Codes & the Hat Game Troy Lynn Bullock John H. Reagan High School, Houston ISD Shalini Kapoor McArthur High School, Aldine ISD Faculty Mentor: Dr. Tie.

Slides:



Advertisements
Similar presentations
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Advertisements

Information and Coding Theory
Tengyu MaXiaoming SunHuacheng Yu Institute for Interdisciplinary Information Sciences Tsinghua University Institute for Advanced Study, Tsinghua University.
Day 2 Information theory ( 信息論 ) Civil engineering ( 土木工程 ) Cultural exchange.
Maths the Modern Way!! Addition and Subtraction
1 Multi-radio Channel Allocation algorithms based on game theory analysis Shirin Saeedi Bidokhti Supervised by Mark Felegyhazi Prof. Hubaux Feb
Troy Lynn Bullock – Reagan High School Houston Independent School District Faculty Mentor : Dr. Tie Liu Information Theory and Coding for Wireless Broadcast.
Lecture 40 CSE 331 Dec 11, Announcements Solutions to HW 10 and graded HW 9 at end of the lecture Review session on Monday: see blog for details.
CSE 501 Research Overview Atri Rudra
ENGS Lecture 8 ENGS 4 - Lecture 8 Technology of Cyberspace Winter 2004 Thayer School of Engineering Dartmouth College Instructor: George Cybenko,
Lecture 41 CSE 331 Dec 10, HW 10 due today Q1 in one pile and Q 3+4 in another I will not take any HW after 1:15pm.
UCB Claude Shannon – In Memoriam Jean Walrand U.C. Berkeley
Page 1 Who Can Make the Biggest Crystal? Tameka Whitney Dallas ISD W.W. Samuell High School Faculty Mentor: Raymundo Arroyave, Ph.D. Department of Mechanical.
Coding Theory: Packing, Covering, and 2-Player Games Robert Ellis Menger Day 2008: Recent Applied Mathematics Research Advances April 14, 2008.
Thermoelectrical Properties of Nano Structures Emery Kelly, Design and Technology Academy, North East ISD, San Antonio Emery Kelly, Design and Technology.
We are at a tipping point and our economic survival is at stake Already, our major high tech industries including IBM, Intel, and TI have moved or are.
Algorithms in Exponential Time. Outline Backtracking Local Search Randomization: Reducing to a Polynomial-Time Case Randomization: Permuting the Evaluation.
Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.
Sep 06, 2005CS477: Analog and Digital Communications1 Introduction Analog and Digital Communications Autumn
Abstract Data Types (ADT)
2/28/03 1 The Virtues of Redundancy An Introduction to Error-Correcting Codes Paul H. Siegel Director, CMRR University of California, San Diego The Virtues.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
Adaptive Coding from a Diffusion Process on the Integer Line Robert Ellis October 26, 2009 Joint work with Joshua Cooper, University of South Carolina.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College
Designing a wireless communication System Presented by: Shalini Kapoor MacArthur HS,Aldine ISD Faculty Mentor: Dr. Tie Liu Dr. Tie Liu “Information theory.
Maui Akamai Internship
Rényi-Ulam liar games with a fixed number of lies Robert B. Ellis Illinois Institute of Technology University of Illinois at Chicago, October 26, 2005.
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Games, Hats, and Codes Mira Bernstein Wellesley College SUMS 2005.
Maths Counts Insights into Lesson Study 1. Sharon Mack, Irene Stone and Gemma Fay 3 rd Years Problem Solving as a “Means” not an “End” Normally we teach.
Maths Counts Insights into Lesson Study 1. Sandra Fay, Irene Stone, Sharon Mack First year Junior Cert An Introduction to Patterns 2.
Effective Questioning in the classroom
Building Mental Math and Reasoning
Thesis Statements. In the Beginning… »A thesis statement is the claim you are going to PROVE in your paper »A claim an opinion/assertion open to challenge.
What is Critical Thinking?
The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
Lecture Discrete Probability. 5.1 Probabilities Important in study of complexity of algorithms. Modeling the uncertain world: information, data.
DASH Developmental Approaches in Science, Health and Technology Sumiko Hirata Tatashi Binejal Lucy Samuel Lucia Hisaiah.
Section 7.1. Section Summary Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Experimental Economics NSF short course David Laibson August 11, 2005.
Summer 2004CS 4953 The Hidden Art of Steganography A Brief Introduction to Information Theory  Information theory is a branch of science that deals with.
Introduction to Digital and Analog Communication Systems
6/4/2016MATH 106, Section 191 Section 20 Dice Last Section we will cover!!!! We will finish this section in this class or early next class. Use the remainder.
IN:  What is science?  What is engineering?. The Scientific Method = organized approach to problem-solving (Old View)  Observation  State the Problem.
Max Marchitello and Will Ragland September 16, 2015
Effects of Radiation on Materials in a Nuclear Reactor Amy Ging Van Vleck High School / Van Vleck ISD Dr. Lin Shao Department of Nuclear Engineering.
A Closer Look at Game Theory: The Hat Puzzle By Julia Greenberger.
How can computational simulation and modeling be used to create lead-free alloys? Tameka Whitney W.W. Samuell HS, Dallas ISD Faculty Mentor: Raymundo Arroyave,
Elementary Coding Theory Including Hamming and Reed-Solomom Codes with Maple and MATLAB Richard Klima Appalachian State University Boone, North Carolina.
1 Welcome to CASSEL Welcome to the CASSEL Lab, and thank you for participating in today’s experiment. It is very important that you do not touch the computer.
Writing a Science or Engineering Paper: It is just a story Frank Shipman Department of Computer Science Texas A&M University.
Convolutional Coding In telecommunication, a convolutional code is a type of error- correcting code in which m-bit information symbol to be encoded is.
Shanon Weaver Model Sujit Kumar Mohanty Assistant Professor Department of Journalism & Mass Communication Central University of Orissa Presentation at:-
1 CSCD 433 Network Programming Fall 2013 Lecture 5a Digital Line Coding and other...
1 Decision Trees Greg Grudic (Notes borrowed from Thomas G. Dietterich and Tom Mitchell) [Edited by J. Wiebe] Decision Trees.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
DIGITAL COMMUNICATION. Introduction In a data communication system, the output of the data source is transmitted from one point to another. The rate of.
Why do Research? To learn more about the world. To learn more about us. To improve our lives and protect the environment. Its Fun!
1 CSCD 433 Network Programming Fall 2016 Lecture 4 Digital Line Coding and other...
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Introduction to Randomized Algorithms and the Probabilistic Method
THE NEED FOR ADDRESSING
Advanced Computer Networks
Information and Communication Unit 5, Lesson 4 Explanation
Presentation transcript:

Codes & the Hat Game Troy Lynn Bullock John H. Reagan High School, Houston ISD Shalini Kapoor McArthur High School, Aldine ISD Faculty Mentor: Dr. Tie Liu Graduate Assistant: Neeharika Marukala

Outline An introduction to communication systems Error correction codes The hat game Lesson plan

Introduction Communications touches the lives of everyone in many ways. Lets look at some applications of communications in this information age!

An Information Age The Internet

An Information Age Deep-space communication

An Information Age Satellite broadcasting

An Information Age Cell phone and modem

An Information Age Data storage

Basic Communication System Information Source TransmitterReceiver Destination Communication Channel Bits Waveform Distortion

Communication Channel Introduce distortion to the transmit signal As a result, some bits are flipped at the receiver (e.g., 0→1 or 1→0) Which bits will be flipped are random/unpredictable Random bit flipping conveys false information to the destination and is bad for communication Solution: Error Correction Codes

Repetition Codes Consider using bit “0” to represent 0 and “1” to represent 1: If the bit is flipped, then we have no idea which bit was sent Now consider using three bits “000” to represent 0 and “111” to represent 1” If only one of the three bits is flipped, we can still make out which bit was sent by looking at the majority of the bits More errors can be corrected by making more repetitions Research question: Can we find codes that are more efficient than repetition codes?

Coding Efficiency Can we do better?

Coding Theory A branch of modern mathematics With deep connections to: Theory of finite field Algebraic geometry Number theory Combinatorics Algorithm Complexity theory Information Theory With applications from deep-space communications to consumer electronics A perfect example on how good mathematics can significantly impact our daily life

Achieving Immortalities Richard Hamming Irvine Reed & Gustave Solomon Elwyn Berlekamp Claude Berrou Robert Gallager

The Hat Game The Setup: One team of three contestants are in a room. A red or blue hat is randomly put on each contestant; each contestant can see the hats of everyone else but not his/her own. The Game: Each contestant must (simultaneously) 1. Guess the color of his/her hat, 2. Or pass. To Win: At least one contestant guessed correctly, and no one guessed incorrectly. The team can confer on a strategy beforehand.

What Strategy Can Be Used? A “Naïve” Strategy Pick a team captain. The captain guesses red/blue randomly. everyone else passes. This strategy wins 50% of the time. CAN WE DO BETTER??

A Better Strategy Each contestant does:  If the other two hats are different colors, pass.  If the other two hats are the same color, guess the opposite color.

Analysis This strategy wins of the time! HATSGUESSESWIN? no 1001xxyes 010x1xyes 001xx1yes 110xx0yes 101x0xyes 0110xxyes no

Lessons Learned It’s OK to make a mistake. But when we make mistakes, it’s better to make mistakes together as a team. When lacking evidence, it’s good to “keep quiet” for the team.

Recording Sheet for Hat Game

Geometric Interpretations For n=3 players “Bad” sequence “Good” sequence

Geometric Interpretations For n=2 k -1 players, use Hamming Codes as “bad” sequences Hamming Ball

“Perfect” Codes For n=2 k -1, all possible 2 n binary sequences can be partitioned into Hamming balls of radius 1 Since the Hamming balls are non-overlapping, Hamming codes can correct any single bit flip at the minimum redundancy For k=2, Hamming codes are the same as repetition codes For k>2, Hamming codes are much more efficient than repetition codes

Coding Efficiency Hamming Codes Repetition Codes

What about n≠2 k -1? Still need to “cover” all binary sequences using Hamming balls of radius 1 The Hamming balls may have to overlap

What about n≠2 k -1? What are the optimum choices for the “bad” sequences? Answers are known only for n=3~8 despite the effort of many famous mathematicians A perfect challenge for kids to try a world- class open problem with strong engineering implications!

What Can the Kids Learn? Permutations/Combinations Probability Percents Cooperative Learning Team Work Decision Making

Lesson Plan

Lesson Plan cont…

Sample Questions

Acknowledgements I would like to acknowledge E3 for giving me the opportunity to experience new and different things. Also, Dr. Liu and Neeharika Marukala for enhancing my knowledge in Engineering so that I will be able to bring future students to Texas A&M University that will major in “ENGINEERING” perhaps Electrical Engineering. Also, I would like to thank National Science Foundation (NSF), Nuclear Power Institute (NPI), Texas Workforce Commission (TWC), and Chevron. The support from these groups have made E3 Program what it is today.