Parametric Linear System Solving with Error Correction. Cleveland - - PowerPoint PPT Presentation

parametric linear system solving with error correction
SMART_READER_LITE
LIVE PREVIEW

Parametric Linear System Solving with Error Correction. Cleveland - - PowerPoint PPT Presentation

Parametric Linear System Solving with Error Correction. Cleveland Waddell S YMBOLIC -N UMERIC C OMPUTING S EMINAR September 26, 2019 2 Overview Error Correction: Parametric Linear System Solving Relating Error Correction to


slide-1
SLIDE 1

Parametric Linear System Solving with Error Correction. Cleveland Waddell SYMBOLIC-NUMERIC COMPUTING SEMINAR September 26, 2019

slide-2
SLIDE 2

2

Overview

— Error Correction: — Parametric Linear System Solving — Relating Error Correction to Parametric Linear System Solving

slide-3
SLIDE 3

2

Overview

— Error Correction:

— Reed-Solomon Codes (Gemmel/Sudan view of Welch/Berlekamp decoding).

— Parametric Linear System Solving — Relating Error Correction to Parametric Linear System Solving

slide-4
SLIDE 4

2

Overview

— Error Correction:

— Reed-Solomon Codes (Gemmel/Sudan view of Welch/Berlekamp decoding).

— Parametric Linear System Solving — Relating Error Correction to Parametric Linear System Solving

slide-5
SLIDE 5

2

Overview

— Error Correction:

— Reed-Solomon Codes (Gemmel/Sudan view of Welch/Berlekamp decoding).

— Parametric Linear System Solving — Relating Error Correction to Parametric Linear System Solving — Early Termination for [Boyer and Kaltofen ’14] Algorithm. — Rational Vector Recovery.

slide-6
SLIDE 6

2

Overview

— Error Correction:

— Reed-Solomon Codes (Gemmel/Sudan view of Welch/Berlekamp decoding).

— Parametric Linear System Solving — Relating Error Correction to Parametric Linear System Solving — Early Termination for [Boyer and Kaltofen ’14] Algorithm. — