On an algorithm for classification of binary self-dual codes with minimum distance four
|
|
|
- Hubert Allen
- 10 years ago
- Views:
Transcription
1 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp On an algorithm for classification of binary self-dual codes with minimum distance four Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgarian Academy of Sciences P.O.Box 323, 5000 Veliko Tarnovo, Bulgaria Maria Dzhumalieva-Stoeva Institute of Mathematics and Informatics, Bulgarian Academy of Sciences P.O.Box 323, 5000 Veliko Tarnovo, Bulgaria Abstract. An efficient algorithm for classification of binary self-dual codes with minimum distance four is presented. 1 Introduction The classification of all self-dual codes for a given length is a quite interesting and challenging problem in coding theory. The main methods for classification have two parts - construction and test for equivalence. A detailed bibliography is presented in [7] and [4]. The number of the inequivalent codes grows very fast with respect to the length. After the classification of all binary self-dual codes of length 36 by Harada and Munemasa [6], the problem seemed to be infeasible for the larger lengths. The development of a new approach using an isomorph free generation gave the possibility to classify the codes of length 38 and even more [4]. Now we work on the classification of binary self-dual codes of length 40 (see also [1] and [5]). We consider two subproblems - classification of the codes with minimum distance 6, and classification of all self-dual [40, 20, 4] codes (for other lengths see [2] and [3]). More than 70 percent of all inequivalent selfdual codes of length n for n = 36 and 38 have minimum distance four. That s why the classification of all self-dual [40, 20, 4] codes separately will decrease drastically the complexity of the full classification. In this paper we present an algorithm for isomorph free generation [9] of binary self-dual codes with minimum distance 4 using the self-dual codes of length 36. This algorithm is similar to the recursive algorithm presented in [4] but it has a few essential differences. Throughout this paper all codes are assumed to be binary. Two binary codes are called equivalent if one can be obtained from the other by a permutation of coordinates. The permutation σ S n is an automorphism of C, if C = σ(c) and the set of all automorphisms of C forms a group called the automorphism group of C, which is denoted by Aut(C) in this paper. If C has length n, then the number of codes equivalent to C is n!/ Aut(C).
2 106 ACCT Theoretical base of the algorithm Let C be a linear [n, k] code and T be a coordinate set of size t. Consider the set C(T ) of codewords whose i-th coordinate is 0 if i T. C(T ) is a subcode of C. Shortening C(T ) on T gives a code of length n t called shortened code of C on T. We can puncture C by deleting the same coordinate i in each codeword. The resulting code is still linear, its length is n 1, if d > 1 its dimension is k, and its minimum weight is d or d 1. In general a code C can be punctured on a coordinate set T of size t. We denote the resulting code by C T. The connection between shortened and punctured codes is described in details in [8]. We with a proposition about a punctured code of a self-dual code with minimum weight d 4. Proposition 1. Let C be a binary self-dual [n, k = n/2, d 4], and C 0 = {x = (x 1,..., x n ) C, x n 1 = x n }. If C 1 is the punctured code of C 0 on the coordinate set T = {n 1, n} then C 1 is a self-dual [n 2, k 1, d 1 d 2] code. Let G 1 and G 0 = (G 1 a T a T ) be generator matrices of the codes C 1 and C 0, respectively. Consider the elements of the automorphism group Aut(C 1 ) as permutation matrices of order n 2. To any permutation matrix P Aut(C 1 ) we can correspond an invertible matrix A P GL(k 1, 2) such that G 1 = G 1 P = A P G 1, since G 1 is another generator matrix of C 1. In this way we obtain a homomorphism f : Aut(C 1 ) GL(k 1, 2). The following theorem was proven in [4] and partly in [6]. Theorem 1. The matrices (G 1 a T a T ) and (G 1 b T b T ) generate equivalent codes if and only if the vectors a and b belong to the same orbit under the action of Im(f) on F k 1 2. Now consider the codes with minimum distance 4. Proposition 2. Let C be a binary self-dual [n, k = n/2, 4] code and T = {i 1, i 2, i 3, i 4 } be the support of a codeword of weight 4. If C 0 is the shortened code of C on the set T 1 = {i 1, i 2 } then the punctured code C 1 = C0 T 2 of C 0 on the set T 2 = {i 3, i 4 } is a self-dual [n 4, n/2 2, 2] code. Proof. Let u, v C 1. Without loss of generality we can suppose that x = ( ) C is a codeword of weight 4, T 1 = {1, 2} and T 2 = {n 1, n}. Then (00, u, α 1, α 2 ), (00, v, β 1, β 2 ) C for some α 1, α 2, β 1, β 2 F 2. Since C is a self-dual code, we have x (00, u, α 1, α 2 ) = x (00, v, β 1, β 2 ) = 0 and therefore α 1 = α 2 = α and β 1 = β 2 = β. Moreover (00, u, α, α) (00, v, β, β) = 0 u v = 0. It follows that C 1 is a self-orthogonal code. As its dimension is the half of its length, this code is self-dual.
3 Bouyukliev, Dzhumalieva-Stoeva 107 Corollary 1. Let C be a binary self-dual [n, k = n/2, 4] code and x = ( ) be a codeword of weight 4. Then C has a generator matrix in the form G = v I k 2 A a T a T where a and v are binary vectors of length k 2. The matrix (I k 2 A) generates a self-dual [n 4, n/2 2] code. Proof. Let G = (I k 2 A) be a generator matrix of the code C 1 defined in Proposition 2. According to the proof of the above proposition, the self-orthogonal code C 0 has a generator matrix in the form G 0 = (I k 2 A a T a T ) for a vector a F k 2 2. Then we can take a generator matrix of C in the form x y α β 00 I k 2 A a T a T v I k 2 A a T a T Let us consider the automorphism group Aut(C 1 ) of the self-dual [n 4, n/2 2] code C 1 from Corollary 1, and let G 1 be a generator matrix of this code. According to Theorem 1, if the vectors a and b from F k 2 2 belong to the same orbit under the action of Im(f) on F k 2 2, then the matrices (G 1 a T a T ) and (G 1 b T b T ) generate equivalent codes. If P Aut(C 1 ), x = (0, v) and y = xp then G = I P I 2 = 01 xp G 1 P a T a T ( I2 0 = 0 A P 01 x G 1 a T a T = ) I P I 2 01 xp A P G 1 A P b T A P b T 01 y G 1 b T b T Hence the code C is equivalent to the code generated by the matrix G = 01 y G 1 b T b T
4 108 ACCT Description of the algorithm We use the concept for a canonical representative and a canonical representative map as this is defined in [4]. The symmetric group S n partitions the set of all self-dual codes of length n into orbits (or equivalence classes). The canonical representative map defines one special code in any equivalence class called the canonical representative of this class. We denote the set of all canonical permutations of C by L(C). It is easy to see that L(C) is a coset of the automorphism group Aut(C) in the symmetric group S n. Let B be a self-dual [2k 4, k 2] code and B be a [2k, k, 4] code obtained from B by the above construction. Let x be the vector of weight 4 in the canonical representative of B which is lexicographically first within the set of codewords of weight 4, and let (i 1, i 2, i 3, i 4 ) be its support, 1 i 1 < i 2 < i 3 < i 4 n. We say that B passes the parent test if there is a permutation τ L(B) such that {τ(1), τ(2)} = {i 1, i 2 } or {i 3, i 4 }. Lemma 1. If B 1 and B 2 are two equivalent self-dual [2k, k, 4] codes which pass the parent test, then the self-dual [2k 4, k 2] codes B 1 and B 2 are also equivalent. Proof. Since B 1 and B 2 are equivalent, they have the same canonical representative B. Then there are permutations τ 1 L(B 1 ) and τ 2 L(B 2 ) such that {τ 1 (1), τ 1 (2)} = {i 1, i 2 } or {i 3, i 4 }, {τ 2 (1), τ 2 (2)} = {i 1, i 2 } or {i 3, i 4 }, where (i 1, i 2, i 3, i 4 ) is the support of the weight 4 codeword x B which is lexicographically first within the set of codewords of weight 4. For the permutation τ2 1 τ 1 : B 1 B 2 we have {τ2 1 τ 1(1), τ2 1 τ 1(2)} = {1, 2} or {n 1, n}, and 3 τ2 1 τ 1(i) n 2 for 3 i n 2. Hence the restriction of τ2 1 τ 1(1) on the positions 3, 4,..., n 2 maps B 1 to B 2 and so these two codes are equivalent. Theorem 2. If the set U s consists of all inequivalent binary self-dual [2s, s] codes, then the set V s+2 obtained by the algorithm presented in Table 1 consists of all inequivalent self-dual [2s + 4, s + 2, 4] codes, s 1. Proof. We must show that the set V s+2 filled out in Procedure Augmentation, consists only of inequivalent codes, and any binary self-dual [2s + 4, s + 2, 4] code is equivalent to a code in the set V s+2. Obviously, any self-dual [2s+4, s+2, 4] code is equivalent to a code obtained by the above construction. Suppose that the codes B 1, B 2 V s+2 are equivalent. Since these two codes have passed the parent test, the codes B 1 and B 2 are also equivalent according to Lemma 1. But the set U s consists only in inequivalent codes. We have a contradiction here and therefore the codes B 1, B 2 V s+2 cannot be equivalent. It follows that V s+2 consists of inequivalent codes. Take now a binary self-dual [n = 2s + 4, s + 2, 4] code C with a canonical representative B. Let x B be the vector of weight 4 which is lexicographically first within the set of codewords of weight 4, and let (i 1, i 2, i 3, i 4 ) be its support,
