On conflict-avoiding codes of weight 3 and odd length Kenneth Shum Oct 2011.

Slides:



Advertisements
Similar presentations
Chapter 2 Revision of Mathematical Notations and Techniques
Advertisements

Inapproximability of Hypergraph Vertex-Cover. A k-uniform hypergraph H= : V – a set of vertices E - a collection of k-element subsets of V Example: k=3.
Set Cover 資工碩一 簡裕峰. Set Cover Problem 2.1 (Set Cover) Given a universe U of n elements, a collection of subsets of U, S ={S 1,…,S k }, and a cost.
INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods.
Longest Common Subsequence
22C:19 Discrete Math Graphs Fall 2010 Sukumar Ghosh.
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
GOLOMB RULERS AND GRACEFUL GRAPHS
2.1 Sets. DEFINITION 1 A set is an unordered collection of objects. DEFINITION 2 The objects in a set are called the elements, or members, of the set.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
Train DEPOT PROBLEM USING PERMUTATION GRAPHS
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
Chapter 7 Relations : the second time around
Convergent and Correct Message Passing Algorithms Nicholas Ruozzi and Sekhar Tatikonda Yale University TexPoint fonts used in EMF. Read the TexPoint manual.
Approximation Algorithms
Combinatorial Designs and Related Discrete Combinatorial Structures Sarah Spence Adams Fall 2008.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Costas Busch - RPI1 Mathematical Preliminaries. Costas Busch - RPI2 Mathematical Preliminaries Sets Functions Relations Graphs Proof Techniques.
Variable-Length Codes: Huffman Codes
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
9.2 Graph Terminology and Special Types Graphs
Graph Theory Chapter 6 from Johnsonbaugh Article(6.1, 6.2)
Hungarian Algorithm Vida Movahedi Elderlab, York University June 2007.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Sets.
On the intersection of submonoids of the free monoid L. Giambruno A. Restivo.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
Mathematical Preliminaries. Sets Functions Relations Graphs Proof Techniques.
1 Rotational and Cyclic Cycle Systems 聯 合 大 學 吳 順 良.
Chapter 2 Greedy Strategy I. Independent System Ding-Zhu Du.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
Mathematical Preliminaries
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1.1 Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises.
Implicit Hitting Set Problems Richard M. Karp Erick Moreno Centeno DIMACS 20 th Anniversary.
Some Computation Problems in Coding Theory
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Chapter 8: Relations. 8.1 Relations and Their Properties Binary relations: Let A and B be any two sets. A binary relation R from A to B, written R : A.
Introduction to Graph Theory
1 Covering Non-uniform Hypergraphs Endre Boros Yair Caro Zoltán Füredi Raphael Yuster.
1 Mathematical Preliminaries. 2 Sets Functions Relations Graphs Proof Techniques.
1 Section 4.2 Equivalence Relations A binary relation is an equivalence relation if it has the three properties reflexive, symmetric, and transitive (RST).
Introduction to Graph Theory By: Arun Kumar (Asst. Professor) (Asst. Professor)
Set Operations Section 2.2.
A Graph Covering Algorithm for a Coarse Grain Reconfigurable System Yuanqing Guo, Gerard J.M. Smit Hajo Broersma, Paul M. Heysters Lin, Shang-Wei Embedded.
Xuding Zhu National Sun Yat-sen University Circular chromatic index.
Relations and Their Properties
An introduction to chordal graphs and clique trees
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
Relations Binary relations represent relationships between the elements of two sets. A binary relation R from set A to set B is defined by: R  A 
Equivalence Relations
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Recent Interests and Progress Hung-Lin Fu (傅恒霖)
Rainbow cycles in flip graphs
What is the next line of the proof?
Chapter 5. Optimal Matchings
3.3 Applications of Maximum Flow and Minimum Cut
On Sequential Locally Repairable Codes
Max Flow Min Cut, Bipartite Matching Yin Tat Lee
Student:連敏筠 Advisor:傅恆霖
Optimal Conflict-avoiding Codes of Odd Length Weight Three
5.4 T-joins and Postman Problems
Winter 2019 Lecture 11 Minimum Spanning Trees (Part II)
Locality In Distributed Graph Algorithms
Autumn 2019 Lecture 11 Minimum Spanning Trees (Part II)
Presentation transcript:

On conflict-avoiding codes of weight 3 and odd length Kenneth Shum Oct 2011

Definitions Optical orthogonal code OOC(n,w, a, c ) – Length n – Weight w – Hamming auto-correlation  a – Hamming cross-correlation  c Conflict-avoiding code (Tsybakov and Rubinov (02)) CAC(n,w) = OOC(n,w, ,1) no requirement on Hamming auto-correlation. Oct 2011kshum 2

