A Zero-Error Source Coding Solution to the Russian Cards Problem
|
|
- Ilene Lamb
- 6 years ago
- Views:
Transcription
1 A Zero-Error Soure Coding Solution to the Russian Cards Problem ESTEBAN LANDERRECHE Institute of Logi, Language and Computation January 24, 2017 Abstrat In the Russian Cards problem, Alie wants to ommuniate her hand from a dek of ards to Bob through one publi announement suh that Cath does not learn her hand. In zero-error soure oding, Alie s goal is to ommuniate her information to Bob with the least amount of bits. Both problems share the goal of Bob learning Alie s information in one announement. However, they have additional objetives: in the Russian Cards ase it is seurity against Cath, for soure oding it is minimizing the ommuniation omplexity. At a first glane, these two additional properties are not mutually exlusive so we ask whether there is a solution that is both optimal and seure at the same time. This would permit us to model the Russian Cards problem as a zero-error soure oding problem to find the optimal seure announement and it will also enrih soure oding by adding the knowledge that it is also seure for an attaker that holds some orrelated information. Finally, we deal with the relationship between these two problems. To ahieve this, we use results of graph theory and design theory, in partiular blok graphs and Steiner systems. 1 Introdution There are many different approahes to the modelling of ommuniation in mathematis. A fruitful area of study in this area is measuring the amount of information exhanged to ommuniate the most by saying the least. Another approah seeks to reate ommuniation that an only be understood by the intended reipients. It is possible to ombine both goals in our modelling, to provide effiient and seure ommuniation. Zero-error soure oding is an example of the former approah whih has some similarities with the Russian Cards problem, a member of the latter. We will try to 1
2 ombine them to see if solutions for one also work for the other and to see what is neessary to ahieve this. Take a situation where three people (Alie, Bob and Cath) have a dek of ards. They randomly distribute the ards between themselves suh that they only know their ards. Suppose everything that is said an be heard and understood by all three people, is there a way for Alie to tell Bob her hand without Cath finding out? This is the question that the Russian Cards problem tries to answer. In essene, what we have is three people with probabilistially orrelated information in whih two of them attempt to ommuniate their knowledge without the information reahing the third person. This seems to suggest a onnetion with zero-error soure oding, whih tries to onstrut the minimal announement suh that Bob an know all of Alie s information. To further study this onnetion, we first define eah problem on its own. 1.1 The Russian Cards Problem The Russian Card problem as it appeared in the 2000 Mosow Mathematial Olympiad is as follows Suppose we have three partiipants- Alie, Bob and Cathwho have a dek with 7 ards represented by the numbers 0 to 6. The ards are dealt within the three in a random manner in a way that only eah player knows his or her ards. Both Alie and Bob reeive 3 ards while Cath is given the remaining one. Alie gets ards 0, 1 and 2, Bob gets 3, 4 and 5 and Cath gets 6. Alie and Bob want to know eah other s ards without Cath learning any of them. However, every ommuniation between Alie and Bob an be heard and understood perfetly by Cath and it is impossible to enrypt the message in a traditional way. Is there a way that they an ommuniate eah other s hand without Cath knowing the position of any ard she doesn t hold? What started as an Olympiad problem has been generalized for larger deks and different distributions of the ards. Other generalizations permit multiple announements, whih opens up a greater set of distributions that have a solutions. However, these examples no longer share the basi struture with zero-error soure oding, so we do no take them into aount. 1.2 Zero-error Soure Coding In zero-error soure oding we have the following: Alie holds some information x Ω where Ω is ommonly known by both Alie and Bob. She 2
3 wants to ommuniate x to Bob, who holds some orrelated information u, of whih Alie knows the form of (but not the ontent). The goal of a soure oding problem is for Alie to ommuniate x to Bob with the least amount of bits possible, taking advantage that x and u are orrelated. This is done by onstruting a onfusability graph G = (V, E) where the verties in V represent the possible values of x (that is eah element of Ω) and two verties v 1, v 2 are joined by an edge if and only if there is a ertain value of u suh that Bob would not be able to distinguish whether Alie holds v 1 or v 2. Given this graph, Alie must only find a minimal vertex oloring and ommuniate to Bob the olor of the vertex x. Bob ould now immediately distinguish whih is the orret vertex through the information enoded in u, as no verties of the same olor are onneted. The minimal olouring of this graph is an optimal solution for zero-error soure oding beause it is the smallest partition over the information that Alie holds whih is still informative to Bob. The oloring of the graph is agreed and indexed beforehand so the ommuniation onsists only of the index of the olor. If there are m olors, the announement will be of length log 2 m. 2 Informativity We have presented two distint problems from very different ontexts and with very different goals. However, they have a similar struture. In both we have an agent attempting to ommuniate his information to the other. While eah problem has additional desirable properties in the announement, they both agree on the fat that an announement must be informative for the reeiving agent. After ommuniation, the reeiver must always know exatly what information the sender holds. We bridge the two problems through this idea. It is very natural to see that the Russian Cards problem an be expressed as a zero-error soure oding problem with an extra ondition and a different goal. Ω is seen as all the possible hands for Alie, where x is the hand that she atually holds. Similarly, u beomes Bob s hand, whih is learly orrelated to Alie s hand. Alie an learly onstrut this graph, as she an think about all the possible hands that Bob an hold and build the edge set aordingly. In partiular this means that any solution that is informative to Bob in the Russian Cards problem is also informative in the soure oding ontext. 3
