The Common Information for N Dependent Random Variables

Size: px
Start display at page:

Download "The Common Information for N Dependent Random Variables"

Transcription

1 Syracuse Uiversity SURFACE Electrical Egieerig ad Computer Sciece Techical Reports College of Egieerig ad Computer Sciece The Commo Iformatio for N Depedet Radom Variables Wei Liu Syracuse Uiversity Ge Xu Syracuse Uiversity Follow this ad additioal works at: Part of the Computer Scieces Commos Recommeded Citatio Liu, Wei ad Xu, Ge, "The Commo Iformatio for N Depedet Radom Variables" (20). Electrical Egieerig ad Computer Sciece Techical Reports. Paper This Report is brought to you for free ad ope access by the College of Egieerig ad Computer Sciece at SURFACE. It has bee accepted for iclusio i Electrical Egieerig ad Computer Sciece Techical Reports by a authorized admiistrator of SURFACE. For more iformatio, please cotact surface@syr.edu.

2 SYR-EECS April, 20 The Commo Iformatio for N Depedet Radom Variables Wei Liu Ge Xu Biao Che wliu28@syr.edu gexu@syr.edu biche@syr.edu ABSTRACT: This paper geeralizes Wyer s defiitio of commo iformatio of a pair or radom variables to that of N radom variables. We prove codig theorems that show the same operatioal meaigs for the commo iformatio of two radom variables geeralize to that of N radom variables. As a byproduct of our proof, we show that the Gray-Wyer source codig etwork ca be geeralized to N source sequeces with N decoders. We also establish a mootoe property of Wyer s commo iformatio which is i cotrast to other otios of the commo iformatio, specifically Shao s mutual iformatio ad Gács ad Körer s commo radomess. Examples about the computatio of Wyer s commo iformatio of N radom variables are also give. KEYWORDS: Wyer's commo iformatio, Gray-Wyer source codig etwork, distributio approximatio, circularly symmetric biary source Syracuse Uiversity - Departmet of EECS, CST, Syracuse, NY 3244 (P) (F)

3 The Commo Iformatio of N Depedet Radom Variables Wei Liu Departmet of EECS Syracuse Uiversity wliu28@syr.edu Ge Xu Departmet of EECS Syracuse Uiversity gexu@syr.edu Biao Che Departmet of EECS Syracuse Uiversity biche@syr.edu Abstract This paper geeralizes Wyer s defiitio of commo iformatio of a pair of radom variables to that of N radom variables. We prove codig theorems that show the same operatioal meaigs for the commo iformatio of two radom variables geeralize to that of N radom variables. As a byproduct of our proof, we show that the Gray-Wyer source codig etwork ca be geeralized to N source squeces with N decoders. We also establish a mootoe property of Wyer s commo iformatio which is i cotrast to other otios of the commo iformatio, specifically Shao s mutual iformatio ad Gács ad Körer s commo radomess. Examples about the computatio of Wyer s commo iformatio of N radom variables are also give. I. INTRODUCTION Cosider a pair of depedet radom variables X ad Y with joit distributio P(x, y). Characterizig the commo iformatio betwee X ad Y has bee a topic of research iterest i the past decades [] [5]. There have bee three classical otios reported i the literature. Shao s [6] mutual iformatio I(X; Y ) Shao s mutual iformatio measures how much ucertaity ca be reduced with respect to oe radom variable by observatio the other radom variable. I the case that X ad Y are idepedet, mutual iformatio I(X; Y ) = 0, idicatig that observig oe variable X does ot give ay iformatio about Y ad vice versa. Shao s mutual iformatio carries operatioal meaigs that are istrumetal i layig the foudatio for iformatio theory. Gács ad Körer s [] commo radomess K(X, Y ) Cosider a pair of idepedet ad idetically distributed radom sequeces X, Y with each pair (X i, Y i ) P(x, y). These two sequeces are observed respectively by two odes, which attempt to map the sequeces oto a commo message set W. Specifically, let f ad g be such mappigs, i.e., f : X W, g : Y W. Defie ǫ = Pr(W W 2 ) where W = f (X ) ad W 2 = g (Y ). Gács ad Körer s commo radomess is defied as K(X, Y ) = lim sup,ǫ 0 H(W ). Gács ad Körer s commo radomess has foud extesive applicatios i cryptography, i.e., for key geeratio [7] [9]. O the other had, the commo radomess otio is rather restrictive as it equals 0 i most cases except for the followig special case (or radom variable pairs that ca be coverted to such distributios through relabelig of realizatios, i.e., permutatio of joit distributio matrix). Let X ad Y be X = (X, V ) ad Y = (Y, V ), respectively, where X, Y, V are idepedet. Clearly, the commo part betwee X ad Y is V ad it follows that K(X; Y ) = H(V ). Note that for this example I(X; Y ) = K(X; Y ) = H(V ). Wyer s [4] commo iformatio C(X, Y ) Wyer s commo iformatio is defied as C(X, Y ) = mi I(XY ; W). () X W Y Thus the hidde (or auxiliary) variable W iduces a Markov chai X W Y, or, equivaletly, a coditioal idepedece structure of X, Y beig idepedet give W. Wyer gave two operatioal meaigs for the above defiitio. The first approach is show i Fig.. The ecoder observes a pair of sequeces (X, Y ), ad map them to three messages W 0, W, W 2, takig values i alphabets of respective sizes 2 R0, 2 R, 2 R2. Decoder, upo receivig (W 0, W ), eeds to reproduce X reliably while decoder 2, upo receivig (W 0, W 2 ), eeds to reproduce Y reliably. Let C be the ifimum of all admissible R 0 for the system i Fig. such that the total rate R 0 + R + R 2 H(X, Y ). The secod approach is show i Fig. 2. A commo iput W, uiformly distributed o W = {,, 2 R0 } is give to two separate processors which are otherwise idepedet of each other. These processors (radom variable geerators) geeratig idepedet ad idetically distributed sequeces accordig to q (X W) ad q 2 (Y W) respectively. The output sequeces of the two processors are deoted by X ad Ỹ respectively. Thus the joit distributio of the output sequeces is, Q( X, Ỹ ) = w W W q (X W)q 2 (Y W). (2) Defie C 2 of (X, Y ) to be ifimum of rate R 0 for the commo iput such that q( X, Ỹ ) close to p(x, Y ), where the closeess is defied usig the average divergece of the two distributios D (P, Q) = P(x, y )log P(x, y ) Q(x, y ). (3) x X,y Y Wyer proved that It was observed i [4] that C = C 2 = C(X, Y ). (4) K(X, Y ) I(X; Y ) C(X, Y ). (5)