Application to multiple-access collision channel without feedback Oct 2011kshum 3 Hello ! message Scheduler Packet 1Packet 2Packet 3Packet 4 Channel coding (Reed-Solomon) Any two packets can recover the original message x Receiver x x Other user Hello ! collision

Parameters Number of codewords = T – Total number of potential users – Each user is statically assigned a unique codeword Sequence period = n – maximal delay experience by an active user Hamming weight = w – Maximal number of simultaneously active users Objective: Given n and w, maximize T Oct 2011kshum 4

Outline Review of the literature on CAC Formulation using graph theory Some new optimal CAC of weight 3 and odd length Oct 2011kshum 5

Maximal number of codewords Let M(n,w) be largest number of codewords in a CAC of length n and weight w. Levenshtein (07) Oct 2011kshum 6 for n = 4t + 2 for odd n, n 

CAC of even length and weight 3 For n = 4t, Oct 2011kshum 7 Jimbo, Mishima, Janiszewski, Teymorian and Tonchev (07) Mishima, Fu and Uruno (09) Fu, Lin and Mishima (10)

CAC of weight > 3 Some constructions of optimal CAC of weight 4 and 5 – Momihara, Müller, Satoh and Jimbo (07) CAC in general – S and Wong Oct 2011kshum 8 For w  3,

Outline Review of the literature on CAC Formulation using graph theory – hypergraph matching Some new optimal CAC of weight 3 and odd length Oct 2011kshum 9

Terminology A binary sequence can be represented by a characteristic set. – Sequence:  {1,2,5} Indices The set of differences contains the separations between the ones in a sequence –  (A) = {x – y mod n: x, y  A, x  y} – For example  ({1,2,5}) = {1,3,4,5,7} Oct 2011kshum

Equivalent definition of CAC The characteristic sets of CAC is a collection of subsets of Z n, say A 1, A 2, …, A M, such that – Each of them has size w. –  (A i )   (A k ) =  for i  k. Example: n=15, –  {0,1,2},  ({0,1,2}) = {1,2,13,14} –  {0,3,6},  ({0,3,6}) = {3,6,9,12} –  {0,4,8},  ({0,4,8}) = {4,7,8,11} –  {0,5,10},  ({0,5,10}) = {5,10} Oct 2011kshum 11 distinct  (A) = {x – y mod n: x, y  A, x  y}

Equi-difference codewords By cyclically shifting the sequence, we can assume without loss of generality that 0 belongs to the characteristic set. For sequence with Hamming weight 3, we can write the characteristic set as {0,a,b} WLOG. –  ({0,a,b}) = {  a,  b,  (a – b)} In particular, a sequence with characteristic set {0,a,2a} is said to be equi-difference. – The integer a is called the generator of this codeword –  ({0,a,2a}) = {  a,  2a} Oct 2011kshum a b-a b a a 2a

Formulation using (hyper)graph Observation: x   (A) implies n – x   (A)  we can identify x and –x mod n. Assume n odd. Let m = (n – 1)/2. Undirected graph with vertex set {1,2,…,m}. Construct hyperedges  ({0,a,b})  {1,2,…,m} – for a and b running over all distinct elements in {1,2,…,n} Objective: look for a maximal collection of non- intersecting hyperedges. – A matching problem. Oct 2011kshum 13

A greedy method for equi- difference codewords Oct 2011kshum n=15, m=  {0,1,2}   ({0,1,2}) = {  1,  2}  {0,2,4}   ({0,2,4}) = {  2,  4}. (conflict with {0,1,2})  {0,3,6}   ({0,3,6}) = {  3,  6}  {0,4,8}   ({0,4,8}) = {  4,  7}  {0,5,10}   ({0,5,10}) = {  5}  {0,6,12}   ({0,6,12}) = {  3,  6} (conflict with {0,3,6})  {0,7,14}   ({0,7,14}) = {  1,  4} (conflict with {0,1,2}) and {0,4,8} A perfect matching Each vertex is covered by a red edge, and all red edges are disjoint.