4 Looking for a onnetion between these two problems indiretly gives us a result for Russian Cards. The informativity of an announement an be tested in a onfusability graph, regardless of the way we onstrut the announement. If an announement ontains two hands that are onneted then there is at least one hand that Bob ould hold that will onsider both these hands as possible. Therefore, we must avoid this at all ost. The independene number of a graph represents the ardinality of the largest set of verties in the graph suh that all the verties are not onneted. Note that no announement an have two onneted verties, as that would mean that for a ertain ard deal, Bob would not be able to distinguish the two onneted hands. This gives us an upper bound on the size of an announement whih annot be higher than the independene number of the onfusability graph of that problem. If our goal is to onnet these two problems we will formally define what we mean by an announement and informativity. The presentation follows the one seen in [LFD15] for the Russian Cards problem, but generalized so that it an also be applied. It is important to note that while generally zeroerror soure oding literature does not expliitly treat an announement as a list of possible values for Alie s information, it an always be seen as suh. Definition 1. Let Ω N be the set of the possible information and A, B Ω be the information that Alie and Bob hold respetively, with A B =. An announement A ( Ω A ) is a list of possible values for A, with (Ω A ) representing all the subsets of Ω with ardinality equal to A. Definition 2. Let ( Ω A ) be the set of every possible information set that Alie may hold. An announement strategy S is a set of announements and a distribution funtion f over S suh that for every set A ( Ω A ) Alie will hoose an appropriate announement A S with the probability dependent on f Definition 3. Let A and B be the information that Alie and Bob hold respetively. An announement A is informative if after the announement Bob knows A, written in this way: A \ B = {A}. An announement strategy is informative if every announement in it is informative. In the Russian Cards setting, Ω represents the dek of ards and A, B (and C) are the hands of eah player. For the soure oding perspetive, eah piee of information is enoded in a natural number. This differs from the lassial presentation in the introdution, where Alie holds one element of Ω instead of a subset. It is easy to show that these two settings are equivalent, but we hoose to present it in this way to show the similiarity with the Russian Cards problem. We define the notion of an announement 4
5 strategy beause the hoie of an announement depends on the partiular information that Alie holds, however a strategy only depends on Ω and how the information is distributed. Therefore, we an define a strategy for any partiular deal of ards/soure oding problem. Note that we have a probability funtion to define whih announement Alie hooses for the ase that there is more than one announement for a partiular hand. In the soure oding paradigm, this funtion is unneessary as we are trying to minimize the total number of announements. It is natural to have only one possible announement per hand, otherwise we ould have redundany. As a matter of fat, the solution using oloring of graphs ensures that there an only be one announement per hand. 2.1 Example We will present an example to see that while the onept of informativity in both problems is equivalent, the problems are not. We will fous on the original problem with seven ards to show that the soure oding protool works. We will all this problem the (3, 3, 1) problem, as this is how the ards are distributed. While this is a Russian Cards problem, we interpret it as a soure oding problem and use the known solution for it. Then, we will see if it fulfills the requirements to be a good solution for the Russian ards problem. The way to solve a zero-error soure oding problem is through a onfusability graph. Alie onstruts a graph where eah vertex represents the information that she may hold (in this ase, every set of three ards) and joins every two verties whih ould be onfused by Bob if he held any valid hand (in this ase, valid refers both to Bob having three ards and not having any ard found in the verties). While we ould onstrut this graph vertex by vertex, there exists a lass of graphs alled Johnson Graphs whih represent exatly that. A Johnson graph J(n, k) is a graph where the verties are the k-element subsets of an n-element set and there is an edge between two verties if and only if they share a k 1 set. Lets take J(7, 3) and have every vertex represent one of Alie s possible hands. This is equivalent to the fat that two verties are onneted if they are indistinguishable for someone holding a n k 1-set. Therefore, the Johnson graph J(7, 3) is the onfusability graph for the (3, 3, 1) Russian ards problem, as Bob holds = 3 ards. Any oloring of this graph will give us a valid solution for the soure oding problem within. We use sage to find the following oloring: 5
6 000 {0, 2, 6}, {2, 3, 4}, {1, 2, 5}, {0, 4, 5}, {0, 1, 3} 001 {1, 5, 6}, {3, 4, 6}, {0, 3, 5}, {0, 1, 4} 010 {3, 4, 5}, {2, 5, 6}, {0, 3, 6}, {1, 4, 6}, {0, 2, 4}, {1, 2, 3} 011 {2, 4, 6}, {2, 3, 5}, {1, 4, 5}, {0, 5, 6}, {0, 3, 4}, {1, 3, 6}, {0, 1, 2} 100 {4, 5, 6}, {2, 3, 6}, {0, 2, 5}, {0, 1, 6}, {1, 3, 5}, {1, 2, 4} 101 {2, 4, 5}, {1, 2, 6}, {3, 5, 6}, {0, 4, 6}, {1, 3, 4}, {0, 2, 3}, {0, 1, 5} In the Olympiad problem, Alie held {0, 1, 2}. Therefore she would announe 011 as her hand is in the fourth announement. In this partiular ase, Cath will not be able to learn the position of any of the ards that either Alie or Bob hold. We know this beause it oinides with the projetive geometri solution seen in the following example, where Alie holds a line: This seems to show that the soure oding strategy is seure, but this is not the ase. Suppose instead of the original distribution of the ards, we have the following deal Alie: 1, 5, 6 Bob: 2, 3, 4 Cath: 0 In this ase, Alie would announe the following: {1, 5, 6}, {3, 4, 6}, {0, 3, 5}, {0, 1, 4} At first glane we an see that Cath learns the position of some of the ards, as no hand in the announement ontains 2. This lets Cath know that Alie annot hold 2, beause it does not appear in any of the possible hands for Alie. Beause Cath holds 0, she then knows Bob holds 2. It is even worse, as Cath an eliminate the last two hands whih shows her that Alie holds 6. Therefore, soure oding alone is not enough to solve the Russian Cards problem, as we need to add other restritions to ensure seurity of the strategy. 6
7 3 Seurity We have seen that solving the soure oding problem related to a Russian Cards problem is not enough to solve the original problem. A generi solution for the soure oding problem does not automatially ensure that Cath does not learn the position of a ard. However, there are many different minimal olorings for a graph and while we found one that does not work, there may be another whih does. For that, we must formalize the onept of seurity and see if it is refleted in some graph olorings. We want to ensure that, regardless of the ards that eah person holds, Cath does not learn the exat position of any ard she does not hold herself. This an be enoded in the following way. Definition 4. Let Ω be the set of ards, A an announement and the size of Cath s hand. If Y is a set of ards, let A \ Y be all the hands in A whih do not ontain an element of Y. We say A is seure if for all C ( Ω ) the following two properties hold The union of all the hands in A that avoid C is equal to Ω \ C, that is X i A\C X i = Ω \ C. The intersetion of all hands in A that avoid C is the empty set, that is X i A\C X i = The first property ensures that Cath does not learn the position of any ard in Alie s hand, the seond one ensures the same does not happen for any ard in Bob s hand. We an see that the inseure announement in the example fails both, as 2 {1, 5, 6} {3, 4, 6} and {1, 5, 6} {3, 4, 6} = {6}. As a matter of fat, no announement for this ase with four hands will be seure. This is beause in an announement every ard must appear in at least two announements. If it only appears in one, there might be the possibility that Cath holds a ard in the same hand and an then onlude that that ard is not held by Alie. The only way that Alie ould prevent this is by having that one ard only appear in the hand that she holds. However, this is not seure, as Cath will know that Alie s hand must be the one holding the ard that appears only one. If Alie held any other ard the announement would not be seure, as we have seen previously, whih means that Cath would know Alie s hand. That would mean that we must have at least 7 2 = 14 ards in the announement, but an announement with four hands has only 12. hene, by the pigeonhole priniple, this is 7