5 Bouyukliev, Dzhumalieva-Stoeva i 1 < i 2 < i 3 < i 4 n. Consider the permutation σ S n defined by σ(i 1 ) = 1, σ(i 2 ) = 2, σ(i 3 ) = n 1, σ(i 4 ) = n, σ(j) = j for j = 3,..., n 2. Obviously, the code σ(b) is a self-dual [n = 2s + 4, s + 2, 4], equivalent to C, which can be obtained by the above construction and which passes the parent test. There is a code D U s equivalent to the code obtained from σ(b) by Proposition 2. Hence B is equivalent to C and B passes the parent test. Since U s consists of all inequivalent self-dual codes of dimension s, the parent of B is equivalent to a code A U s. According to Lemma 1, there is a child type code B A of A, equivalent to B, such that B A passes the parent test. Since the codes B and B A are equivalent, so are the codes C and B A. In this way we find a code in V s+2 which is equivalent to C. Table 1: The main algorithm Procedure Augmentation(A: binary self-dual code); Find the set Child(A) of all inequivalent child type codes of A with d = 4; (using already known Aut(A)) For all codes B from the set Child(A) do the following: if B passes the parent test then V s+2 := V s+2 B; PRINT(B, Aut(B)); end; end; Procedure Main; Input: U s nonempty set of binary self-dual [2s, s] codes; Output: V s+2 set of [2s + 4, s + 2, 4] binary self-dual codes; V s+2 := ; for all codes A from U s do the following: find the automorphism group of A; Augmentation(A); end; end.
6 110 ACCT2012 Acknowledgments. The authors would like to thank Prof. Stefka Bouyuklieva for her help, useful discussions and valuable advices. References [1] K. Betsumiya, M. Harada and A. Munemasa, A complete classification of doubly even self-dual codes of length 40, preprint, [arxiv: ]. [2] R.T. Bilous, Enumeration of the binary self-dual codes of length 34, J.Combin. Math. Combin. Comput. 59 (2006), [3] R.T. Bilous, G.H.J. Van Rees, An enumeration of binary self-dual codes of length 32, Designs, Codes and Cryptography, 26 (2002), [4] S. Bouyuklieva and I. Bouyukliev, An algorithm for classification of binary self-dual codes, IEEE Trans. Inform. Theory, (to appear), arxiv: [5] S. Bouyuklieva, I. Bouyukliev and M. Harada, Some extremal self-dual codes and unimodular lattices in dimension 40, preprint, [arxiv: ]. [6] M. Harada and A. Munemasa, Classification of self-dual codes of length 36, Adv. Math. Commun. (to appear), [arxiv: ]. [7] W.C.Huffman, On the Classification and enumeration of self-dual codes, Finite Fields Appl. 11 (2005), [8] W. C. Huffman, V. Pless, Fundamentals of error-correcting codes, Cambridge Univ. Press, [9] B. D. McKay, Isomorph-free exhaustive generation, J. Algorithms 26 (1998),
Two classes of ternary codes and their weight distributions
Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight
University of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
About the inverse football pool problem for 9 games 1
Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute
The four [10,5,4] binary codes
1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the
ENUMERATION OF INTEGRAL TETRAHEDRA
ENUMERATION OF INTEGRAL TETRAHEDRA SASCHA KURZ Abstract. We determine the numbers of integral tetrahedra with diameter d up to isomorphism for all d 1000 via computer enumeration. Therefore we give an
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS
FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS Abstract. It is shown that, for any field F R, any ordered vector space structure
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
Group Theory. Contents
Group Theory Contents Chapter 1: Review... 2 Chapter 2: Permutation Groups and Group Actions... 3 Orbits and Transitivity... 6 Specific Actions The Right regular and coset actions... 8 The Conjugation
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)
Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p
Chapter 1. Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes
Chapter 1 Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics, Kenyon College Gambier, OH, USA 43022 {aydinn,asamovt}@kenyon.edu
ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath
International Electronic Journal of Algebra Volume 7 (2010) 140-151 ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP A. K. Das and R. K. Nath Received: 12 October 2009; Revised: 15 December
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS IGOR V. EROVENKO AND B. SURY ABSTRACT. We compute commutativity degrees of wreath products A B of finite abelian groups A and B. When B
Finite dimensional C -algebras
Finite dimensional C -algebras S. Sundar September 14, 2012 Throughout H, K stand for finite dimensional Hilbert spaces. 1 Spectral theorem for self-adjoint opertors Let A B(H) and let {ξ 1, ξ 2,, ξ n
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S.
