Detecting Closed Multiple Targets with Small Displacement A 24 GHz Band FM-CW Radar System for Deteting Closed Multiple Targets with Small Displaement Kazuhiro Yamaguhi, Mitsumasa Saito, Takuya Akiyama, Tomohiro Kobayashi and Hideaki Matsue Tokyo University of

More information

2011 IEEE. Reprinted, with permission, from David Dorrell, Design and comparison of 11 kv multilevel voltage source converters for local grid based

2011 IEEE. Reprinted, with permission, from David Dorrell, Design and comparison of 11 kv multilevel voltage source converters for local grid based 2 IEEE. Reprinted, with permission, from David Dorrell, Design and omparison of k multilevel voltage soure onverters for loal grid based renewable energy systems. IECON 2-37th Annual Conferene on IEEE

More information

4.2 Proving and Applying

4.2 Proving and Applying YOU WILL NEED alulator ruler EXPLORE 4.2 Proving and Applying the Sine and Cosine Laws for Obtuse Triangles An isoseles obtuse triangle has one angle that measures 120 and one side length that is 5 m.

More information

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies DEVELOPMENT OF SURFACE WAVE DISPERSION AND ATTENUATION MAPS AND IMPROVED METHODS FOR MEASURING SURFACE WAVES Jeffry L. Stevens, Jeffrey W. Given, G. Eli Baker and Heming Xu Siene Appliations International

More information

FIFTY-SIXTH ANNUAL MICHIGAN MATHEMATICS PRIZE COMPETITION

FIFTY-SIXTH ANNUAL MICHIGAN MATHEMATICS PRIZE COMPETITION FIFTY-SIXTH ANNUAL MICHIGAN MATHEMATICS PRIZE COMPETITION sponsored by The Mihigan Setion of the Mathematial Assoiation of Ameria Part I Tuesday Otober 2, 202 INSTRUCTIONS (to be read aloud to the students

More information

Average Current Mode Interleaved PFC Control

Average Current Mode Interleaved PFC Control Freesale Semiondutor, n. oument Number: AN557 Appliation Note ev. 0, 0/06 Average Current Mode nterleaved PFC Control heory of operation and the Control oops design By: Petr Frgal. ntrodution Power Fator

More information

Performance of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protocol over Different Fading Channels

Performance of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protocol over Different Fading Channels http://dx.doi.org/10.5755/j01.eee..1.14116 Performane of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protool over Different Fading Channels Nuri Kapuu 1 Mehmet Bilim 1 Ibrahim Develi 1 1 Department

More information

Adaptive TDMA/OFDMA for Wide-Area Coverage and Vehicular Velocities

Adaptive TDMA/OFDMA for Wide-Area Coverage and Vehicular Velocities Adaptive TDMA/FDMA for Wide-Area Coverage and Vehiular Veloities Mikael Sternad *, Sorour Falahati *, Tommy Svensson, and Daniel Aronsson * * Signals and Systems, Uppsala University, P Box 8,SE-71 0 Uppsala,

More information

Link-Level Analysis of Downlink Handover Regions in UMTS

Link-Level Analysis of Downlink Handover Regions in UMTS Link-Level Analysis of Downlink Handover Regions in UMTS Atta Ul Quddus, Xinjie Yang and Rahim Tafazolli, Member, IEEE Abstrat This paper investigates the downlink handover (soft/softer/hard) performane

More information

Auditory Processing of Speech: The COG Effect. Student Researcher: Daniel E. Hack. Advisor: Dr. Ashok Krishnamurthy

Auditory Processing of Speech: The COG Effect. Student Researcher: Daniel E. Hack. Advisor: Dr. Ashok Krishnamurthy Auditory Proessing of Speeh: The COG Effet Student Researher: Daniel E. Hak Advisor: Dr. Ashok Krishnamurthy The Ohio State University Department of Eletrial and Computer Engineering Abstrat The COG effet

More information

Study on the Effect of Object to Camera Distance on Polynomial Expansion Coefficients in Barrel Distortion Correction

Study on the Effect of Object to Camera Distance on Polynomial Expansion Coefficients in Barrel Distortion Correction Study on the Effet of Objet to Camera Distane on Polynomial Expansion Coeffiients in Barrel Distortion Corretion H. Tian, T. Srikanthan, K. Vijayan Asari, S. K. Lam Center for High Performane Embedded

