Error Detection and Correction

Size: px
Start display at page:

Download "Error Detection and Correction"

Transcription

1 Error Detection and Correction Outline for Today 1. Parity Check Code 2. Bounds based on Hamming distance 3. Hamming Code Can You Raed Tihs? I cnduo t bvleiee taht I culod aulaclty uesdtannrd waht I was rdnaieg. Unisg the icndeblire pweor of the hmuan mnid, aocdcrnig to rseecrah at Cmabrigde Uinervtisy, it dseno t mttaer in waht oderr the lterets in a wrod are, the olny irpoamtnt tihng is taht the frsit and lsat ltteer be in the rhgit pclae. The rset can be a taotl mses and you can sitll raed it whoutit a pboerlm. Tihs is bucseae the huamn mnid deos not raed ervey ltteer by istlef, but the wrod as a wlohe. Aaznmig, huh? Yaeh and I awlyas tghhuot slelinpg was ipmorantt! See if yuor fdreins can raed tihs too. languagehat.com (original source unknown) 1

2 One Example: Error Detection Bits are occasionally flipped in transmission. For example, a sender may transmit , and the receiver gets the string Adding redundancy can allow us to detect, and possibly correct, some errors of this type. Simple approach: Repeat each bit Repeat each bit twice. For bit x, transmit xx. If the receiver gets two different bits, it requests retransmission. This in an error-detecting code - it allows one error to be detected, but it is not error-correcting, since retransmission is necessary. Repeat each bit three times. For each bit x, transmit xxx. Now the receiver can correct a single error. (How?) 2

3 Parity Check Code: Detecting an Odd Number of Bit Flips Definition: A bit string has odd parity if the number of 1s in the string is odd. A bit string has even parity if the number of 1s in the string is even. Recall: 0 is an even number. Example: 01100, 000, and have even parity , 1, and have odd parity. Assume we are transmitting blocks of k bits. A block w of length k is encoded as wa, where the value of the parity bit a is chosen so that wa has even parity. Example: If w = 10110, we send wa = , which has even parity. If there are a positive, even number of bit flip errors in transmission, the receiver gets a bit string with even parity, and the error(s) go undetected. If there are an odd number of bit flip errors in transmission, the receiver gets a bit string with odd parity, indicating an error occurred. The receiver requests retransmission. 3

4 Assumption: Bit flips are rare, so we can tolerate a very small percentage of corrupted blocks that have an even number of flips. 4

5 Single Parity Check Code - Undetectable Errors Any time a block of length n (with parity bit) contains an even number of bit errors, the error cannot be detected. Let p be the probability of an error in a single bit. The probability of 2 bit flips in the block is: ( n ) 2 p 2 (1 p) n 2 i.e, the number of ways to choose 2 bits from n bits, times p 2, the probability of those bits being errors, times p n 2, the probability of the remaining n 2 bits being correct. The probability of an undetected error is: ( n 2) p 2 (1 p) n 2 + ( n 4) p 4 (1 p) n For bit strings of length n = 32 and p = 0.001, the probability of an undetectable error is approximately

6 2D Parity Check Block of bits is organized in rows and columns, say an m n matrix. The parity bit of each row is calculated, and appended to the row before it is transmitted. The parity of each column is calculated, and the parity bit of the entire matrix is computed - these are also transmitted to the receiver. m + n + 1 parity bits are computed. A total of mn + m + n + 1 bits are sent to the receiver. 6

7 2D Parity Check Example: Original data: 1100, 1011, 0111, 0101 row parity (matrix parity bit) col parity bits Exercise: Describe an error that cannot be detected with this approach. 7