Definition 51 Let S be a set bijection f : S S 5 Permutation groups A permutation of S is simply a Lemma 52 Let S be a set (1) Let f and g be two permutations of S Then the composition of f and g is a
α = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS
ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS John A. Beachy Northern Illinois University 2014 ii J.A.Beachy This is a supplement to Abstract Algebra, Third Edition by John A. Beachy and William D. Blair
24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
Split Nonthreshold Laplacian Integral Graphs
Split Nonthreshold Laplacian Integral Graphs Stephen Kirkland University of Regina, Canada [email protected] Maria Aguieiras Alvarez de Freitas Federal University of Rio de Janeiro, Brazil [email protected]
GENERATING SETS KEITH CONRAD
GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors
Row Ideals and Fibers of Morphisms
Michigan Math. J. 57 (2008) Row Ideals and Fibers of Morphisms David Eisenbud & Bernd Ulrich Affectionately dedicated to Mel Hochster, who has been an inspiration to us for many years, on the occasion
Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE
7618 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 11, NOVEMBER 2011 Several Classes of Codes Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, Tor Helleseth,
5. Linear algebra I: dimension
5. Linear algebra I: dimension 5.1 Some simple results 5.2 Bases and dimension 5.3 Homomorphisms and dimension 1. Some simple results Several observations should be made. Once stated explicitly, the proofs
SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov
Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices
Separation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Suk-Geun Hwang and Jin-Woo Park
Bull. Korean Math. Soc. 43 (2006), No. 3, pp. 471 478 A NOTE ON PARTIAL SIGN-SOLVABILITY Suk-Geun Hwang and Jin-Woo Park Abstract. In this paper we prove that if Ax = b is a partial signsolvable linear
4: EIGENVALUES, EIGENVECTORS, DIAGONALIZATION
4: EIGENVALUES, EIGENVECTORS, DIAGONALIZATION STEVEN HEILMAN Contents 1. Review 1 2. Diagonal Matrices 1 3. Eigenvectors and Eigenvalues 2 4. Characteristic Polynomial 4 5. Diagonalizability 6 6. Appendix:
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)
MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of
T ( a i x i ) = a i T (x i ).
Chapter 2 Defn 1. (p. 65) Let V and W be vector spaces (over F ). We call a function T : V W a linear transformation form V to W if, for all x, y V and c F, we have (a) T (x + y) = T (x) + T (y) and (b)
Continuity of the Perron Root
Linear and Multilinear Algebra http://dx.doi.org/10.1080/03081087.2014.934233 ArXiv: 1407.7564 (http://arxiv.org/abs/1407.7564) Continuity of the Perron Root Carl D. Meyer Department of Mathematics, North
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Integer Sequences and Matrices Over Finite Fields
Integer Sequences and Matrices Over Finite Fields arxiv:math/0606056v [mathco] 2 Jun 2006 Kent E Morrison Department of Mathematics California Polytechnic State University San Luis Obispo, CA 93407 kmorriso@calpolyedu
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Similarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
ON THE COEFFICIENTS OF THE LINKING POLYNOMIAL
ADSS, Volume 3, Number 3, 2013, Pages 45-56 2013 Aditi International ON THE COEFFICIENTS OF THE LINKING POLYNOMIAL KOKO KALAMBAY KAYIBI Abstract Let i j T( M; = tijx y be the Tutte polynomial of the matroid
ON SUPERCYCLICITY CRITERIA. Nuha H. Hamada Business Administration College Al Ain University of Science and Technology 5-th st, Abu Dhabi, 112612, UAE
International Journal of Pure and Applied Mathematics Volume 101 No. 3 2015, 401-405 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v101i3.7
Classification of Cartan matrices
Chapter 7 Classification of Cartan matrices In this chapter we describe a classification of generalised Cartan matrices This classification can be compared as the rough classification of varieties in terms
Transportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
Binary Codes and Caps
Binary Codes and Caps Aiden A. Bruen, 1 Lucien Haddad, 2 David L. Wehlau 3 1 Dept. of Mathematics, University of Western Ontario, London, Ontario, Canada N6A 3K7 2 Dept. of Mathematics and Computer Science,
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column
Chapter 7: Products and quotients
Chapter 7: Products and quotients Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 42, Spring 24 M. Macauley (Clemson) Chapter 7: Products
FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES
FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES CHRISTOPHER HEIL 1. Cosets and the Quotient Space Any vector space is an abelian group under the operation of vector addition. So, if you are have studied
Codes for Network Switches
Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics
Degree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
Minimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
Duality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
MATROIDS AND MYSQL WHAT TO DO
WHAT TO DO WITH BIG DATA SETS? Gordon Royle School of Mathematics & Statistics University of Western Australia La Vacquerie-et-Saint-Martin-de-Castries AUSTRALIA PERTH 37ACCMCC 37TH AUSTRALASIAN CONFERENCE
4. Expanding dynamical systems
4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,
Math 333 - Practice Exam 2 with Some Solutions
Math 333 - Practice Exam 2 with Some Solutions (Note that the exam will NOT be this long) Definitions (0 points) Let T : V W be a transformation Let A be a square matrix (a) Define T is linear (b) Define
Fuzzy Differential Systems and the New Concept of Stability
Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
GROUPS ACTING ON A SET
GROUPS ACTING ON A SET MATH 435 SPRING 2012 NOTES FROM FEBRUARY 27TH, 2012 1. Left group actions Definition 1.1. Suppose that G is a group and S is a set. A left (group) action of G on S is a rule for