8 impossible. We an generalize this last fat: If Cath has ards, eah ard must appear in at least + 1 hands in the announement. From here, we get that a seure announement must have at least (a + b + )( + 1) ards. This is neessary for our first ondition to hold, but not suffiient. We an see this by looking at the first announement in our previous example. {0, 2, 6}, {2, 3, 4}, {1, 2, 5}, {0, 4, 5}, {0, 1, 3} If Cath holds 0 she will know that Alie holds 2. Therefore we need stronger restritions to ensure seurity. To do this, we must first properly haraterize the graphs that we are onstruting. To onstrut the onfusability graph G = (V, E) indued by the Russian Cards problem (a, b, ) with V = ( Ω k ) and E V V Create a vertex for eah hand Alie an hold Join two verties if there is a hand that Bob ould hold suh that he ould not distinguish between the two hands. That is, Clearly G is regular and symmetri. (H, K) E H K a + Lemma 5. Let G = (V, E) be a graph indued by the Russian Cards problem (a, b, ). For any x V, x has i=1 ( a i )(b+ i ) neighbors. Proof. If we want to see how many verties y exist suh that x y = a + i for any i we hoose the i ards that we take away from x, whih gives us ( a i ) and the ards with whih we an replae them (b+ i ). By adding all the verties that differ from 1 to ards we get exatly i=1 ( a i )( ) b + i To ensure seurity, we have to prevent the situation where Cath an eliminate all hands in an announement that ontain a partiular ard. Beause we have to reate announements that work for every possible Cath hand, we have to make sure that if ards x and y appear together in a hand in the announement, there must be a hand in the same announement where x appears and y does not (and vieversa). However, as Cath s hands grow, so does this restrition. If Cath has two ards, then for every three ards 8
9 x, y and z in a hand in the announement there must be at least one hand that ontains x but not y and z. In general, if Cath has ards, for eah hand H in an announement, there must be at least + 1 other hands in the announement, eah one ontaining exatly one of the elements of H. This ondition is neessary to fulfill the seond property of seurity, as we defined it previously. To fulfill the first property, for any + 1-set ontained in a hand, there must be another hand in the announement suh that it ontains none of the ards in the set. Here, we run into a problem with our approah. Graph theory alone permits us to define loal relationships and not the relationships that we have just mentioned. Therefore, we annot represent these properties in the graph. Of ourse, we an find olorings and only aept one if these onditions are met, but we annot affirm whether there exists a minimal oloring that fulfills these properties without heking all of them. Therefore, purely graph theoreti tools are not enough in this ase and we need more robust mathematial strutures, in partiular Steiner systems, a type of blok designs. These systems are a subset of ( Ω a ) suh that every (a )-set appears exatly in one element of the system. This is enough to ensure that the previous properties hold. These designs have graphs assoiated to them and they happen to be equivalent to the graphs we have onstruted (when these designs exist). The Johnson Graph J(7, 3) is the blok graph of the 2-(7, 3, 1)-design. In [SS14], it is shown that an optimal announement strategy for a (a, b, ) deal is a large set of t-(a + b +, a, 1)-designs, with t = a. This is equivalent to the minimal oloring in suh graph, whenever the large set exists. Swanson & Stinson proved that the solution reated by t-(a + b +, a, 1)- designs is not only informative and optimal, but also seure. Not ontent with the definition of seurity that we presented, they also proved a stronger notion of seurity. They showed that for any set X of t ards, the probability that Alie holds X aording to Cath does not hange before and after the announement. This prevents Cath from gaining probabilisti information about Alie s hand, whih might be desirable depending on the importane of the privay of the information. They refer to this notion as t-perfet seurity. Definition 6. Let Ω be the set of ards, S an announement strategy and the size of Cath s hand. An announement A S for A ( Ω A ) is t-perfetly seure if for every t-set Y and every C ( Ω ), if Y C = then P(Y A C, A) P(Y A C) = 1 9
10 An announement strategy S is t-perfetly seure if every announement in it is t-perfetly seure. When the t is not diretly relevant, we will refer to this simply as perfet seurity. This gives us a powerful tool to ensure seurity in our announement. For that, we delve deeper into design theory, partiularly in the study of Steiner systems. We will first return to our example to see some examples of seurity. 3.1 Continued Example We go bak to the (3, 3, 1) ase. Note that we have ( 7 3 ) = 35 possible hands and that the independene number of the assoiated Johnson graph J(7, 3) is 7. Our first instint is that given that 7 divides 35, we might have a valid protool with five announements with seven ards eah. Unfortunately, this is impossible, as the hromati number of J(7, 3) is 6. Therefore, a protool must have at least six different possible announements. As a matter of fat, suh announement does exist and is the following 6-oloring of J(7, 3) (presented in [SS14]): {0, 1, 3}, {1, 2, 4}, {2, 3, 5}, {3, 4, 6}, {0, 4, 5}, {1, 5, 6}, {0, 2, 6} {0, 2, 3}, {1, 3, 4}, {2, 4, 5}, {3, 5, 6}, {0, 4, 6}, {0, 1, 5}, {1, 2, 6} {0, 2, 4}, {0, 3, 5}, {1, 2, 3}, {0, 1, 6}, {1, 4, 5}, {2, 5, 6} {0, 1, 2}, {2, 3, 4}, {4, 5, 6}, {1, 3, 5}, {0, 3, 6} {1, 2, 5}, {0, 5, 6}, {1, 4, 6}, {0, 3, 4}, {2, 3, 6} {3, 4, 5}, {0, 1, 4}, {0, 2, 5}, {2, 4, 6}, {1, 3, 6} Note that as antiipated, this is not perfetly seure, as we an see with the fourth announement. If Cath holds 6, the ards 1, 2 and 3 seem more likely than the rest as they appear twie in the redued list while the other ards appear only one. On the other hand, we have the geometri protool that was previously mentioned. This protool is perfetly seure for the (3, 3, 1) problem although it is pretty ineffiient as there are four possible announements per hand. However, we an optimize it by eliminating ertain redundant announements to have only two hoies per hand (also from [SS14]): 10
11 {2, 5, 6}, {2, 3, 4}, {1, 4, 5}, {1, 3, 6}, {0, 4, 6}, {0, 3, 5}, {0, 1, 2} {2, 5, 6}, {2, 3, 4}, {1, 4, 6}, {1, 3, 5}, {0, 4, 5}, {0, 3, 6}, {0, 1, 2} {3, 4, 5}, {2, 4, 6}, {1, 3, 6}, {1, 2, 5}, {0, 5, 6}, {0, 2, 3}, {0, 1, 4} {3, 4, 5}, {2, 4, 6}, {1, 5, 6}, {1, 2, 3}, {0, 3, 6}, {0, 2, 5}, {0, 1, 4} {3, 4, 6}, {2, 3, 5}, {1, 4, 5}, {1, 2, 6}, {0, 5, 6}, {0, 2, 4}, {0, 1, 3} {3, 4, 6}, {2, 3, 5}, {1, 5, 6}, {1, 2, 4}, {0, 4, 5}, {0, 2, 6}, {0, 1, 3} {3, 5, 6}, {2, 4, 5}, {1, 3, 4}, {1, 2, 6}, {0, 4, 6}, {0, 2, 3}, {0, 1, 5} {3, 5, 6}, {2, 4, 5}, {1, 4, 6}, {1, 2, 3}, {0, 3, 4}, {0, 2, 6}, {0, 1, 5} {4, 5, 6}, {2, 3, 6}, {1, 3, 4}, {1, 2, 5}, {0, 3, 5}, {0, 2, 4}, {0, 1, 6} {4, 5, 6}, {2, 3, 6}, {1, 3, 5}, {1, 2, 4}, {0, 3, 4}, {0, 2, 5}, {0, 1, 6} This announement is the best perfetly seure announement, with a ommuniation omplexity of 10 (4 bits) while our previous solution is 6 (3 bits). Here, there is a trade off between perfet seurity and optimality. It is important to note that none of these options would qualify as optimal in the soure oding paradigm, where the optimum is 5 (exept for the partiularity that the ommuniation omplexity of 5 and 6 are equivalent in bits). 4 Results in Steiner Systems In the proess of treating the Russian Cards problem as a zero-error soure oding problem, we found that in order to ensure seurity we would need tools stronger than the ones given to us by graph theory. The graphs we are interested in orresponded to blok graphs for Steiner systems, whenever these systems exist. We present a more formal treatment of these systems in the following work, noting that if we get a minimal oloring for our graph we will also get a large set of Steiner systems. Definition 7. A blok design (or simply, design) t-(v, k, r) is a set X of v elements and a olletion of k-subsets of X (alled bloks) suh that every t-subset of X appears in exatly r bloks. Definition 8. A Steiner system S(t, k, v) is a set X of v elements and a olletion of k-subsets of X (alled bloks) suh that every t-subset of X appears in exatly one blok. A Steiner system is equivalent to a t-(v, k, 1)-design. Definition 9. A large set of Steiner systems S(t, k, v) is a set of Steiner systems suh that every k-subset of X appears in exatly one Steiner system as a blok. 11
12 We know that these designs exist whenever we have the divisibility ondition by [Kee14], and that the onstrution is not trivial. However, we do not know if the large sets exist. For example, designs of the form S(2, 7, 3) do exist (the Fano plane). However, if we had a large set of S(2, 7, 3) systems, we would have a strategy for the (3, 3, 1) Russian Cards problem. However, as we have seen previously, this strategy does not exist. THis is onsistent with results in design theory presented in [SS14]. Lemma 10. A Steiner system S(t, k, v) has (v t ) ( k t ) bloks. Proof. Every t-subset of our set of v elements must appear in the system, so a design must have ( v t ) elements distributed within its bloks of k elements. Every blok fits ( k t ) elements, so there must be ( v t ) /( k t ) for eah t-subset to appear exatly one. Lemma 11. A large set of Steiner systems S(t, k, v) has ( v t k t ) designs. Proof. Every k-subset of our set of v elements must appear in the large set, so a large set must have ( v k ) elements distributed within its designs of ( v t ) /( k t ) elements. Every design fits ( v t ) elements, so there must be (v k ) ( v t ) for eah /( k t ) k-subset to appear exatly one. We an easily redue this to ( v t k t ). It is important to know what the [SS14] refers to by an optimal strategy. We showed that the optimal announement strategy for (3, 3, 1) has 6 possible announements. However this learly is not a large set of Steiner systems. Therefore, an optimal strategy in this ase refers not to the solution with lowest m, but speifially with the solution (whih may or may not exist) equal to the following bound, presented in [SS14]. Lemma 12. Suppose a > and there exists a strategy for Alie that is informative for Bob. Then the number of announements m is bound by ( ) b + 2 m. Definition 13. Let (a, b, ) be the sizes of Alie, Bob and Cath s hands. We say an announement strategy is design-optimal if it ontains exatly ( b+2 ) announements. With this, we present the following theorem from [SS14] 12
13 Theorem 14. Suppose that a >. A design-optimal (a, b, )-strategy for Alie that is informative for Bob is equivalent to a large set of t-(a + b +, a, 1)-designs, where t = a. To find a solution for the Russian Cards problem, we first generate the onfusability graph G and then we find the hromati number χ(g). An optimal informative announement strategy has χ(g) possible announements, any strategy with less announements would either have uninformative announements or not have relevant announements for ertain hands. If we want this minimal announement to be t-perfetly seure then the graph must orrespond to the blok graph of a Steiner system. By [Kee14], a Steiner system S(t, k, v) exists if and only if ( k i r i ) divides (v i r i ) for every 0 i r 1. This means that there are ertain Russian Cards problems that annot be haraterized by designs. While the graph exists, it does not orrespond to a blok graph and therefore we annot apply these results to it. This does not mean a seure solution does not exist, only that it is not a design and it is not t-perfetly seure. Even if a Steiner system exists, the large set might not exist. There are no general proofs for the existene of large sets, but results exists for partiular values, for example k = 3. The following theorem provides a neessary and suffiient ondition to see if large sets of the form S(a, a, a + b + ) exists. Theorem 15. Take 0 < < a b N suh that ( a i r i ) divides (a+b+ i r i ) for every 0 i r 1. There is a large set of S(a, a, a + b + ) Steiner systems if and only if the hromati number of the graph G indued by the Russian Cards problem (a, b, ) is equal to ( b+2 ) Proof. Suppose suh design exists. By Theorem 14 it is an optimal solution to the Russian Cards problem (a, b, ). Beause a large set ontains ( b+2 ) designs, then we an olor G by ( b+2 ) olors and we annot olor it with less beause the design is optimal. By Theorem 14 we know that every informative announement strategy with ( b+2 )-oloring is a large set of S(a, a, a + b + ) Steiner systems. With this result we know that, for given (a, b, ), if χ(g) is larger than ( b+2 ), suh large sets annot exist. While this result is not new, we have built it from the onnetion of the Russian Cards problem and zero-error soure oding. Design theory permits us to onnet graph olorings with our notion of seurity, although unfortunately they do not work for all examples. The lak of existene of a large set of designs means that we have to take deisions regarding what we think is more important: optimality or seurity. 13
14 5 Conlusion and Further Researh We have found a onnetion between the Russian Cards problem and zeroerror soure oding. Both problems are seen extensions of the same problem in whih Alie wants to ommuniate information to Bob, who holds some orrelated information. However, eah problem adds an additional ondition: seurity in Russian ards and minimal ommuniation omplexity for soure oding. We have seen that these two onditions are equivalent if the Steiner system S(a, a, a + b + ) exists (in the soure oding paradigm, Cath s hand represents Bob s unertainty). We also saw that in other ases, this is not true and we must make a hoie between seurity and optimality. This means that while the two problems are similar and oasionally equivalent, it is not always the ase that an optimal solution will be seure. While we saw that we an present a Russian Cards problem in the form a soure oding problem, the opposite is not always true. In partiular, Russian Cards problems have very well behaved onfusability graphs (regular, symmetri). However, it ould be interesting to see if the onept of seurity ould be extended to all of soure oding, seeing where seurity does not affet optimality. By adding an additional restrition to soure oding we reate a new problem in whih optimality of ommuniation is not the only onern, whih might help model situations in whih we do not want the method of data ompression itself prevents the information from being ompromised. If there is no perfetly seure minimal oloring, then we are faed with one hoie of what we value the most: optimality or seurity. For the first ase, we know that every oloring will be informative, so we must look for the smallest (referring to the number of olors) seure oloring. However, this oloring would not be perfetly seure. If we want perfet seurity we will need a oloring that leads to an equitable protool and for that we need all the sets to be of the same size. This means that the oloring must have a number of olors that divides the number of hands. We would then rejet many possible olorings, some of whih may have less olors, but not a number that divides the number of possible hands. A natural line to ontinue the researh is finding whether optimal announements preserve stronger notions of seurity (but weaker than perfet seurity), like ε-strong seurity presented in [LFD15], where the quotient of probabilities of a hand should be between 1 ε and 1 + ε. If we are more interested in minimizing the number of announements, it might be interesting to onsider announement strategies in whih the distri- 14
