변 우 성변 우 성 1/10 2001 년 6 월 2 일 변 우 성 연세대학교 전기전자공학과 부호 및 정보이론 연구실 Introduction and Explanation of Exercise #5 & #6.

Slides:



Advertisements
Similar presentations
Notes 6.6 Fundamental Theorem of Algebra
Advertisements

Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Lecture 7: Spread Spectrum
Algebraic Structures DEFINITIONS: PROPERTIES OF BINARY OPERATIONS Let S be a set and let  denote a binary operation on S. (Here  does not necessarily.
Generalized Derangements Anthony Fraticelli Missouri State University REUJuly 30, 2009 Advisor: Dr. Les Reid.
Copyright 2005, Agrawal & BushnellVLSI Test: Lecture 21alt1 Lecture 21alt BIST -- Built-In Self-Test (Alternative to Lectures 25, 26 and 27) n Definition.
Session 2 Symmetric ciphers 1. Stream cipher definition Recall the Vernam cipher: Plaintext Ciphertext (Running) key
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Analysis of Boolean Functions Fourier Analysis, Projections, Influence, Junta, Etc… And (some) applications Slides prepared with help of Ricky Rosen.
Linearization of Stream Ciphers in Terms of Cellular Automata Amparo Fúster-Sabater Institute of Applied Physics (CSIC) Madrid (Spain)
Design for Testability Theory and Practice Lecture 11: BIST
ENGG2013 Unit 13 Basis Feb, Question 1 Find the value of c 1 and c 2 such that kshumENGG20132.
Deterministic Length Reduction: Fast Convolution in Sparse Data and Applications Written by: Amihood Amir, Oren Kapah and Ely Porat.
Chapter 5. Operations on Multiple R. V.'s 1 Chapter 5. Operations on Multiple Random Variables 0. Introduction 1. Expected Value of a Function of Random.
1 Wavelets Examples 王隆仁. 2 Contents o Introduction o Haar Wavelets o General Order B-Spline Wavelets o Linear B-Spline Wavelets o Quadratic B-Spline Wavelets.
Session 2: Secret key cryptography – stream ciphers – part 1.
Generating Random Numbers in Hardware. Two types of random numbers used in computing: --”true” random numbers: ++generated from a physical source (e.g.,
Chapter 8. Section 8. 1 Section Summary Introduction Modeling with Recurrence Relations Fibonacci Numbers The Tower of Hanoi Counting Problems Algorithms.
Great Theoretical Ideas in Computer Science.
Copyright © Cengage Learning. All rights reserved. CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION.
Advanced Counting Techniques CSC-2259 Discrete Structures Konstantin Busch - LSU1.
Chapter 8 With Question/Answer Animations 1. Chapter Summary Applications of Recurrence Relations Solving Linear Recurrence Relations Homogeneous Recurrence.
Random-Number Generation Andy Wang CIS Computer Systems Performance Analysis.
Solving Second-Order Recursive Relations Lecture 36 ½ Section 8.3 Wed, Apr 19, 2006.
CSCI 115 Chapter 3 Counting. CSCI 115 §3.1 Permutations.
Recent Attacks on the Filter Generator Tor Helleseth Department of Informatics University of Bergen NORWAY Joint work: Sondre Rønjom and Guang Gong.
Find Rational Zeros, I Objectives: 1.To find the zeros of a polynomial function 2.To use the Rational Zero Theorem to find the possible rational zeros.
Cyclic Codes for Error Detection W. W. Peterson and D. T. Brown by Maheshwar R Geereddy.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Session 1 Stream ciphers 1.
ECE 5221 Personal Communication Systems
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
2.7 Apply the Fundamental Theorem of Algebra Polynomials Quiz: Tomorrow (over factoring and Long/Synthetic Division) Polynomials Test: Friday.
Fall 2015 COMP 2300 Discrete Structures for Computation Donghyun (David) Kim Department of Mathematics and Physics North Carolina Central University 1.
COMPLEX ZEROS: FUNDAMENTAL THEOREM OF ALGEBRA Why do we have to know imaginary numbers?
2001 년 6 월 진석용 연세대학교 기계전자공학부 The Theory of m-sequence The Run Property of m-sequence.
TOPIC : Signature Analysis. Introduction Signature analysis is a compression technique based on the concept of (CRC) Cyclic Redundancy Checking It realized.
Chapter 8 Recursion. 8.3 More Recurrence Second-Order Recurrence Definition – A second-order linear homogeneous recurrence relation with constant coefficients.
Including Solving polynomial equations. Exercise 4A.
Polynomial Functions and Models
ECE 5233 Satellite Communications Prepared by: Dr. Ivica Kostanic Lecture 19: Multiple Access Schemes (4) (Section 6.8) Spring 2011.
Table of Contents Solving Polynomial Equations – Factoring Method A special property is needed to solve polynomial equations by the method of factoring.
Table of Contents First get all nonzero terms on one side. Quadratic Equation: Solving by factoring Example: Solve 6x 2 – 13x = 8. 6x 2 – 13x – 8 = 0 Second.
Agenda Lecture Content:  Recurrence Relations  Solving Recurrence Relations  Iteration  Linear homogenous recurrence relation of order k with constant.
The Fundamental Theorem of Algebra It’s in Sec. 2.6a!!! Homework: p odd, all.
Section 4.6 Complex Zeros; Fundamental Theorem of Algebra.
The Real Zeros of a Polynomial Function Section 5.2 Also Includes Section R.6 : Synthetic Division 1.
Code Division Multiple Access (CDMA) Transmission Technology
1 SVY 207: Lecture 5 The Pseudorange Observable u Aim of this lecture: –To understand how a receiver extracts a pseudorange measurement from a GPS signal.
Conjugate Pairs Theorem Every complex polynomial function of degree n  1 has exactly n complex zeros, some of which may repeat. 1) A polynomial function.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
1.  How does the computer generate observations from various distributions specified after input analysis?  There are two main components to the generation.
1 Design and Analysis of Algorithms Yoram Moses Lecture 13 June 17, 2010
Spread spectrum modulation Chapter 9.
2001 년 6 월 2 일 정지욱 연세대학교 전기전자공학과 Span Property 정지욱 1/7.
Recursion and Recurrence Relations
Solving Quadratic Equations by Factoring
Chapter 2 Planes and Lines
Sorting Networks Characteristics The basic unit: a comparator
The Fundamental Theorem of Algebra and Complete Factorization
Descartes Rule of Signs Positive real zeros = Negative real zeros =
Figure 12-13: Synchronous Binary Counter
Random-Number Generation
Stream Ciphers Day 18.
Warm Up Factor completely. 1. 2y3 + 4y2 – 30y 2y(y – 3)(y + 5)
Fundamental Theorem of Algebra
Write the recursive and explicit formula for the following sequence
4.1: Polynomial Functions
Presentation transcript:

변 우 성변 우 성 1/ 년 6 월 2 일 변 우 성 연세대학교 전기전자공학과 부호 및 정보이론 연구실 Introduction and Explanation of Exercise #5 & #6

변 우 성변 우 성 2/10 Table of Contents  Exercise #5 –Introduction and related Theorem –Explanation of exercise #5 –Discussion  Exercise #6 –Introduction and related Theorem –Explanation of exercise #6 –Discussion

변 우 성변 우 성 3/10 Exercise #5  Introduction  Suppose a binary sequence of length 31 is selected at random. Calculate the expected number of 0-runs and 1-runs of lengths 1, 2, 3, 4, and 5. Compare your result to Theorem  Theorem 10.2 Run-length property  Approach  Make a binary random sequence of length 31 by C programming  Find and Calculate the number of 0-runs and 1-runs of each length  Compare

변 우 성변 우 성 4/10 Exercise #5  Explanation(1/2)  Binary random sequence (made by C) –“ ” –Result

변 우 성변 우 성 5/10 Exercise #5  Explanation(2/2)  Result to Theorem 10.2

변 우 성변 우 성 6/10 Exercise #5  Discussion  The number of 0-runs and 1-runs different between m- sequence and arbitrary random sequence  In conclusion, Run-length property is exactly applied to m-sequence

변 우 성변 우 성 7/10 Exercise #6  Introduction  According to Theorem 10.1, each of the 31 different nonzero 5-grams appears once in the m-sequence of length 31 given in Example In this problem, we ask you to consider the 6-grams of that sequence. A. How many of the 64 possible 6-grams appear in the length 31 m-sequence of Example 10.1? B. Show that there exists a fixed length 6 vector a with the property that the 6-gram x appears in the m-sequence if and only if x is not zero and x ㆍ a=0. Find a explicitly.  Theorem 10.1 Window property  Approach  This problem is related to generate the m-sequence by the linear feedback shift registers

변 우 성변 우 성 8/10 Exercise #6  Explanation of A  If a repeated 6-gram exists, the period of sequence is sooner than 31, because of recurrence relation  In conclusion, the number of 6-gram is 31  Explanation of B(1/2)  Vector a is a fixed length 6 vector and satisfies x ㆍ a=0  Here vector x is a 6-gram vector x = (x 1, x 2, x 3, x 4, x 5, x 6 )  By the way, x ㆍ a = a 1 x 1 +a 2 x 2 +a 3 x 3 +a 4 x 4 +a 5 x 5 +a 6 x 6 and this is the recursion

변 우 성변 우 성 9/10 Exercise #6  Explanation of B(2/2)  Under circuit to implement the recursion x 6 = x 3 + x 1, whose characteristic polynomial is the primitive polynomial x 5 +x 2 +1  x 6 = x 3 + x 1 x 6 + x 3 + x 1 =0  In conclusion, a 6 = 1, a 3 = 1, a 1 = 1 a = (1, 0, 1, 0, 0, 1) m-sequence output(m=5) x6x6 x5x5 x1x1 x2x2 x3x3 x4x4

변 우 성변 우 성 10/10 Exercise #6  Discussion  Check the result except all zero Total number of 6-grams  If a fixed length m+1 vector a of m-sequence satisfies x ㆍ a=0, vector a is the set of coefficient of recursion