1 A duality between descents and connectivity.
The Descent Set and Connectivity Set of a Permutation 1 Richard P. Stanley 2 Department of Mathematics, Massachusetts Institute of Technology Cambridge, MA 02139, USA [email protected] version of 16 August
Representing Reversible Cellular Automata with Reversible Block Cellular Automata
Discrete Mathematics and Theoretical Computer Science Proceedings AA (DM-CCG), 2001, 145 154 Representing Reversible Cellular Automata with Reversible Block Cellular Automata Jérôme Durand-Lose Laboratoire
Invertible elements in associates and semigroups. 1
Quasigroups and Related Systems 5 (1998), 53 68 Invertible elements in associates and semigroups. 1 Fedir Sokhatsky Abstract Some invertibility criteria of an element in associates, in particular in n-ary
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
Abstract Algebra Theory and Applications. Thomas W. Judson Stephen F. Austin State University
Abstract Algebra Theory and Applications Thomas W. Judson Stephen F. Austin State University August 16, 2013 ii Copyright 1997-2013 by Thomas W. Judson. Permission is granted to copy, distribute and/or
G = G 0 > G 1 > > G k = {e}
Proposition 49. 1. A group G is nilpotent if and only if G appears as an element of its upper central series. 2. If G is nilpotent, then the upper central series and the lower central series have the same
it is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
Linear Authentication Codes: Bounds and Constructions
866 IEEE TRANSACTIONS ON INFORMATION TNEORY, VOL 49, NO 4, APRIL 2003 Linear Authentication Codes: Bounds and Constructions Huaxiong Wang, Chaoping Xing, and Rei Safavi-Naini Abstract In this paper, we
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
GREATEST COMMON DIVISOR
DEFINITION: GREATEST COMMON DIVISOR The greatest common divisor (gcd) of a and b, denoted by (a, b), is the largest common divisor of integers a and b. THEOREM: If a and b are nonzero integers, then their
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set.
MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. Vector space A vector space is a set V equipped with two operations, addition V V (x,y) x + y V and scalar
Section 6.1 - Inner Products and Norms
Section 6.1 - Inner Products and Norms Definition. Let V be a vector space over F {R, C}. An inner product on V is a function that assigns, to every ordered pair of vectors x and y in V, a scalar in F,
minimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
On Quantum Hamming Bound
On Quantum Hamming Bound Salah A. Aly Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA Email: [email protected] We prove quantum Hamming bound for stabilizer codes
1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain
Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is
The chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
Introduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
A note on companion matrices
Linear Algebra and its Applications 372 (2003) 325 33 www.elsevier.com/locate/laa A note on companion matrices Miroslav Fiedler Academy of Sciences of the Czech Republic Institute of Computer Science Pod
CODING THEORY a first course. Henk C.A. van Tilborg
CODING THEORY a first course Henk C.A. van Tilborg Contents Contents Preface i iv 1 A communication system 1 1.1 Introduction 1 1.2 The channel 1 1.3 Shannon theory and codes 3 1.4 Problems 7 2 Linear
fg = f g. 3.1.1. Ideals. An ideal of R is a nonempty k-subspace I R closed under multiplication by elements of R:
30 3. RINGS, IDEALS, AND GRÖBNER BASES 3.1. Polynomial rings and ideals The main object of study in this section is a polynomial ring in a finite number of variables R = k[x 1,..., x n ], where k is an