Another example: n = 31, m = 15 equi-difference codewords only Oct 2011kshum {0,1,2} {0,4,8} {0,5,10} {0,9,18} {0,3,6} {0,7,14} Theorem (Levenshtein (07)) The graph with edges from the equi-difference codewords are decomposed into cycles. Find a maximal matching Six equi-difference codewords

The optimal solution with hyperedges Oct 2011kshum {0,15,30} {0,4,8} {0,10,20} {0,9,18} {0,6,12} {0,7,14} Seven codewords {0,6,13} An example of hyperedge {0,2,6} Another example of hyperedge {0,2,5} Look for a hyperedge which intersects three distinct odd cycles

M(31,3) = 7 n=31 – {0,4,8}  – {0,6,12}  – {0,7,14}  – {0,9,18}  – {0,10,20}  – {0,15,30}  – {0,2,5}  Oct 2011kshum 17

The cycle graph for n=99. Oct 2011kshum {0,1,11} {0,6,15}

M(99,3) = 24 Two non-equi-difference codewords: {0,1,11}, {0,6,15}. Twenty two equi-difference codewords generated by 2,7,8,12,13,17,18,19,20,21,22,23,25, 27,28,29,30,31,32,33,47,48. Oct 2011kshum 19

A sufficient condition for being an optimal CAC Theorem 1: – Let n be an odd integer, and let N odd (n) be the number of odd-cycle in the graph. – If we can find  N odd (n) / 3  mutually disjoint hyperedge of size 3 lying across 3   N odd (n) / 3  cycles of odd length, then equality holds. Oct 2011kshum 20

The upper bound in Thm 1 is not tight Theorem 2: for e  1, Oct 2011kshum 21 For n= powers of 3 or 7, M(n,3) is strictly less than the upper bound in Theorem 1. (because in these cases, non-equi-difference codewords are not useful in constructing optimal CAC.)

Oct 2011kshum 22 n M(n,3) Thm 2 n M(n,3)7*7*8*8* *11 new Thm 2 n M(n,3)13 14* new n M(n,3)1717* * newThm 2new n M(n,3)2223*232424* new * non-equiv-difference codewords are required to construct optimal CAC

Conclusion Numerical results: – For all odd n <500, except n=81, 189, 243, 343, 405, 441, – M(81,3) = 19, M(189,3) = 47 – M(243,3) = 60, M(343,3) = 85 – M(405,3) = 101, M(441,3) = 110 Oct 2011kshum 23 81=3 4, 189 = 3 3  7 243=3 5, 343=7 3, 405 = 3 4  5, 441 = 3 2  7 2.

References Tsybakov and Rubinov, Some constructions of conflict-avoiding codes, Problems of Inf. Trans., V. I. Levenshtein, Conflict-avoiding codes and cyclic triple systems, Probems of Inf. Trans., M. Jimbo et al., On conflict-avoiding codes of length n=4m for three active users, IEEE Trans. Inf. Theory, M. Mishima, H.-L. Fu and S. Uruno, Optimal conflict-avoiding codes of length n  0(mod16) and weight 3, Des. Codes Cryptogr., H.-L. Fu, Y.-H. Lin and M. Mishima, Optimal conflict-avoiding codes of even length and weight 3, IEEE Trans. Inf. Theory, K. W. Shum and W. S. Wong, A tight asymptotic bound on the size of constant-weight conflict-avoiding codes, Des. Codes Cryptogr., Oct 2011kshum 24

Oct 2011kshum 25 n M(n,3) *31* Thm 1 n M(n,3) n M(n,3)36*3838*394039*4041*4142 Thm 1 n M(n,3)41*43 44* Thm 1 Similar to Thm 2 n M(n,3) * * Thm 1 * non-equiv-difference codewords are required to construct optimal CAC

Oct 2011kshum 26 n M(n,3)525353*52*54*5555*56 57 Thm 1 n M(n,3)57* * Thm 1 Thm 2Thm 1 n M(n,3)60* *67 Thm 1 n M(n,3) * 70*71*7172 Thm 1 n M(n,3)73 73*7474*76 76*77 Thm 1 * non-equiv-difference codewords are required to construct optimal CAC

Oct 2011kshum 27 n M(n,3) * * Thm 1 n M(n,3)80*83 82*8584* Thm 1 Thm 2 n M(n,3) *89*9192 Thm 1 n M(n,3) *95 94*97 Thm 1 n M(n,3)9798*989999*100100* Thm 1 Similar to Thm 2 * non-equiv-difference codewords are required to construct optimal CAC

Oct 2011kshum 28 n M(n,3) * * Thm 1 n M(n,3)106* * *112 Thm 1 Similar to Thm 2 Thm 1 n M(n,3)112112* *116 Thm 1 n M(n,3)118116* * * Thm 1 n M(n,3) * 124* Thm 1 * non-equiv-difference codewords are required to construct optimal CAC

Oct 2011kshum 29 n M(n,3) * * n M(n,3)106* * *112 n M(n,3)112112* *116 n M(n,3)118116* * * n M(n,3) * 124* * non-equiv-difference codewords