15 bution funtion hanges depending on Alie s hand. If a S(a, a + b +, a) system does not exist, we know that there is no oloring for the onfusability graph suh that it entails a perfetly seure announement. Therefore, there is no perfetly seure strategy in whih every hand appears exatly one, at least some hands appear in more than one announement. This entails two possibilities, either some hands appear in more announements than others or they all appear the same number of times. The seond ase would hardly be optimal, so it ould be interesting to fous on what Swanson and Stinson all non equitable strategies to find strategies that an be seure and have a low number of possible announements. Referenes BJL99. Thomas Beth, Dieter Jungnikel, and Hanfried Lenz. Design theory, volume 69. Cambridge University Press, Kee14. Peter Keevash. The existene of designs. arxiv preprint arxiv: , LFD15. Esteban Landerrehe and David Fernández-Duque. A ase study in almost-perfet seurity for unonditionally seure ommuniation. Designs, Codes and Cryptography, pages 1 24, OK98. RW. SS14. Alon Orlitsky and J. Körner. Zero-error information theory. IEEE Transations on Information Theory, 44(6): , Todd Rowland and Eri W. Weisstein. Steiner system. mathworld.wolfram.om/steinersystem.html. From MathWorld A Wolfram Web Resoure. Colleen M Swanson and Douglas R Stinson. Combinatorial solutions providing improved seurity for the generalized russian ards problem. Designs, Codes and Cryptography, 72(2): ,
Nested Codes with Multiple Interpretations
Nested Codes with Multiple Interpretations Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daniel J. Costello, Jr. Department of Eletrial Engineering University of Notre Dame, Notre Dame, IN 46556, US Email: {lxiao,
More information1 a 7 b 21 c 6 m d blue e car
Cambridge Essentials Mathematis Core 7 S1.1 Answers S1.1 Answers 1 a 7 b 21 6 m d blue e ar 2 a 2 b 0 3 a 120 b Pizza 4 a Table 1 Number of people in vehile 1 2 3 4 More than 4 Number of vehiles 12 28
More informationWindchimes, Hexagons, and Algebra
University of Nebraska - Linoln DigitalCommons@University of Nebraska - Linoln ADAPT Lessons: Mathematis Lesson Plans from the ADAPT Program 1996 Windhimes, Hexagons, and Algebra Melvin C. Thornton University
More informationEFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION
EFFICIENT IIR NOTCH FILTER DESIGN VIA MULTIRATE FILTERING TARGETED AT HARMONIC DISTURBANCE REJECTION Control Systems Tehnology group Tehnishe Universiteit Eindhoven Eindhoven, The Netherlands Dennis Bruijnen,
More informationSolutions to Problem Set 5
Massahusetts Institute of Tehnology 6.042J/18.062J, Fall 05: Mathematis for Computer Siene Otober 28 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised Otober 12, 2005, 909 minutes Solutions to Problem
More informationEffect of Pulse Shaping on Autocorrelation Function of Barker and Frank Phase Codes
Columbia International Publishing Journal of Advaned Eletrial and Computer Engineering Researh Artile Effet of Pulse Shaping on Autoorrelation Funtion of Barker and Frank Phase Codes Praveen Ranganath
More informationPerformance Study on Multimedia Fingerprinting Employing Traceability Codes
Performane Study on Multimedia Fingerprinting Employing Traeability Codes Shan He and Min Wu University of Maryland, College Park, U.S.A. Abstrat. Digital fingerprinting is a tool to protet multimedia
More informationt = 0 t = 8 (2 cycles)
A omputation-universal two-dimensional 8-state triangular reversible ellular automaton Katsunobu Imai, Kenihi Morita Faulty of Engineering, Hiroshima University, Higashi-Hiroshima 739-8527, Japan fimai,
More informationFully Joint Diversity Combining, Adaptive Modulation, and Power Control
Fully Joint Diversity Combining, Adaptive Modulation, and Power Control Zied Bouida, Khalid A. Qaraqe, and Mohamed-Slim Alouini Dept. of Eletrial and Computer Eng. Texas A&M University at Qatar Eduation
More informationPower Budgeted Packet Scheduling for Wireless Multimedia
Power Budgeted Paket Sheduling for Wireless Multimedia Praveen Bommannavar Management Siene and Engineering Stanford University Stanford, CA 94305 USA bommanna@stanford.edu Niholas Bambos Eletrial Engineering
More informationAnalysis of a Modified RC4 Algorithm
International Journal of Computer Appliations (0975 8887) Analysis of a Modified RC4 Algorithm T.D.B Weerasinghe MS.Eng, BS.Eng (Hons), MIEEE, AMIE (SL) Software Engineer IFS R&D International, 363, Udugama,
More informationObjectives. Presentation Outline. Digital Modulation Lecture 04
Digital Modulation Leture 04 Filters Digital Modulation Tehniques Rihard Harris Objetives To be able to disuss the purpose of filtering and determine the properties of well known filters. You will be able
More informationInterference mitigation by distributed beam forming optimization
English Interferene mitigation by distributed beam forming optimization Matthias Kashub, Christian M. Blankenhorn, Christian M. Mueller and Thomas Werthmann Abstrat Inter-ell interferene is a major issue
More informationChapter 3 Amplitude Modulation. Wireless Information Transmission System Lab. Institute of Communications Engineering National Sun Yat-sen University
Chapter 3 Amplitude Modulation Wireless Information Transmission System Lab. Institute of Communiations Engineering National Sun Yat-sen University Outline 3.1 Introdution 3.2 Amplitude Modulation 3.3
More informationAn Adaptive Distance-Based Location Update Algorithm for PCS Networks
An Adaptive Distane-Based Loation Update Algorithm for PCS Networks Abstrat - In this paper, we propose a stohasti model to ompute the optimal update boundary for the distane-based loation update algorithm.
More informationREET Energy Conversion. 1 Electric Power System. Electric Power Systems
REET 2020 Energy Conversion 1 Eletri Power System Eletri Power Systems An Eletri Power System is a omplex network of eletrial omponents used to reliably generate, transmit and distribute eletri energy
More informationModule 5 Carrier Modulation. Version 2 ECE IIT, Kharagpur
Module 5 Carrier Modulation Version ECE II, Kharagpur Lesson 5 Quaternary Phase Shift Keying (QPSK) Modulation Version ECE II, Kharagpur After reading this lesson, you will learn about Quaternary Phase
More informationCHAPTER 3 BER EVALUATION OF IEEE COMPLIANT WSN
CHAPTER 3 EVALUATIO OF IEEE 8.5.4 COMPLIAT WS 3. OVERVIEW Appliations of Wireless Sensor etworks (WSs) require long system lifetime, and effiient energy usage ([75], [76], [7]). Moreover, appliations an