4 X, Y Ecoder W W 0 W 2 Decoder Decoder 2 ˆX Ŷ commo iformatio is to defie a similar measure for N radom variables by preservig the coditioal idepedece structure through the itroductio of a auxiliary radom variable. Specifically, we defie C(X, X 2,, X N ) if I(X, X 2,, X N ; W), (6) W Fig.. Fig. 2. Source codig over a simple etwork. Processor Processor 2 Radom variable geerators. X Ỹ Wyer [4] ad Witsehause [5] also provide several examples o how to calculate the commo iformatio C(X, Y ). For the example of X = (X, V ) ad Y = (Y, V ) with (X, Y, V ) mutually idepedet, C(X, Y ) = I(X; Y ) = K(X, Y ) = H(V ). Geeralizig of mutual iformatio to N radom variables was first reported i [0]. The geeralizatio comes from the observatio that for a pair of radom variables, Shao s iformatio measures is cosistet with the Ve diagram for set operatio ad a comprehesive treatmet was available i [], [2]. Gács ad Körer s commo radomess was recetly geeralized to multiple radom variables by Tyagi, Naraya ad Gupta i [3], which exteds the ecodig process i the defiitio of commo radomess to that of N termials. I this paper, we geeralize Wyer s commo iformatio of a pair of radom variables to that of N depedet variables. We show that the operatioal meaig defied i both approaches are still valid. Moreover, we establish some mootoe property of such geeralizatio which cotrast to the otio of commo iformatio. Specifically, we show that the commo iformatio does ot decrease as the umber of variables icreases while keepig the same margial distributio. This is differet from the other two otios of commo iformatio. Examples o evaluatig C(X, X 2,, X N ) are give for circularly symmetric biary sources ad the asymptotic results are also studied. The rest of this paper is orgaized as follows. Sectio II gives the problem formulatio ad mai results. Sectio III gives some examples ad discussios. Sectio IV cocludes the paper. II. PROBLEM STATEMENT AND MAIN RESULTS Let X, X 2,, X N be radom variables that take values o the fiite alphabet sets X, X 2,, X N with joit distributio P(x, x 2,, x N ). Our geeralizatio of Wyer s where the ifimum is take over all the joit distributios of (X, X 2,, X N, W) such that P(x, x 2,, x, w) = P(x, x 2,, x N ), (7) w P(x,..., x w) = P(x i w). (8) Thus the margial distributio of (X, X 2,, X N ) is P(x, x 2,, x N ) ad (X,, X N ) are coditioally idepedet give W. We ow give formal defiitios of C ad C 2 for N radom variables. Cosider N legth- idepedet ad idetically distributed source sequeces (x,x 2,, x N ) with (X i, X 2i,, X Ni ) p(x, x 2,, x N ), i.e., P () (x,x 2,, x N) = P(x i, x 2i,, x Ni ). (9) For the Gray-Wyer source codig etwork, we start with the defiitio of ecoder-decoders. Defiitio : A (, M 0, M,, M N ) code cosists of the followig: A ecoder mappig f : X X 2 X N M 0 M M N, where M i = {, 2,, 2 Ri }. N decoders g i, for i =, 2,, N, g i : M i M 0 X i. (0) The probability of error is defied as P () e = Pr{( ˆX ˆX 2 ˆX N) (X, X 2,, X N)}, () where ˆX i = g i (M i, M 0 ) for i =,, N. Defiitio 2: A umber R 0 is said to be achievable if for ay ǫ > 0, we ca fid a sufficietly large such that there exists a (, M 0, M,, M N ) code with M 0 2 R0 (2) P e () ǫ, (3) log M i H(X, X 2,, X N ) + ǫ. (4) i=0 As with the case for two radom variables, C is defied as the ifimum of all achievable R 0. For the secod approach of approximatig joit distributio, we agai start with the followig defiitio. Defiitio 3: A (, M, ) geerator cosists of the followig: a message set W {, 2,, 2 R };