More information

Resilience. Being resilient on the other hand, helps a person in many different ways. Such a person:

Resilience. Being resilient on the other hand, helps a person in many different ways. Such a person: Resiliene What is Resiliene? Often, people have a wrong idea of what resiliene is. They think resiliene means that you re unaffeted by the problems of life or you go through life always with a smile on

More information

Shuli s Math Problem Solving Column

Shuli s Math Problem Solving Column Shuli s Math Problem Solving Column Volume 1, Issue 18 April 16, 009 Edited and Authored by Shuli Song Colorado Springs, Colorado shuli_song@yahooom Content 1 Math Trik: Mental Calulation: 19a19b Math

More information

An Ontology-based Validation Approach to Resolve Conflicts in Manufacturing Design Process

An Ontology-based Validation Approach to Resolve Conflicts in Manufacturing Design Process An Ontology-based Validation Approah to Resolve Conflits in Manufaturing Design Proess Kazunari Hashimoto, Motoyuki Takaai, Yohei Yamane, Seiji Suzuki, Masao Watanabe, and Hiroshi Umemoto Researh and Tehnology

More information

IMAGE RECONSTRUCTION FROM OMNI-DIRECTIONAL CAMERA Kai Guo and Zhuang Li

IMAGE RECONSTRUCTION FROM OMNI-DIRECTIONAL CAMERA Kai Guo and Zhuang Li IMAGE RECONSTRUCTION FROM OMNI-DIRECTIONAL CAMERA Kai Guo and Zhuang Li De 15, 2007 Boston University Department of Eletrial and Computer Engineering Tehnial report No. ECE-2007-06 BOSTON UNIVERSITY IMAGE

More information

Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach

Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoreti Approah Qing Yu, Jiming Chen, Yanfei Fan, Xuemin (Sherman) Shen and Youxian Sun State Key Lab of Industrial Control Tehnology, Zhejiang

More information

RF Link Budget Calculator Manual

RF Link Budget Calculator Manual RF Link Budget Calulator Manual Author Ivo van Ling for www.vanling.net Software Release RF Link Distane Calulator, Version 1.00, Dated 4 January 2010 Manual Version 1.00 Date 19-01-2010 Page: 1(8) Contents

More information

Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks

Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks Morality-driven Data Forwarding with Privay Preservation in Mobile Soial Networks Xiaohui Liang, Student Member, IEEE, Xu Li, Tom. Luan, Rongxing Lu, Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin

More information

SINGLE FREQUENCY NETWORKS IN DIGITAL RADIO Anders Mattsson and John Kean Harris Corp and NPR Labs Mason OH Washington DC

SINGLE FREQUENCY NETWORKS IN DIGITAL RADIO Anders Mattsson and John Kean Harris Corp and NPR Labs Mason OH Washington DC SINGLE FREQUENCY NETWORKS IN DIGITAL RADIO Anders Mattsson and John Kean Harris Corp and NPR Labs Mason OH Washington DC ABSTRACT Not too surprisingly, a Digital Radio Single Frequeny Network (SFN) shares

More information

A Digitally Controlled Oscillator for ADPLL Application. Wu Xiulong, Wang Faniu, Lin Zhiting, and Chen Junning

A Digitally Controlled Oscillator for ADPLL Application. Wu Xiulong, Wang Faniu, Lin Zhiting, and Chen Junning pplied Mehanis and Materials Online: 22--29 ISSN: 662-7482, Vols. 229-23, pp 55-58 doi:.428/www.sientifi.net/mm.229-23.55 22 Trans Teh ubliations, Switzerland Digitally Controlled Osillator for DLL ppliation

More information

Doppler Collision and cross correlation interference in GPS receivers

Doppler Collision and cross correlation interference in GPS receivers International Global Navigation Satellite Systems Soiety IGNSS Symposium 29 Holiday Inn Surfers Paradise, Qld, Australia 1 3 Deember, 29 Doppler Collision and ross orrelation interferene in GPS reeivers

More information

Demonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on Hardware Testbed USA. China USA

Demonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on Hardware Testbed USA. China USA 2, rue d Artois, F-758 PARIS CIGRE US National Committee http : //www.igre.org 25 Grid of the Future Symposium Demonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on

More information

Date: August 23,999 Dist'n: T1E1.4

Date: August 23,999 Dist'n: T1E1.4 08/0/99 1 T1E1.4/99-49 Projet: T1E1.4: VDSL Title: Filtering elements to meet requirements on power spetral density (99-49) Contat: G. Cherubini, E. Eleftheriou, S. Oeler, IBM Zurih Researh Lab. Saeumerstr.