8 Hamming Distance between Codewords Example: Suppose we want to send 2-bit strings. Each codeword contains two copies of the string plus a parity bit. If the bit-string is 01, we send the 5-bit string 01x01, where x is the parity bit. So in this example, the sender transmits the codeword For this code, there are only four 5-bit codewords: 00000, 01101, 10110, When the receiver sees any other string, the error is corrected by replacing it with the codeword that has the least Hamming distance to the received word. Suppose that the string is received. For Hamming distance d, d(10101, 00000) = 3, d(10101, 01101) = 2, d(10101, 10110) = 1, d(10101, 11011) = 3. So the closest codeword to the received string is 10110, so the receiver assumes that this was the original string. The number of errors that can be detected and corrected depends on the Hamming distance between the codewords. 8

9 Hamming Distance and Bounds on Error Correction Theorem: Let S be a set of codewords and let h be the minimum Hamming distance between any two codewords in S. Then: 1. It is possible to detect any number of errors less than h 2. It is possible to correct any number of errors less than h/2 Proof: Assume that codeword x is sent and string y is received. If d(x, y) < h, then y is obviously either x, or y is not a codeword. So the receiver will detect an error. If d(x, y) < h/2, then we will show that x is the closest codeword to y, and so the receiver can correct the error by replacing y with closest codeword x. Let z be any codeword other than x, and suppose that d(y, z) d(y, x). Then since d(y, x) < h/2, it follows that d(y, z) < h/2. So d(x, z) d(x, y) + d(y, z) by the triangle inequality < h/2 +h/2 = h. Contradiction, since x and z are both codewords. Therefore x is the closest codeword to y. 9

10 Hamming Distance Exercise: We looked previously at a code that has four 5-bit codewords: 00000, 01101, 10110, Calculate the minimum Hamming distance between any two codewords. So we are: 1. Guaranteed to be able to correct any number of errors less than. 2. And guaranteed to detect any number of errors less than. 10

11 Hamming Code Assume we are transmitting codewords of length k. Hamming code: Sends a logarithmic number l additional bits per word, called the check bits. Allows one error to be corrected for each block (of k + l bits) transmitted. 11

12 Hamming Code: How Many Check Bits? Choose l to be the smallest positive integer so that the representation of k + l has l bits. For example: 1. If k = 1, what should l be? 2. if k = 2, what is l? Question: What is the maximum number of data bits k corresponding to a given number of check bits l? The positive numbers with l-bit binary representations are between 2 l 1 and 2 l 1 (Verify). So we need k such that k + l 2 l 1, i.e., k 2 l l 1. 12

13 Hamming Codes TO make a Hamming code: 1. Label the k + l bit positions from 1 to k + l. 2. The l check bit positions are the positions with indices that are powers of 2: indices 1, 2, 4, 8, The k data bits go in the other positions 4. Choose values for the check bits such that the XOR of the indices of all 1 bits is 0 (Hamming Code Rule) 13

14 Check Bit Values Recall: For any finite set S, f(s) denotes the XOR of all bit-strings in S. Let C be the set of positions in a codeword where the check bits are 1, and let D be the set of positions where the data bits are 1. By the Hamming Code Rule, f(c) f(d) = 0. Therefore f(c) = f(d). Since we already know the data bits, i.e., D, compute f(d). Then we set the check bits so that f(c) is the same. We do this by assigning the entries in the bit-string f(c) to the check bits in order from highest to lowest indices. Example: Suppose we want to transmit 4 data bits. We add 3 check bits, and so all transmitted strings will have 7 bits. Compute the check bits (and the codewords) for these strings: 1011, c 1 c c d d d c d c c Compute f(d) = = 001. So the transmitted string is Exercise: What is the codeword for

What is discrete longitudinal data analysis?

What is discrete longitudinal data analysis? What is discrete longitudinal data analysis? Ivonne Solis-Trapala NCRM Lancaster-Warwick Node ESRC Research Festival 2008 Discrete longitudinal data analysis The title explained: Discrete variables: Variables

More information

The views and opinions expressed in the following PowerPoint slides are

The views and opinions expressed in the following PowerPoint slides are Electronic Tools and Gadgets Julie P. Retzinger RN, MBA Baxter Healthcare The views and opinions expressed in the following PowerPoint slides are those of the individual id presenter and should not be

More information

Search Engine Marketing Presented by: Dale DeHart. Presented to: DMA 14 June, 2011. 2001-2010 SOHO Prospecting. All rights reserved

Search Engine Marketing Presented by: Dale DeHart. Presented to: DMA 14 June, 2011. 2001-2010 SOHO Prospecting. All rights reserved Search Engine Marketing Presented by: Dale DeHart Presented to: DMA 14 June, 2011 2001-2010 SOHO Prospecting. All rights reserved Search Engine Marketing? Search Engine Marketing (SEM) is a general term

More information

[email protected]. Your Career @ IBM Blue is Cool. Certified Professions and

Bill.Hahn@us.ibm.com. Your Career @ IBM Blue is Cool. Certified Professions and Your Career @ IBM Blue is Cool Certified Professions and Beyond [email protected] Red arrows throughout presentation are IBM w3.ibm.com Intranet links (Must be in PowerPoint slideshow mode for them

More information

Learning to Listen with Hearing Technologies: An Interdisciplinary Perspective on Aural Rehabilitation

Learning to Listen with Hearing Technologies: An Interdisciplinary Perspective on Aural Rehabilitation Learning to Listen with Hearing Technologies: An Interdisciplinary Perspective on Aural Rehabilitation Learning to Listen Again: Aural Rehabilitation for Teens & Adults - John Henry MS, CCC-SLP Outline

More information

Qualitative Research. Session 3: Data gathering. Prof Jan Nieuwenhuis

Qualitative Research. Session 3: Data gathering. Prof Jan Nieuwenhuis Qualitative Research Session 3: Data gathering Prof Jan Nieuwenhuis Data gathering in qualitative research To understand society you have to - gain access to the way people attribute meaning to what goes

More information

Requirement Types 1. Why should we care? 2. What are they? 3. How should we use them?

Requirement Types 1. Why should we care? 2. What are they? 3. How should we use them? Requirement Types 1. Why should we care? 2. What are they? 3. How should we use them? RTP IIBA Chapter, April 26 th, 2008 Razvan Radulian, VP of Marketing Founder & President of Why-What-How Consulting,

More information

Supporting children at home with reading and writing

Supporting children at home with reading and writing Supporting children at home with reading and writing K AY E L O W E P h D A D J U N C T A S S O C I AT E P R O F E S S O R U N I V E R S I T Y O F C A N B E R R A Olny srmat poelpe can raed tihs.?i cdnuolt

More information

Goals and Objectives. A Story. Diagnosis. What do diagnostic errors mean to you? University of Texas Health Science Center at San Antonio

Goals and Objectives. A Story. Diagnosis. What do diagnostic errors mean to you? University of Texas Health Science Center at San Antonio Clinical Reasoning and Diagnostic Errors Dx UTHSA Grand Rounds May 13, 2011 Geeta Singhal, MD, MEd Goals and Objectives To introduce the field of diagnostic errors and to open dialogue about their occurrence

More information

Introduction to Algebraic Coding Theory

Introduction to Algebraic Coding Theory Introduction to Algebraic Coding Theory Supplementary material for Math 336 Cornell University Sarah A. Spence Contents 1 Introduction 1 2 Basics 2 2.1 Important code parameters..................... 4

More information

Lecture 1: The Visual System

Lecture 1: The Visual System ITS 102: Visualize This! Lecture 1: The Visual System Klaus Mueller Computer Science Department Stony Brook University The Visual Brain Over 50% of the human brain is dedicated to vision and visual representations,

More information

Coping with Bit Errors using Error Correction Codes

Coping with Bit Errors using Error Correction Codes MIT 6.02 DRAFT Lecture Notes Last update: September 23, 2012 CHAPTER 5 Coping with Bit Errors using Error Correction Codes Recall our main goal in designing digital communication networks: to send information