5 for all w W ad N coditioal probability distributios q () i (x i w), for i =, 2,, N, defie the probability distributio o X X 2 X N M Q () (X, X2,, XN) = w W (5) Thus the N processors serve as radom umber geerators each geeratig idepedet ad idetically distributed (i.i.d.) sequece ˆX i accordig to q(x i w) ad the output of the processors follow joit distributio defied i (9). Let N q () i (x i w). = D (P () ; Q () ) = P () log P () Q, () x i X i,,2,,n (6) where P () ad Q () are defied as i (9) ad (5) respectively. Defiitio 4: A umber R is said to be achievable if for all ǫ > 0, we ca fid a sufficietly large such that there exists a (, M, ) geerator with M 2 R ad ǫ. We defie C 2 as the ifimum of all achievable R. The mai result of this paper is the followig theorm. Theorem : C = C 2 = C(X, X 2,, X N ). (7) The proof of Theorem is give i the Appedix. Thus both C ad C 2 admit sigle letter characterizatio which coicides with C(X,, X N ). III. EXAMPLES AND DISCUSSIONS We start with the followig example. Let X = (X, U, V ), Y = (Y, V, W) ad Z = (Z, W, U) where the radom variables X, Y, Z, U, V, W are mutually idepedet. It is easy to show that for this example whereas O the other had, I(X; Y ; Z) = K(X, Y, Z) = 0, C(X, Y, Z) = H(UV W). C(X, Y ) = H(V ), C(X, Z) = C(Y, Z) = H(U), H(W). What is iterestig is that the iclusio of a additioal variable icreases the commo iformatio. This is somewhat surprisig: if the iformatio is commo it ought to be oicreasig whe more radom variables are icluded. Ideed, we ca prove the followig geeral result: Lemma : Let (X,, X N ) p(x,, x N ). For ay two sets A, B that satisfy A B N = {, 2,, N}, C(X A ) C(X B ), (8) where X A = {X i, i A} ad X B = {X i, i B}. Proof: Let W be the W that achieves C(X B ), i.e., I(W ;X B ) = if I(W;X B ). But A B, thus X B coditioally idepedet give W implies that X A is coditioally idepedet give W. Thus I(X B ; W ) I(X A ; W ) if I(X A ; W) where the ifimum is take over all W such that X A is idepedet give W. This mootoe property perhaps suggests that the ame commo iformatio, while meaigful for pair of variables, o loger suits the geeralizatio to N variables. We commet here that Gács ad Körer s commo radomess follows a differet mootoe property K(X A ) K(X B ) while there is o defiitive iequality relatioship for mutual iformatio. As a cosequece, we have for ay N radom variables C(X, X 2,, X N ) K(X, X 2,, X N ). We ow examie aother example i which Wyer s commo iformatio icreases as the umber of the observatios icreases. Moreover the commo iformatio evetually coverges ad the asymptote suggests that the otio of commo iformatio may have potetial applicatio i certai iferece problem. Cosider first the example of three biary radom variables X, X 2, X 3 with joit distributio { P(x, x 2, x 3 ) = a 0 if x = x 2 = x 3 4 a 0 otherwise where the parameter a 0 satisfies 0 a 0 2. It ca be easily verified that (9) Pr{X i = 0} = 2, (20) for i =, 2, 3 ad that for i, j 3, i j, Pr(X i = x i, X j = x j ) = 2 ( a 0)δ xi,x j + 2 a 0( δ xi,x j ), (2) where δ a,b = if a = b ad 0 otherwise. Thus, each pair of (X i, X j ), i j, ca be viewed as a doubly symmetric biary source as defied i [4]. We refer to this set of exchageable biary sources circularly symmetric biary source. For such circularly symmetric biary source (X, X 2, X 3 ) with joit distributio give i (9) ad radom variables (X, X 2, X 3, W) that satisfy (7) ad (8), we have the followig lemma. Lemma 2: H(X W) + H(X 2 W) + H(X 3 W) 3h(a ), (22) where a = 2 2 ( 2a 0) 2.