More informationConsiderations and Challenges in Real Time Locating Systems Design
Considerations and Challenges in Real Time Loating Systems Design Dr. Brian Gaffney DeaWave Ltd. Email: brian.gaffney@deawave.om Abstrat Real Time Loating Systems (RTLS) are a ombination of hardware and
More informationSerial PN Acquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communication
01 IEEE 14th International Conferene on High Performane Computing and Communiations Serial PN Aquisition Using Smart Antenna and Censored Mean Level CFAR Adaptive Thresholding for a DS/CDMA Mobile Communiation
More informationDesign Modification of Rogowski Coil for Current Measurement in Low Frequency
Design Modifiation of Rogowski Coil for Current Measurement in Low Frequeny M. Rezaee* and H. Heydari* Abstrat: The priniple objet of this paper is to offer a modified design of Rogowski oil based on its
More informationSelection strategies for distributed beamforming optimization
EUROPEAN COOPERATION IN THE FIELD OF SCIENTIFIC AND TECHNICAL RESEARCH COST 2100 TD(10)11036 Ålborg, Denmark 2010/June/02-04 EURO-COST SOURCE: Institute of Communiation Networks and Computer Engineering
More informationEDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES
www.ijrar.om INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 EDGE AND LAPLACE BASED RESTORATION OF HAZY IMAGES 1 Priya Singh Patel, 2 Prof. Manisha Rathore Abstrat:
More informationDigitally Demodulating Binary Phase Shift Keyed Data Signals
Digitally Demodulating Binary Phase Shift Keyed Signals Cornelis J. Kikkert, Craig Blakburn Eletrial and Computer Engineering James Cook University Townsville, Qld, Australia, 4811. E-mail: Keith.Kikkert@ju.edu.au,
More informationMicro-Piezoelectric Head Technology of Color Inkjet Printer
DPP2: International Conferene on Digital Prodution Printing and Industrial Appliations Miro-Piezoeletri Head Tehnology of Color Inkjet Printer Takao Mimura & Shinri Sakai SEIKO EPSON Corporation Shiojiri-shi,
More informationEE (082) Chapter IV: Angle Modulation Lecture 21 Dr. Wajih Abu-Al-Saud
EE 70- (08) Chapter IV: Angle Modulation Leture Dr. Wajih Abu-Al-Saud Effet of Non Linearity on AM and FM signals Sometimes, the modulated signal after transmission gets distorted due to non linearities
More informationMetrol. Meas. Syst., Vol. XVIII (2011), No. 2, pp METROLOGY AND MEASUREMENT SYSTEMS. Index , ISSN
METROLOGY AND MEASUREMENT SYSTEMS Index 330930, ISSN 0860-8229 www.metrology.pg.gda.pl DAC TESTING USING MODULATED SIGNALS Pavel Fexa, Josef Vedral, Jakub Svatoš CTU Prague, Faulty of Eletrial Engineering
More informationDetecting Moving Targets in SAR Via Keystoning and Phase Interferometry
5 The MITRE Corporation. All rights reserved. Approved for Publi Release; Distribution Unlimited. Deteting Moving Targets in SAR Via Keystoning and Phase Interferometry Dr. P. K. Sanyal, Dr. D. M. Zasada,
More informationPerformance of Random Contention PRMA: A Protocol for Fixed Wireless Access
Int. J. Communiations, Network and System Sienes, 2011, 4, 417-423 doi:10.4236/ijns.2011.47049 Published Online July 2011 (http://www.sirp.org/journal/ijns) Performane of Random Contention PRMA: A Protool
More informationLocation Fingerprint Positioning Based on Interval-valued Data FCM Algorithm
Available online at www.sienediret.om Physis Proedia 5 (01 ) 1939 1946 01 International Conferene on Solid State Devies and Materials Siene Loation Fingerprint Positioning Based on Interval-valued Data
More informationOptimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks
Optimal Joint Routing and Sheduling in Millimeter-Wave Cellular Networks Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer and Matthias Hollik SEEMOO, Tehnishe Universität Darmstadt Simula@UiB, Bergen Norway Institute
More informationA Quadrature Downconversion Autocorrelation Receiver Architecture for UWB
A Quadrature Downonversion Autoorrelation Reeiver Arhiteture for UWB Simon Lee, Sumit Bagga, Wouter A. Serdijn Eletronis Researh Laboratory, Faulty of Eletrial Engineering, Mathematis and Computer Siene
More informationGenerating 4-Level and Multitone FSK Using a Quadrature Modulator
Generating 4-Level and Multitone FSK Using a Quadrature Modulator Page 1 of 9 Generating 4-Level and Multitone FSK Using a Quadrature Modulator by In a reent olumn (lik on the Arhives botton at the top
More informationDSP First Lab 05: FM Synthesis for Musical Instruments - Bells and Clarinets
DSP First Lab 05: FM Synthesis for Musial Instruments - Bells and Clarinets Pre-Lab and Warm-Up: You should read at least the Pre-Lab and Warm-up setions of this lab assignment and go over all exerises
More informationLayered Space-Time Codes for Wireless Communications Using Multiple Transmit Antennas
Layered Spae-Time Codes for Wireless Communiations Using Multiple Transmit Antennas Da-shan Shiu and Joseph M. Kahn University of California at Bereley Abstrat Multiple-antenna systems provide very high
More informationSensor Network with Data Transfer over Power Supply Wires
Sensor Network with Data Transfer over Power Supply Wires Vašek V., Dolinay J. and Dostálek P. Abstrat This artile desribes system whih allows reating sensor networks where sensors ommuniate with a entral
More informationSingle Parity Check Turbo Product Codes for the DVB-RCT Standard
Single Parity Chek Turbo Produt Codes for the DVB-RCT Standard Angelo Pinelli Martins Samia National Institute of Teleommuniations - Inatel P.O. Box 05-37540-000 Santa Rita do Sapuaí - MG Brazil angelo.pinelli@inatel.br
More informationMultilevel PWM Waveform Decomposition and Phase-Shifted Carrier Technique
Multilevel PWM Waveform Deomposition and Phase-Shifted Carrier Tehnique R. Naderi* and A. Rahmati* Abstrat: Multilevel PWM waveforms an be deomposed into several multilevel PWM omponents. Phase-shifted
More informationStudy of the Variance in the Histogram Test of ADCs
Study of the Variane in the Histogram Test of ADCs F. Corrêa Alegria and A. Cruz Serra Teleommuniations Institute and Department of Eletrial and Computer Engineering Instituto Superior Ténio, Tehnial University
More informationInterpreting CDMA Mobile Phone Testing Requirements
Appliation Note 54 nterpreting CDMA Mobile Phone Testing Requirements Most people who are not intimately familiar with the protool involved with S-95A & J- STD-008 (CDMA) phones will enounter some onfusion
More informationFreezing Simulates Non-Freezing Tile Automata
Freezing Simulates Non-Freezing Tile Automata ameron halk 1, Austin Luhsinger 2, Eri Martinez 2, Robert Shweller 2, Andrew Winslow 2, and Tim Wylie 2 1 Department of Eletrial and omputer Engineering, University
More informationVirtual Radar Imaging for Sensor Networks
Virtual Radar Imaging for Sensor Networks Bharath Ananthasubramaniam Shool of Eletrial and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93117 bharath@ee.usb.edu Upamanyu
More informationDispersion and Dispersion Slope Compensation of an Optical Delay Line Filter (DLF) based on Mach-Zehnder Interferometers
Dispersion and Dispersion Slope Compensation of an Optial Delay Line Filter (DLF) based on Mah-Zehnder Interferometers P.Pavithra 1, K.Karthika 2 1,2 Department of Eletronis and Communiation Engineering,
More informationA Robust Image Restoration by Using Dark channel Removal Method
Volume 6, Issue 3, Marh 2017, ISSN: 2278 1323 A Robust Image Restoration by Using Dark hannel Removal Method Ankit Jain 1 (MTeh. sholar), Prof. Mahima Jain 2 Department Of Computer Siene And Engineering,
More informationFigure 4.11: Double conversion FM receiver