More information

The finite field with 2 elements The simplest finite field is

The finite field with 2 elements The simplest finite field is The finite field with 2 elements The simplest finite field is GF (2) = F 2 = {0, 1} = Z/2 It has addition and multiplication + and defined to be 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 0 0 = 0 0 1 = 0

More information

Aoccdrnig to rsceearh at Cmabrigde Uinervtisy, it deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist

Aoccdrnig to rsceearh at Cmabrigde Uinervtisy, it deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist Aoccdrnig to rsceearh at Cmabrigde Uinervtisy, it deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist and lsat ltteer be at the rghit pclae. The rset can

More information

The Pharmacist s Role in Reducing and Preventing Medication Errors: What are the Real World Issues?

The Pharmacist s Role in Reducing and Preventing Medication Errors: What are the Real World Issues? Disclaimer The Pharmacy s Role in Reducing and Preventing Medication Errors: What are the Real World Issues? Vice President of Government Affairs & Pharmacy Relations Hospice Pharmacia * hp RxOptions Services

More information

Basic Clinical Documentation

Basic Clinical Documentation Basic Clinical Documentation Erica E Remer, MD, FACEP, CCDS Clinical Documentation Integrity Officer University Hospitals June 16, 2015 Objectives Understand why we document Recognize challenges of documentation

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

CODING THEORY a first course. Henk C.A. van Tilborg

CODING THEORY a first course. Henk C.A. van Tilborg CODING THEORY a first course Henk C.A. van Tilborg Contents Contents Preface i iv 1 A communication system 1 1.1 Introduction 1 1.2 The channel 1 1.3 Shannon theory and codes 3 1.4 Problems 7 2 Linear

More information

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

Cardinality. The set of all finite strings over the alphabet of lowercase letters is countable. The set of real numbers R is an uncountable set.

Cardinality. The set of all finite strings over the alphabet of lowercase letters is countable. The set of real numbers R is an uncountable set. Section 2.5 Cardinality (another) Definition: The cardinality of a set A is equal to the cardinality of a set B, denoted A = B, if and only if there is a bijection from A to B. If there is an injection

More information

PRA100 - Presentation Skills in Communication. Hakan Türkkuşu

PRA100 - Presentation Skills in Communication. Hakan Türkkuşu PRA100 - Presentation Skills in Communication Hakan Türkkuşu PRA100 INTRODUCTION Schedule DATES & WEEK # CONTENT NOTE/S 1 (Sep 27th) 2 (Oct 4th) Introduction -Lectures - Sources / Software / Media - Lecturer

More information

1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal:

1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal: Exercises 1 - number representations Questions 1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal: (a) 3012 (b) - 435 2. For each of

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Stanford Math Circle: Sunday, May 9, 2010 Square-Triangular Numbers, Pell s Equation, and Continued Fractions

Stanford Math Circle: Sunday, May 9, 2010 Square-Triangular Numbers, Pell s Equation, and Continued Fractions Stanford Math Circle: Sunday, May 9, 00 Square-Triangular Numbers, Pell s Equation, and Continued Fractions Recall that triangular numbers are numbers of the form T m = numbers that can be arranged in

More information

Computer Networks. Data Link Layer

Computer Networks. Data Link Layer Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.

More information

A Survey of the Theory of Error-Correcting Codes

A Survey of the Theory of Error-Correcting Codes Posted by permission A Survey of the Theory of Error-Correcting Codes by Francis Yein Chei Fung The theory of error-correcting codes arises from the following problem: What is a good way to send a message

More information

Sheet 7 (Chapter 10)

Sheet 7 (Chapter 10) King Saud University College of Computer and Information Sciences Department of Information Technology CAP240 First semester 1430/1431 Multiple-choice Questions Sheet 7 (Chapter 10) 1. Which error detection

More information

ERROR DETECTION AND CORRECTION

ERROR DETECTION AND CORRECTION Supplement to Logic and Computer Design Fundamentals 3rd Edition 1 ERROR DETECTION AND CORRECTION Selected topics not covered in the third edition of Logic and Computer Design Fundamentals are provided

More information

THE BANACH CONTRACTION PRINCIPLE. Contents

THE BANACH CONTRACTION PRINCIPLE. Contents THE BANACH CONTRACTION PRINCIPLE ALEX PONIECKI Abstract. This paper will study contractions of metric spaces. To do this, we will mainly use tools from topology. We will give some examples of contractions,

More information

This page intentionally left blank

This page intentionally left blank This page intentionally left blank Coding Theory A First Course Coding theory is concerned with successfully transmitting data through a noisy channel and correcting errors in corrupted messages. It is

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9 Introduction The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive integer We say d is a

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information

F Matrix Calculus F 1

F Matrix Calculus F 1 F Matrix Calculus F 1 Appendix F: MATRIX CALCULUS TABLE OF CONTENTS Page F1 Introduction F 3 F2 The Derivatives of Vector Functions F 3 F21 Derivative of Vector with Respect to Vector F 3 F22 Derivative

More information

Today s Topics. Primes & Greatest Common Divisors

Today s Topics. Primes & Greatest Common Divisors Today s Topics Primes & Greatest Common Divisors Prime representations Important theorems about primality Greatest Common Divisors Least Common Multiples Euclid s algorithm Once and for all, what are prime

More information

Efficient Recovery of Secrets

Efficient Recovery of Secrets Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

Distributed Storage Networks and Computer Forensics

Distributed Storage Networks and Computer Forensics Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Kofax White Paper. Best Practice for Automatic Invoice Capture with Advanced Recognition. Executive Summary. Business Problems

Kofax White Paper. Best Practice for Automatic Invoice Capture with Advanced Recognition. Executive Summary. Business Problems Kofax White Paper Executive Summary To cope with increased workloads and added responsibilities, AP departments are looking to streamline as much of the invoice process as they can. This white paper discusses

More information

Question: What is the probability that a five-card poker hand contains a flush, that is, five cards of the same suit?

Question: What is the probability that a five-card poker hand contains a flush, that is, five cards of the same suit? ECS20 Discrete Mathematics Quarter: Spring 2007 Instructor: John Steinberger Assistant: Sophie Engle (prepared by Sophie Engle) Homework 8 Hints Due Wednesday June 6 th 2007 Section 6.1 #16 What is the

More information

RN-Codings: New Insights and Some Applications

RN-Codings: New Insights and Some Applications RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently

More information

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant

More information

Network File Storage with Graceful Performance Degradation

Network File Storage with Graceful Performance Degradation Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Every Positive Integer is the Sum of Four Squares! (and other exciting problems)

Every Positive Integer is the Sum of Four Squares! (and other exciting problems) Every Positive Integer is the Sum of Four Squares! (and other exciting problems) Sophex University of Texas at Austin October 18th, 00 Matilde N. Lalín 1. Lagrange s Theorem Theorem 1 Every positive integer

More information

Methods for Finding Bases

Methods for Finding Bases Methods for Finding Bases Bases for the subspaces of a matrix Row-reduction methods can be used to find bases. Let us now look at an example illustrating how to obtain bases for the row space, null space,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

A characterization of trace zero symmetric nonnegative 5x5 matrices

A characterization of trace zero symmetric nonnegative 5x5 matrices A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the

More information

Math 312 Homework 1 Solutions

Math 312 Homework 1 Solutions Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

160 CHAPTER 4. VECTOR SPACES

160 CHAPTER 4. VECTOR SPACES 160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results

More information

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely

More information

Two classes of ternary codes and their weight distributions

Two classes of ternary codes and their weight distributions Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight

More information

Codes for Network Switches

Codes for Network Switches Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering

More information

The last three chapters introduced three major proof techniques: direct,

The last three chapters introduced three major proof techniques: direct, CHAPTER 7 Proving Non-Conditional Statements The last three chapters introduced three major proof techniques: direct, contrapositive and contradiction. These three techniques are used to prove statements