6 W Compariso of commo iformatio C(X,Y) ad C(X,Y,Z) C(X,Y) C(X,Y,Z) X X X N 2 Fig. 3. A simple Bayesia graph model. Commo iformatio This lemma is a direct cosequece of Wyer s result o doubly symmetric biary source [4]. Therefore, we have, I(X X 2 X 3 ; W) = H(X X 2 X 3 ) H(X X 2 X 3 W), 3 = H(X X 2 X 3 ) H(X i W), H(X X 2 X 3 ) 3h(a ), ( = + h(a 0 ) + a 0 + ( a 0 )h a 0 2( a 0 ) ) 2h(a ), (23) This lower boud ca ideed be achieved by choosig the followig radom variables. Let W be a radom variable with p W (0) = p W () = /2, i.e., a Beroulli(/2) radom variable. Let each X i be the output of a biary symmetric chael (BSC) with crossover probability a with W as iput. The chaels share the commo iput W but are otherwise idepedet of each other. This is illustrated i the simple Bayesia graph model i Fig. 3 with N = 3 where each lik represets a BSC with crossover probability a. Thus, the commo iformatio of this circularly symmetric biary source is, C(X, X 2, X 3 ) = + a 0 + h(a 0 ) + ( ( a 0 )h a 0 2( a 0 ) ) 3h(a ), (24) Notice that ay pair of (X i, X j ) is a doubly symmetric biary source [4], therefore, C(X, Y ) = + h(a 0 ) 2h(a ). It is straightforward to check that C(X, Y, Z) > C(X, Y ) whe 0 < a 0 < 2. This is also show umerically i Fig. 4. We ow study the geeralizatio of above example to arbitrary N ad i particular the asymptotic value of the commo iformatio for the circularly symmetric biary sources. Cosider N biary radom variables X, X 2,, X N with joit distributio p(x, X 2,, X N ) geerated by a uderlyig Bayesia graph model as i Fig. 3, where W is a a 0 Fig. 4. Compariso of commo iformatio. Beroulli(/2) radom variable ad each X i, i =, 2,, N, is the output of a BSC with crossover probability a (0 a 2 ) with a commo iput W. Hece, for x, x 2,, x N {0, }, P(x, x 2,, x ) = w {0,} 2 N P i (x i w), (25) where for each i =, 2,, N, p i (x i w) = ( a ) if x i = w ad a otherwise. Similarly, we have, H(X i W) Nh(a ), (26) for ay radom variable W that satisfies (7) ad (8). Therefore, C(X, X 2,, X N ) ca be lower bouded by C(X, X 2,, X N ) H(X, X 2,, X N ) Nh(a ). (27) O the other had, the above lower boud is achievable by exactly the same W i the above Bayesia model. Hece, we have, C(X, X 2,, X N ) = H(X, X 2,, X N ) Nh(a ), (28) where H(X, X 2,, X N ) ca be calculated from (25). Now cosider the above model but with icreasig N. For ay ǫ ad a < /2, it is clear that H(W X, X 2,, X N ) < ǫ for N sufficietly large. This ca be established by the Fao s iequality as oe ca estimate W with arbitrary reliability give X,, X N for sufficietly large N. Therefore, C(X, X 2,, X N ) = H(X, X 2,, X N ) Nh(a ), = H(X, X 2,, X N, W) Nh(a ) H(W X, X 2,, X N ), H(W) ǫ, (29)

7 where the last step is from the fact that H(X, X 2,, X N W) = Nh(a ). O the other had, C(X,, X N ) H(W) for ay N. Thus, for a < /2, lim C(X, X 2,, X N ) = H(W) = N If a = /2, the X,, X N are mutually idepedet hece C(X,, X N ) = 0. IV. CONCLUSIONS This paper geeralized Wyer s commo iformatio, defied for a pair of radom variables, to that of N depedet radom variables. We showed that it is the miimum commo iformatio rate R 0 eeded for N separate decoders to recover their iteded sources losslessly while keepig the total rate close to the etropy boud. It is also equivaletly to the smallest rate of the commo iput to N idepedet processors (radom umber geerators), such that the output distributio is approximately the same as the give joit distributio. It was show that such geeralizatio leads to the pheomeo of commo iformatio o-decreasig as the umber of sources icreases. For the example of circularly symmetric biary sources, we show that commo iformatio ot oly icreases as N grows, but evetually coverges to the etropy of W that achieves C(X,, X N ). APPENDIX I this appedix, we give the proof of Theorem. First, as with [4], we defie a quatity Γ(δ, δ 2 ) which plays a importat role i the proof. Let (X, X 2,, X N ) P(x, x 2,, x N ) where X,, X N take values i fiite alphabet X,, X N. Let ( ˆX, ˆX 2,, ˆX N, W) be a (N + )tuple of radom variables where ˆX X, ˆX 2 X 2,, ˆX N X N ad W W, a fiite set. Deote the margial distributio of ( ˆX, ˆX 2,, ˆX N ) by Q(x, x 2,, x N ) = Pr( ˆX = x, ˆX 2 = x 2,, ˆX N = x ), (30) for x i X i, i =, 2,, N. For ay δ, δ 2 0, defie Γ(δ, δ 2 ) = suph( ˆX, ˆX 2,, ˆX N W), (3) where the sumpremum is take over all (N + )-tuples ( ˆX, ˆX 2,, ˆX N, W) that satisfy D(P; Q) = P(x, x 2,, x N )log P(x, x 2,, x N ) Q(x x,y, x 2,, x N ) δ, Substitute (43) ito (4), we get, (32) log M 0 H(X X 2 X N ) ad H( ˆX i W) H( ˆX, ˆX 2,, ˆX N W) δ 2. (33) H(X X 2 X N ) Γ ( It follows that C(X, X 2,, X N ) as defied i Theorem, is equivalet to C(X, X 2,, X N ) = H(X, X 2,, X N ) Γ(0, 0). (34) The followig lemma gives some properties of Γ(δ, δ 2 ). Lemma 3: ) For all δ, δ 2 0, there exists a (N +)-tuple ( ˆX, ˆX 2,, ˆX N, W) such that (32) ad (33) are satisfied ad Γ(δ, δ 2 ) = H( ˆX, ˆX 2,, ˆX N W). (35) Moreover, for δ, δ 2 = 0, W N X i. (36) 2) Γ(δ, δ 2 ) is a cocave fuctio of (δ, δ 2 ) ad it is cotiuous for all δ, δ ) For δ 0, defie Γ (δ) = Γ(0, δ) ad Γ 2 (δ) = Γ(δ, 0), the Γ (δ) ad Γ 2 (δ) are cocave ad cotiuous for δ 0. The proof of Lemma follows similarly as the proof of Theorem 4.4 i [4]. A. Proof of C = C(X, X 2,, X N ). I this sectio, we prove the first part of Theorem, that is C = C(X, X 2,, X N ). We first prove the coverse part, that is for ay R 0 that is achievable for the Gray-Wyer source codig etwork, we have, Theorem 2 (Coverse): C C(X, X 2,, X N ). (37) To prove the coverse, first let (f, g i ), i =, 2,, N be ay (, M 0, M,, M N ) code that satisfies (2), (3) ad (4). The, we have, log M 0 H(M 0 ), (38) I(X X 2 X N ; M 0), (39) = H(X X2 XN) H(X X2 XN M 0 ), (40) = H(X X 2 X N ) H(X j X 2j X Nj W j (4) ), where W j (M 0, X j, X j 2,, X j N ) ad Xj i = (X i, X i2,, X i,j ) for i =, 2,, N. Notice that, the (N + )-tuple (X j, X 2j,, X Nj, W j ) satisfies coditio (32) ad (33) with δ = 0 ad δ (j) 2 = H(X i,j W j ) H(X j, X 2j,, X Nj W j ). (42) Hece, by the defiitio of Γ(δ, δ 2 ), we have H(X j X 2j X Nj W j ) Γ (δ (j) 2 ). (43) Γ (δ (j) 2 ), (44) δ (j) 2 ).(45)