74 4.8 FM Reeivers FM reeivers, like their AM ounterparts, are superheterodyne reeivers. Figure 4.11 shows a simplified blok diagram for a double onversion superheterodyne FM reeiver Figure 4.11: Double
More informationA Study on The Performance of Multiple-beam Antenna Satellite Receiving System Dezhi Li, Bo Zeng, Qun Wu*
16 nd International Conferene on Mehanial, Eletroni and Information Tehnology Engineering (ICMITE 16) ISBN: 978-1-6595-34-3 A Study on The Performane of Multiple-beam Antenna Satellite Reeiving System
More informationANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS
ANALYSIS OF THE IONOSPHERIC INFLUENCE ON SIGNAL PROPAGATION AND TRACKING OF BINARY OFFSET CARRIER (BOC) SIGNALS FOR GALILEO AND GPS Thomas Pany (1), Bernd Eissfeller (2), Jón Winkel (3) (1) University
More informationConsidering Capacitive Component in the Current of the CSCT Compensator
Proeedings of the World Congress on Engineering and Computer Siene 8 WCECS 8, Otober - 4, 8, San Franiso, SA Considering Capaitive Component in the Current of the CSCT Compensator Mohammad Tavakoli Bina,
More informationTurbo-coded Multi-alphabet Binary CPM for Concatenated Continuous Phase Modulation
no symbol mapping is required, and also the inner ode an be ombined with the CPE in the trellis oded modulation sense [4]. Simulation shows that the use of non-binary outer enoder an give typially.3db
More informationOptimization of Energy Detector Receivers for UWB Systems
) Optimization of Energy Detetor Reeivers for UWB Systems Mustafa E Şahin, İsmail Güvenç, and Hüseyin Arslan Eletrial Engineering Department, University of South Florida 4202 E Fowler Avenue, ENB-118,
More informationWhole Numbers and Introduction to Algebra
CHAPER Should I buy or lease a ar? What are the benefits of eah? Whih hoie fits my needs? Does leasing a ar or buying a ar save me the most money? urn to Putting Your Skills to Work on page 62 to find
More informationDESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR APPLICATION
International Journal of Emerging Tehnologies and Engineering (IJETE) ISSN: 238 8 ICRTIET-21 Conferene Proeeding, 3 th -31 st August 21 11 DESIGN AND PERFORMANCE ANALYSIS OF BAND PASS IIR FILTER FOR SONAR
More informationHierarchical Extreme-Voltage Stress Test of Analog CMOS ICs for Gate-Oxide Reliability Enhancement*
Hierarhial Extreme-Voltage Stress Test of Analog MOS Is for Gate-Oxide Reliability Enhanement* hin-long Wey Department of Eletrial Engineering National entral University hung-li, Taiwan lway@ee.nu.edu.tw
More informationNegative to Positive CFS-244 April 19, 2004
egative to ositive CFS-244 April 19, 2004 www.-f-systems.om ersonal ote This report has a lot of algebra and basi physis of photography in it, but it is not "roket siene." evertheless, it is quite triky
More informationDesign and Performance of a 24 GHz Band FM-CW Radar System and Its Application
Frequeny Design and Performane of a 24 GHz Band FM-CW Radar System and Its Appliation Kazuhiro Yamaguhi, Mitsumasa Saito, Kohei Miyasaka and Hideaki Matsue Tokyo University of Siene, Suwa CQ-S net In.,
More informationEfficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs
Effiient Mehanisms to Provide Convoy Member and Vehile Sequene Authentiation in VANETs Ahren Studer, Mark Luk, Adrian Perrig Eletrial and Computer Engineering Carnegie Mellon University {astuder, mluk,
More informationA comparison of scheduling algorithms in HSDPA
A omparison of sheduling algorithms in HSDPA Stefan M. Sriba and Fambirai Takawira Shool of Eletrial, Eletroni and Computer Engineering, University of KwaZulu-Natal King George V Avenue, Durban, 404, South
More informationCo-Siting Criteria for Wind Turbine Generators and Transmitter Antennas
CONFTELE '99 ISBN 972-98115-0-4 Pro. CONFTELE 1999 - II Conf. de Teleomuniações, Sesimbra, Portugal, 466-470, Abr 1999 1 Co-Siting Criteria for Wind Turbine Generators and Transmitter Antennas Carlos Salema,
More informationVision-based Quality Inspection for Components with Small Diameter and Deep Hole
Vision-based Quality Inspetion for Components with Small Diameter and Deep Hole Shool of Computer and Control Engineering University of Chinese Aademy of Sienes Beijing 100049, China Xinyi Gong, Hu Su,
More informationThank you for your interest in hosting a Divided We Fail House Party!
Thank you for your interest in hosting a Divided We Fail House Party! Although Amerians onsistently rate health and finanial seurity as their top domesti onerns, many of the nation s leaders have given
More informationACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS
ACTIVE VIBRATION CONTROL OF AN INTERMEDIATE MASS: VIBRATION ISOLATION IN SHIPS Xun Li, Ben S. Cazzolato and Colin H. Hansen Shool of Mehanial Engineering, University of Adelaide Adelaide SA 5005, Australia.
More informationA Dual-Threshold ATI-SAR Approach for Detecting Slow Moving Targets
A Dual-Threshold ATI-SAR Approah for Deteting Slow Moving Targets Yuhong Zhang, Ph. D., Stiefvater Consultants Abdelhak Hajjari, Ph. D. Researh Assoiates for Defense Conversion In. Kyungjung Kim, Ph. D.,
More informationAbstract. 1. Introduction. 2. Fading
An Interative Simulation for Flat Fading P.Marihamy*, J.Senthilkumar and V.Vijayarangan ECE Dept., National Engineering College Kovilpatti -68 503, India. * Nizwa College of Tehnology, Sultanate of Oman
More informationAn Acquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Access
6 IEEE Ninth International Symposium on Spread Spetrum Tehniques and Appliations An Aquisition Method Using a Code-Orthogonalizing Filter in UWB-IR Multiple Aess Shin ihi TACHIKAWA Nagaoka University of
More informationLimitations and Capabilities of the Slanted Spectrogram Analysis Tool for SAR-Based Detection of Multiple Vibrating Targets
Limitations and Capabilities of the Slanted Spetrogram Analysis Tool for SAR-Based Detetion of Multiple Vibrating Targets Adebello Jelili, Balu Santhanam, and Majeed Hayat Department of Eletrial and Computer
More informationCHAPTER-8 Spread Spectrum Modulation Introduction: Problem of radio transmission Solution Firstly Secondly
CHAPER-8 Spread Spetrum Modulation Introdution: Initially developed for military appliations during II world war, that was less sensitive to intentional interferene or jamming y third parties. Spread spetrum
More informationReprint from IASTED International Conference on Signal and Image Processing (SIP 99). Nassau, Bahamas, October, 1999.
Reprint from IASTED International Conferene on Signal and Image Proessing (SIP 99). Nassau, Bahamas, Otober, 1999. 1 Filter Networks Mats Andersson Johan Wiklund Hans Knutsson Computer Vision Laboratory,
More informationA 24 GHz Band FM-CW Radar System for Detecting Closed Multiple Targets with Small Displacement
A 24 GHz Band FM-CW Radar System for Deteting Closed Multiple Targets with Small Displaement Kazuhiro Yamaguhi, Mitsumasa Saito, Takuya Akiyama, Tomohiro Kobayashi and Hideaki Matsue Tokyo University of
More information2011 IEEE. Reprinted, with permission, from David Dorrell, Design and comparison of 11 kv multilevel voltage source converters for local grid based
2 IEEE. Reprinted, with permission, from David Dorrell, Design and omparison of k multilevel voltage soure onverters for loal grid based renewable energy systems. IECON 2-37th Annual Conferene on IEEE
More information4.2 Proving and Applying
YOU WILL NEED alulator ruler EXPLORE 4.2 Proving and Applying the Sine and Cosine Laws for Obtuse Triangles An isoseles obtuse triangle has one angle that measures 120 and one side length that is 5 m.