More information

FACTORING SPARSE POLYNOMIALS

FACTORING SPARSE POLYNOMIALS FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S

More information

Chapter 2 Data Storage

Chapter 2 Data Storage Chapter 2 22 CHAPTER 2. DATA STORAGE 2.1. THE MEMORY HIERARCHY 23 26 CHAPTER 2. DATA STORAGE main memory, yet is essentially random-access, with relatively small differences Figure 2.4: A typical

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

PEDS: A Parallel Error Detection Scheme for TCAM Devices

PEDS: A Parallel Error Detection Scheme for TCAM Devices 1 PEDS: A Parallel Error Detection Scheme for TCAM Devices Anat Bremler-Barr, Member, IEEE, David Hay, Member, IEEE, Danny Hendler and Ron M. Roth, Fellow, IEEE Abstract Ternary content-addressable memory

More information

Solving Linear Systems, Continued and The Inverse of a Matrix

Solving Linear Systems, Continued and The Inverse of a Matrix , Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

Just the Factors, Ma am

Just the Factors, Ma am 1 Introduction Just the Factors, Ma am The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

1 Definition of a Turing machine

1 Definition of a Turing machine Introduction to Algorithms Notes on Turing Machines CS 4820, Spring 2012 April 2-16, 2012 1 Definition of a Turing machine Turing machines are an abstract model of computation. They provide a precise,

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S.

Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S. Definition 51 Let S be a set bijection f : S S 5 Permutation groups A permutation of S is simply a Lemma 52 Let S be a set (1) Let f and g be two permutations of S Then the composition of f and g is a

More information

Big Data @CH. Christian Lovis Division of Medical Information Sciences [email protected]. university hospitals of Geneva

Big Data @CH. Christian Lovis Division of Medical Information Sciences christian.lovis@hcuge.ch. university hospitals of Geneva Big Data @CH Christian Lovis Division of Medical Information Sciences [email protected] 1 Stilboestrol in complicated pregnancy 2 Let s start with a true story Die Lebensmittelüberwacher hatten

More information

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

More information

A simple criterion on degree sequences of graphs

A simple criterion on degree sequences of graphs Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree

More information

Executive Functions and Reading: A Neuropsychological Perspective

Executive Functions and Reading: A Neuropsychological Perspective Executive Functions and Reading: A Neuropsychological Perspective Presented by George McCloskey, Ph.D. Philadelphia College of Osteopathic Medicine [email protected] or [email protected] 1 Source Acknowledgement

More information

Triangle deletion. Ernie Croot. February 3, 2010

Triangle deletion. Ernie Croot. February 3, 2010 Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,

More information

Settling a Question about Pythagorean Triples

Settling a Question about Pythagorean Triples Settling a Question about Pythagorean Triples TOM VERHOEFF Department of Mathematics and Computing Science Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands E-Mail address:

More information

Geometric Transformations

Geometric Transformations Geometric Transformations Definitions Def: f is a mapping (function) of a set A into a set B if for every element a of A there exists a unique element b of B that is paired with a; this pairing is denoted

More information

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA 2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007 Hawaii, USA, May 29 31, 2007 An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel Gou HOSOYA, Hideki YAGI,

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan

Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 3 Binary Operations We are used to addition and multiplication of real numbers. These operations combine two real numbers

More information

Solving Systems of Linear Equations

Solving Systems of Linear Equations LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how

More information

Colored Hats and Logic Puzzles

Colored Hats and Logic Puzzles Colored Hats and Logic Puzzles Alex Zorn January 21, 2013 1 Introduction In this talk we ll discuss a collection of logic puzzles/games in which a number of people are given colored hats, and they try

More information

α = u v. In other words, Orthogonal Projection

α = u v. In other words, Orthogonal Projection Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v

More information

The four [10,5,4] binary codes

The four [10,5,4] binary codes 1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the

More information

C H A P T E R Regular Expressions regular expression

C H A P T E R Regular Expressions regular expression 7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical

More information