8 where the last step is from the cocavity of Γ ( ) fuctio. Now defie η = δ (j) 2. (46) The followig lemma gives a upper boud o η. Lemma 4: For ay (, M 0, M,, M N ) code that satisfies (2), (3) ad (4), we have η (N + )ǫ. (47) Proof : By Fao s iequality, we have, for i =, 2,, N, Hece, we have, for i =, 2,, N, H(X i M 0 M i ) ǫ. (48) log M i H(M i ), (49) The, we get, H(M i M 0 ), (50) = H(X i M i M 0 ) H(X i M i M 0 ), (5) H(X i M i M 0 ) ǫ, (52) = H(X M 0 ) ǫ. (53) log M i H(Xi M 0) ǫ. (54) where ǫ = Nǫ. Together with (4), we get, log M i H(X X 2 X N ) i=0 + Together with (4), we get, H(Xi M 0) H(X j X 2j X Nj W j ) H(Xi M 0 ) ǫ. (55) H(X j X 2j X Nj W j ) ǫ. (56) where ǫ = (N + )ǫ. O the other had, we have, = = H(Xi M 0) H(X ij X j i M 0 ), (57) H(X ij X j, X j 2,, X j N, M 0), (58) H(X ij W j ). (59) Combie (56) ad (59), we have, [ N ] H(X ij W j ) H(X j X 2j X Nj W j ) ǫ. Hece, we have, This completes the proof of Lemma 4. Now, from Lemma 4 ad (45), we get, (60) δ (j) 2 ǫ. (6) R 0 log M 0 H(X, X 2,, X N ) Γ (η). (62) Together with the cotiuity of Γ ( ), we have, as, R 0 H(X, X 2,, X N ) Γ (0), (63) = C(X, X 2,, X N ). (64) This completes the proof of coverse part. We ow prove the achievability part, that is, let the joit distributio P(x, x 2,, x N ) be give, we have, Theorem 3 (Achievability): C C(X, X 2,, X N ). (65) Our proof maily ivolves geeralizig Gray-Wyer source codig etwork [4] to that of N sources. The system model we cosidered here is the same as Fig. described i sectio II except that defiitio 2 is replaced by, Defiitio 5: A rate tuple (R 0, R,, R N ) is said to be achievable if for all ǫ > 0, we ca fid a sufficietly large such that there exists a (, 2 R0, 2 R,, 2 RN ) code with P () e ǫ. (66) Our purpose is to fid all achievable rate tuples (R 0, R,, R N ). The rate regio of this source codig problem is summarized i the followig theorem. Theorem 4: For the source codig model described above, a rate tuple (R 0, R,, R N ) is achievable if ad oly if the followig coditios are satisfied, R 0 I(X, X 2,, X N ; W), (67) R i H(X i W), (68) for i =, 2,, N, ad for some W P(w x, x 2,, x N ), where W W ad W N X i + 2. Proof of Theorem 4 (Sketch): For the achievability part, we wat to show that for ay rate tuple (R 0, R,, R N ) that satisfies above coditios, we ca costruct a (, 2 R0, 2 R,, 2 RN ) code such that the decodig error P e () 0 as codeword legth. Codeword Geeratio: for ay give distributios P(x, x 2,, x N ) ad P(w x, x 2,, x N ), we calculate the margial distributio P(w). ) Codebook C 0 : we first radomly geerate 2 R0 sequeces w i.i.d. P(w), ad idex them by m 0 {, 2,, 2 R0 }.