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This doument is downloaded from DR-NTU Nanyang Tehnologial University Library Singapore. Title Primary-Ambient Extration Using Ambient Spetrum Estimation for Immersive Spatial Audio Reprodution Author(s)

More information

Capacitor Voltage Control in a Cascaded Multilevel Inverter as a Static Var Generator

Capacitor Voltage Control in a Cascaded Multilevel Inverter as a Static Var Generator Capaitor Voltage Control in a Casaded Multilevel Inverter as a Stati Var Generator M. Li,J.N.Chiasson,L.M.Tolbert The University of Tennessee, ECE Department, Knoxville, USA Abstrat The widespread use

More information

Convention Paper Presented at the 124th Convention 2008 May Amsterdam, The Netherlands

Convention Paper Presented at the 124th Convention 2008 May Amsterdam, The Netherlands Audio Engineering Soiety Convention Paper Presented at the 24th Convention 2008 May 7 20 Amsterdam, The Netherlands The papers at this Convention have been seleted on the basis of a submitted abstrat and

More information

5.8 Gb/s 16:1 multiplexer and 1:16 demultiplexer using 1.2 m BiCMOS

5.8 Gb/s 16:1 multiplexer and 1:16 demultiplexer using 1.2 m BiCMOS Downloaded from orbit.dtu.dk on: Mar 13, 218 5.8 Gb/s 16:1 multiplexer and 1:16 demultiplexer using 1.2 m BiCMOS Midtgaard, Jaob; Svensson, C. Published in: Proeedings of the IEEE International Symposium

More information

A Distributed OFDMA Medium Access Control for Underwater Acoustic Sensors Networks

A Distributed OFDMA Medium Access Control for Underwater Acoustic Sensors Networks This full text paper was peer reviewed at the diretion of IEEE Communiations Soiety subjet matter experts for publiation in the IEEE ICC 2011 proeedings A Distributed OFDMA Medium Aess Control for Underwater

More information

Parameters of the radio channels that affect digital signal transmissions Propagation Environment Attenuation Index, γ

Parameters of the radio channels that affect digital signal transmissions Propagation Environment Attenuation Index, γ Parameters of the radio hannels that affet digital signal transmissions 1.Free spae attenuation - the signal undergoes an average attenuation that depends on the length of the path and signal s frequeny

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EXTENDING THE UNAMBIGUOUS RANGE OF CW POLYPHASE RADAR SYSTEMS USING NUMBER THEORETIC TRANSFORMS by Nattaphum Paepolshiri September 11 Thesis Co-Advisors:

More information

Radiocommunication and Broadcasting Antenna Systems

Radiocommunication and Broadcasting Antenna Systems Issue 5 Released: June 26, 2014 Effetive: July 15, 2014 Spetrum Management and Teleommuniations Client Proedures Cirular Radioommuniation and Broadasting Antenna Systems Aussi disponible en français Comments

More information

Notes on Dielectric Characterization in Waveguide

Notes on Dielectric Characterization in Waveguide Notes on Dieletri Charaterization in Waveguide R.Nesti, V. Natale IRA-INAF Aretri Astrophysial Observatory 1. Theory Let's suppose we have to haraterize the eletromagneti properties of a dieletri material,

More information

Time Reversal Synthetic Aperture Radar Imaging In Multipath

Time Reversal Synthetic Aperture Radar Imaging In Multipath Time Reversal Syntheti Aperture Radar Imaging In Multipath Yuanwei Jin, José M.F. Moura, and Niholas O Donoughue Eletrial and Computer Engineering Carnegie Mellon University Pittsburgh, PA 1513 Mihael

More information