More information28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies
DEVELOPMENT OF SURFACE WAVE DISPERSION AND ATTENUATION MAPS AND IMPROVED METHODS FOR MEASURING SURFACE WAVES Jeffry L. Stevens, Jeffrey W. Given, G. Eli Baker and Heming Xu Siene Appliations International
More informationFIFTY-SIXTH ANNUAL MICHIGAN MATHEMATICS PRIZE COMPETITION
FIFTY-SIXTH ANNUAL MICHIGAN MATHEMATICS PRIZE COMPETITION sponsored by The Mihigan Setion of the Mathematial Assoiation of Ameria Part I Tuesday Otober 2, 202 INSTRUCTIONS (to be read aloud to the students
More informationAverage Current Mode Interleaved PFC Control
Freesale Semiondutor, n. oument Number: AN557 Appliation Note ev. 0, 0/06 Average Current Mode nterleaved PFC Control heory of operation and the Control oops design By: Petr Frgal. ntrodution Power Fator
More informationPerformance of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protocol over Different Fading Channels
http://dx.doi.org/10.5755/j01.eee..1.14116 Performane of Two-Hop DS-CDMA Systems Using Amplify-and-Forward Protool over Different Fading Channels Nuri Kapuu 1 Mehmet Bilim 1 Ibrahim Develi 1 1 Department
More informationAdaptive TDMA/OFDMA for Wide-Area Coverage and Vehicular Velocities
Adaptive TDMA/FDMA for Wide-Area Coverage and Vehiular Veloities Mikael Sternad *, Sorour Falahati *, Tommy Svensson, and Daniel Aronsson * * Signals and Systems, Uppsala University, P Box 8,SE-71 0 Uppsala,
More informationLink-Level Analysis of Downlink Handover Regions in UMTS
Link-Level Analysis of Downlink Handover Regions in UMTS Atta Ul Quddus, Xinjie Yang and Rahim Tafazolli, Member, IEEE Abstrat This paper investigates the downlink handover (soft/softer/hard) performane
More informationAuditory Processing of Speech: The COG Effect. Student Researcher: Daniel E. Hack. Advisor: Dr. Ashok Krishnamurthy
Auditory Proessing of Speeh: The COG Effet Student Researher: Daniel E. Hak Advisor: Dr. Ashok Krishnamurthy The Ohio State University Department of Eletrial and Computer Engineering Abstrat The COG effet
More informationStudy on the Effect of Object to Camera Distance on Polynomial Expansion Coefficients in Barrel Distortion Correction
Study on the Effet of Objet to Camera Distane on Polynomial Expansion Coeffiients in Barrel Distortion Corretion H. Tian, T. Srikanthan, K. Vijayan Asari, S. K. Lam Center for High Performane Embedded
More informationResilience. Being resilient on the other hand, helps a person in many different ways. Such a person:
Resiliene What is Resiliene? Often, people have a wrong idea of what resiliene is. They think resiliene means that you re unaffeted by the problems of life or you go through life always with a smile on
More informationShuli s Math Problem Solving Column
Shuli s Math Problem Solving Column Volume 1, Issue 18 April 16, 009 Edited and Authored by Shuli Song Colorado Springs, Colorado shuli_song@yahooom Content 1 Math Trik: Mental Calulation: 19a19b Math
More informationAn Ontology-based Validation Approach to Resolve Conflicts in Manufacturing Design Process
An Ontology-based Validation Approah to Resolve Conflits in Manufaturing Design Proess Kazunari Hashimoto, Motoyuki Takaai, Yohei Yamane, Seiji Suzuki, Masao Watanabe, and Hiroshi Umemoto Researh and Tehnology
More informationIMAGE RECONSTRUCTION FROM OMNI-DIRECTIONAL CAMERA Kai Guo and Zhuang Li
IMAGE RECONSTRUCTION FROM OMNI-DIRECTIONAL CAMERA Kai Guo and Zhuang Li De 15, 2007 Boston University Department of Eletrial and Computer Engineering Tehnial report No. ECE-2007-06 BOSTON UNIVERSITY IMAGE
More informationMulti-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach
Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoreti Approah Qing Yu, Jiming Chen, Yanfei Fan, Xuemin (Sherman) Shen and Youxian Sun State Key Lab of Industrial Control Tehnology, Zhejiang
More informationRF Link Budget Calculator Manual
RF Link Budget Calulator Manual Author Ivo van Ling for www.vanling.net Software Release RF Link Distane Calulator, Version 1.00, Dated 4 January 2010 Manual Version 1.00 Date 19-01-2010 Page: 1(8) Contents
More informationMorality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks
Morality-driven Data Forwarding with Privay Preservation in Mobile Soial Networks Xiaohui Liang, Student Member, IEEE, Xu Li, Tom. Luan, Rongxing Lu, Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin
More informationSINGLE FREQUENCY NETWORKS IN DIGITAL RADIO Anders Mattsson and John Kean Harris Corp and NPR Labs Mason OH Washington DC
SINGLE FREQUENCY NETWORKS IN DIGITAL RADIO Anders Mattsson and John Kean Harris Corp and NPR Labs Mason OH Washington DC ABSTRACT Not too surprisingly, a Digital Radio Single Frequeny Network (SFN) shares
More informationA Digitally Controlled Oscillator for ADPLL Application. Wu Xiulong, Wang Faniu, Lin Zhiting, and Chen Junning
pplied Mehanis and Materials Online: 22--29 ISSN: 662-7482, Vols. 229-23, pp 55-58 doi:.428/www.sientifi.net/mm.229-23.55 22 Trans Teh ubliations, Switzerland Digitally Controlled Osillator for DLL ppliation
More informationDoppler Collision and cross correlation interference in GPS receivers
International Global Navigation Satellite Systems Soiety IGNSS Symposium 29 Holiday Inn Surfers Paradise, Qld, Australia 1 3 Deember, 29 Doppler Collision and ross orrelation interferene in GPS reeivers
More informationDemonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on Hardware Testbed USA. China USA
2, rue d Artois, F-758 PARIS CIGRE US National Committee http : //www.igre.org 25 Grid of the Future Symposium Demonstration of Measurement Derived Model-Based Adaptive Wide-Area Damping Controller on
More informationDate: August 23,999 Dist'n: T1E1.4
08/0/99 1 T1E1.4/99-49 Projet: T1E1.4: VDSL Title: Filtering elements to meet requirements on power spetral density (99-49) Contat: G. Cherubini, E. Eleftheriou, S. Oeler, IBM Zurih Researh Lab. Saeumerstr.
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This doument is downloaded from DR-NTU Nanyang Tehnologial University Library Singapore. Title Primary-Ambient Extration Using Ambient Spetrum Estimation for Immersive Spatial Audio Reprodution Author(s)
More informationCapacitor Voltage Control in a Cascaded Multilevel Inverter as a Static Var Generator
Capaitor Voltage Control in a Casaded Multilevel Inverter as a Stati Var Generator M. Li,J.N.Chiasson,L.M.Tolbert The University of Tennessee, ECE Department, Knoxville, USA Abstrat The widespread use
More informationConvention Paper Presented at the 124th Convention 2008 May Amsterdam, The Netherlands
Audio Engineering Soiety Convention Paper Presented at the 24th Convention 2008 May 7 20 Amsterdam, The Netherlands The papers at this Convention have been seleted on the basis of a submitted abstrat and
More information5.8 Gb/s 16:1 multiplexer and 1:16 demultiplexer using 1.2 m BiCMOS
Downloaded from orbit.dtu.dk on: Mar 13, 218 5.8 Gb/s 16:1 multiplexer and 1:16 demultiplexer using 1.2 m BiCMOS Midtgaard, Jaob; Svensson, C. Published in: Proeedings of the IEEE International Symposium
More informationA Distributed OFDMA Medium Access Control for Underwater Acoustic Sensors Networks
This full text paper was peer reviewed at the diretion of IEEE Communiations Soiety subjet matter experts for publiation in the IEEE ICC 2011 proeedings A Distributed OFDMA Medium Aess Control for Underwater
More informationParameters of the radio channels that affect digital signal transmissions Propagation Environment Attenuation Index, γ
Parameters of the radio hannels that affet digital signal transmissions 1.Free spae attenuation - the signal undergoes an average attenuation that depends on the length of the path and signal s frequeny
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EXTENDING THE UNAMBIGUOUS RANGE OF CW POLYPHASE RADAR SYSTEMS USING NUMBER THEORETIC TRANSFORMS by Nattaphum Paepolshiri September 11 Thesis Co-Advisors:
More informationRadiocommunication and Broadcasting Antenna Systems
Issue 5 Released: June 26, 2014 Effetive: July 15, 2014 Spetrum Management and Teleommuniations Client Proedures Cirular Radioommuniation and Broadasting Antenna Systems Aussi disponible en français Comments
More informationNotes on Dielectric Characterization in Waveguide
Notes on Dieletri Charaterization in Waveguide R.Nesti, V. Natale IRA-INAF Aretri Astrophysial Observatory 1. Theory Let's suppose we have to haraterize the eletromagneti properties of a dieletri material,
More informationTime Reversal Synthetic Aperture Radar Imaging In Multipath
Time Reversal Syntheti Aperture Radar Imaging In Multipath Yuanwei Jin, José M.F. Moura, and Niholas O Donoughue Eletrial and Computer Engineering Carnegie Mellon University Pittsburgh, PA 1513 Mihael
More information