9 2) Codebook C(X i ): for each i =, 2, N, for each x i X i, radomly put them ito 2Ri bis ad idex them bis by m i {, 2,, 2 Ri }. Ecodig: ) for each source sequeces (x,x 2,, x N ), ecoder f 0 fids a w (m 0 ) C 0 such that (x, x 2,, x N, w (m 0 )) Tǫ, where T ǫ is the joitly typical set as defied i [5], ad sed the idex m 0 to the decoder. If there is o more tha oe w, choose the sequece w with the smallest idex; if there exist o such sequece, choose sequece w (), 2) for i =, 2,, N, ecoder f i seds the bi idex m i of sequece x i. Decodig: for i =, 2,, N, decoder i looks at bi m i for codebook C(X i ) ad fids the sequece ˆx i such that (ˆx i, w (m 0 )) Tǫ. If there is more tha oe or oe such sequece, declare a error. Error aalysis: Assumig m i, i = 0,,, N are the chose idices for ecodig (x, x 2,, x N ). There are three error evets. ) E : (x, x 2,, x N, w (m 0 )) / T ǫ for all m 0 {, 2,, 2 R0 }. 2) E 2 : (x i, w (m 0 )) / T ǫ for each i. 3) E 3 : for some i, there exists x i x i i bi m i of codebook C(X i ) such that ( x i, w (m 0 )) T ǫ. Hece, P e () P(E ) + P(E 2 E c ) + P(E 3 E c, Ec 2 ). (69) By some stadard argumet, we ca get, as, ) P(E ) 0 if R 0 I(X, X 2,, X N ; W) + ǫ, (70) 2) P(E 2 E) c 0, 3) P(E 3 E c, Ec 2 ) 0 if for each i =, 2,, N, This completes the achievability proof. R i H(X i W) + ǫ. (7) For the coverse part, we wat to show that for ay achievable rate tuple (R 0, R,, R N ), it should satisfy (67) ad (68). By Fao s iequality, we have H(X i M i M 0 ) ǫ. (72) Hece, we have, for i =, 2,, N ad R i H(M i ), (73) H(M i M 0 ), (74) H(M i M 0 ) + H(X i M im 0 ) ǫ, (75) = H(X i M i M 0 ) ǫ, (76) = H(Xi M 0) ǫ, (77) = H(X ij M 0 X j i ) ǫ, (78) H(X ij M 0, X j, X j 2,, X j ) ǫ.(79) R 0 H(M 0 ), (80) I(M 0 ; X, X 2,, X N ), (8) = I(M 0 ; X j X 2j X Nj X j X j 2 X j N ), = I(M 0 X j X j 2 X j N ; X jx 2j X Nj ).(83) Defie W j = (M 0, X j, X j 2,, X j N ), ad usig a stadard time sharig argumet, we ca get, for i =, 2,, N, N R i H(X i W) ǫ, (84) R 0 I(X X 2 X N ; W). (85) Let, the ǫ 0, ad this completes the proof of coverse. The cardiality boud ca be obtaied usig the techique itroduced i [6, Appdedix C]. We skip the details. This completes the proof of Theorem 4. Now we proceed to prove Theorem 3. We will show that if R 0 > C(X, X 2,, X N ), it is achievable for Model I. Let R 0 > C(X, X 2,, X N ) ad ay ǫ > 0 be give ad let radom variables (X, X 2,, X N, W) satisfy (7) ad (8), such that C(X, X 2,, X N ) = I(X X 2 X N ; W). (86) Notice that, the existece of such radom variables is guarateed by Lemma 3. Now defie ǫ ǫ = mi{ N +, R 0 C(X, X 2,, X N )}, (87) ad hece ǫ > 0. By Theorem 4, there exists a (, M 0, M,, M N ) code with P e () ǫ ad ǫ ǫ. Hece, log M 0 C(X, X 2,, X N ) + ǫ R 0, (88) log M i H(X i W) + ǫ. (89)

10 Hece, we have, log M i i=0 C(X, X 2,, X N ) + H(X i W) + ǫ, (90) (a) = H(X, X 2,, X N ) + ǫ. (9) where (a) is from coditio (8). Thus, coditio (4) is also satisfied. This implies that R 0 is achievable i Model I, which completes the proof of achievability part. This completes the proof of Theorem 3. B. Proof of C 2 = C X,X 2,,X N. I this sectio, we prove the secod part of theorem, that is C 2 = C(X, X 2,, X N ). We have the followig theorem. Theorem 5: C 2 C(X, X 2,, X N ), (92) C 2 C(X, X 2,, X N ). (93) For the coverse part, that is (92), the proof follows almost the same lie as i [4, Sectio 5.2]. For the achievability part, that is (93), the proof follows similarly as i [4, Secito 6.2] by applyig U = X X 2, X N i [4, Theorem 6.3]. We omit the details here. REFERENCES [] P. Gács ad J. Körer, Commo iformatio is much less tha mutual iformatio, Problems Cotr. Iform. Theory, vol. 2, pp , 973. [2] R. Ahlswede ad J. Körer, O commo iformatio ad related characteristics of correlated iformatio sources, Proc. of the 7th Prague Coferece of Iformatio Theory, 974. [3] H. S. Witsehause, O sequeces of pairs of depedet radom variables, SIAM J. Appl. Math., vol. 28, pp. 00-3, Ja [4] A. D. Wyer, The commo iformatio of two depedet radom variables, IEEE Tras. If. Theory, vol. 2, o. 2, pp , March [5] H. S. Witsehause, Values ad bouds for the commo iformatio of two discrete radom variables, SIAM J. Appl. Math., vol. 3, o. 2, pp , 976. [6] C. E. Shao, A mathematical theory of commuicatio, Bell System Techical Joural, vol. 27, pp , 948. [7] R. Ahlswede ad I. Csiszár, Commo radomess i iformatio thoery ad cryptography, Part I: Secret sharig, IEEE Tras. If. Theory, vol. 39, pp. 2-32, July 993. [8] R. Ahlswede ad I. Csiszár, Commo radomess i iformatio thoery ad cryptography, Part I: CR capacity, IEEE Tras. If. Theory, vol. 44, pp , Ja [9] U. M. Maurer, Secret key agreemet by public discussio from commo iformatio, IEEE Tras. If. Theory, vol. 39, pp , May 993. [0] G. Hu O the amout of iformatio, Teor. Veroyatost. i Primee., 4: , 962 (i Russia). [] I. Csiszár ad J. Körer, Iformatio Theory: Codig Theorems for Discrete Memoryless Systems, Academic, New York, 98. [2] R. W. Yeug, Iformatio Theory ad Network Codig, Spriger, [3] H. Tyagi ad P. Naraya ad P. Gupta, Whe is a Fuctio Securely Computable?, [4] R. M. Gray ad A. D. Wyer, Source codig for a simple etwork, Bell Syst. Tech. J., vol. 58, pp , Nov [5] T. M. Cover ad J. A. Thomas, Elemets of Iformatio Theory, Wiley, New York, 99. [6] A. El Gamal ad Y. H. Kim, Lecture otes o etwork iformatio theory,

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

1 The Gaussian channel

1 The Gaussian channel ECE 77 Lecture 0 The Gaussia chael Objective: I this lecture we will lear about commuicatio over a chael of practical iterest, i which the trasmitted sigal is subjected to additive white Gaussia oise.

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

3 Basic Definitions of Probability Theory

3 Basic Definitions of Probability Theory 3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Lecture 4: Cheeger s Inequality

Lecture 4: Cheeger s Inequality Spectral Graph Theory ad Applicatios WS 0/0 Lecture 4: Cheeger s Iequality Lecturer: Thomas Sauerwald & He Su Statemet of Cheeger s Iequality I this lecture we assume for simplicity that G is a d-regular

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Lecture 5: Span, linear independence, bases, and dimension

Lecture 5: Span, linear independence, bases, and dimension Lecture 5: Spa, liear idepedece, bases, ad dimesio Travis Schedler Thurs, Sep 23, 2010 (versio: 9/21 9:55 PM) 1 Motivatio Motivatio To uderstad what it meas that R has dimesio oe, R 2 dimesio 2, etc.;

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Solutions 9 Spring 2006

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Solutions 9 Spring 2006 Exam format UC Bereley Departmet of Electrical Egieerig ad Computer Sciece EE 6: Probablity ad Radom Processes Solutios 9 Sprig 006 The secod midterm will be held o Wedesday May 7; CHECK the fial exam

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

A RANDOM PERMUTATION MODEL ARISING IN CHEMISTRY

A RANDOM PERMUTATION MODEL ARISING IN CHEMISTRY J. Appl. Prob. 45, 060 070 2008 Prited i Eglad Applied Probability Trust 2008 A RANDOM PERMUTATION MODEL ARISING IN CHEMISTRY MARK BROWN, The City College of New York EROL A. PEKÖZ, Bosto Uiversity SHELDON

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E. MCCARTHY, SANDRA POTT, AND BRETT D. WICK

THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E. MCCARTHY, SANDRA POTT, AND BRETT D. WICK THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E MCCARTHY, SANDRA POTT, AND BRETT D WICK Abstract We provide a ew proof of Volberg s Theorem characterizig thi iterpolatig sequeces as those for

More information

An Efficient Polynomial Approximation of the Normal Distribution Function & Its Inverse Function

An Efficient Polynomial Approximation of the Normal Distribution Function & Its Inverse Function A Efficiet Polyomial Approximatio of the Normal Distributio Fuctio & Its Iverse Fuctio Wisto A. Richards, 1 Robi Atoie, * 1 Asho Sahai, ad 3 M. Raghuadh Acharya 1 Departmet of Mathematics & Computer Sciece;

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Floating Codes for Joint Information Storage in Write Asymmetric Memories

Floating Codes for Joint Information Storage in Write Asymmetric Memories Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 ajiag@cs.tamu.edu Vaske Bohossia Electrical

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find 1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Factors of sums of powers of binomial coefficients

Factors of sums of powers of binomial coefficients ACTA ARITHMETICA LXXXVI.1 (1998) Factors of sums of powers of biomial coefficiets by Neil J. Cali (Clemso, S.C.) Dedicated to the memory of Paul Erdős 1. Itroductio. It is well ow that if ( ) a f,a = the

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

A Recursive Formula for Moments of a Binomial Distribution

A Recursive Formula for Moments of a Binomial Distribution A Recursive Formula for Momets of a Biomial Distributio Árpád Béyi beyi@mathumassedu, Uiversity of Massachusetts, Amherst, MA 01003 ad Saverio M Maago smmaago@psavymil Naval Postgraduate School, Moterey,

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

Chapter 14 Nonparametric Statistics

Chapter 14 Nonparametric Statistics Chapter 14 Noparametric Statistics A.K.A. distributio-free statistics! Does ot deped o the populatio fittig ay particular type of distributio (e.g, ormal). Sice these methods make fewer assumptios, they

More information

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means) CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

A Note on Sums of Greatest (Least) Prime Factors

A Note on Sums of Greatest (Least) Prime Factors It. J. Cotemp. Math. Scieces, Vol. 8, 203, o. 9, 423-432 HIKARI Ltd, www.m-hikari.com A Note o Sums of Greatest (Least Prime Factors Rafael Jakimczuk Divisio Matemática, Uiversidad Nacioal de Luá Bueos

More information

Our aim is to show that under reasonable assumptions a given 2π-periodic function f can be represented as convergent series

Our aim is to show that under reasonable assumptions a given 2π-periodic function f can be represented as convergent series 8 Fourier Series Our aim is to show that uder reasoable assumptios a give -periodic fuctio f ca be represeted as coverget series f(x) = a + (a cos x + b si x). (8.) By defiitio, the covergece of the series

More information

Interference Alignment and the Generalized Degrees of Freedom of the X Channel

Interference Alignment and the Generalized Degrees of Freedom of the X Channel Iterferece Aligmet ad the Geeralized Degrees of Freedom of the X Chael Chiachi Huag, Viveck R. Cadambe, Syed A. Jafar Electrical Egieerig ad Computer Sciece Uiversity of Califoria Irvie Irvie, Califoria,

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Metric, Normed, and Topological Spaces

Metric, Normed, and Topological Spaces Chapter 13 Metric, Normed, ad Topological Spaces A metric space is a set X that has a otio of the distace d(x, y) betwee every pair of poits x, y X. A fudametal example is R with the absolute-value metric

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these

More information

Transient Behavior of Two-Machine Geometric Production Lines

Transient Behavior of Two-Machine Geometric Production Lines Trasiet Behavior of Two-Machie Geometric Productio Lies Semyo M. Meerkov Nahum Shimki Liag Zhag Departmet of Electrical Egieerig ad Computer Sciece Uiversity of Michiga, A Arbor, MI 489-222, USA (e-mail:

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao issam.kaddoura@liu.edu.lb amih Abdul-Nabi

More information

Efficient tree methods for pricing digital barrier options

Efficient tree methods for pricing digital barrier options Efficiet tree methods for pricig digital barrier optios arxiv:1401.900v [q-fi.cp] 7 Ja 014 Elisa Appolloi Sapieza Uiversità di Roma MEMOTEF elisa.appolloi@uiroma1.it Abstract Adrea igori Uiversità di Roma

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

Parameter estimation for nonlinear models: Numerical approaches to solving the inverse problem. Lecture 11 04/01/2008. Sven Zenker

Parameter estimation for nonlinear models: Numerical approaches to solving the inverse problem. Lecture 11 04/01/2008. Sven Zenker Parameter estimatio for oliear models: Numerical approaches to solvig the iverse problem Lecture 11 04/01/2008 Sve Zeker Review: Trasformatio of radom variables Cosider probability distributio of a radom

More information

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k. 18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The

More information

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate Iteratioal Coferece o Maagemet Sciece ad Maagemet Iovatio (MSMI 4) Istallmet Joit Life Isurace ctuarial Models with the Stochastic Iterest Rate Nia-Nia JI a,*, Yue LI, Dog-Hui WNG College of Sciece, Harbi

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

2. Degree Sequences. 2.1 Degree Sequences

2. Degree Sequences. 2.1 Degree Sequences 2. Degree Sequeces The cocept of degrees i graphs has provided a framewor for the study of various structural properties of graphs ad has therefore attracted the attetio of may graph theorists. Here we

More information

Probabilistic Engineering Mechanics. Do Rosenblatt and Nataf isoprobabilistic transformations really differ?

Probabilistic Engineering Mechanics. Do Rosenblatt and Nataf isoprobabilistic transformations really differ? Probabilistic Egieerig Mechaics 4 (009) 577 584 Cotets lists available at ScieceDirect Probabilistic Egieerig Mechaics joural homepage: wwwelseviercom/locate/probegmech Do Roseblatt ad Nataf isoprobabilistic

More information

Permutations, the Parity Theorem, and Determinants

Permutations, the Parity Theorem, and Determinants 1 Permutatios, the Parity Theorem, ad Determiats Joh A. Guber Departmet of Electrical ad Computer Egieerig Uiversity of Wiscosi Madiso Cotets 1 What is a Permutatio 1 2 Cycles 2 2.1 Traspositios 4 3 Orbits

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information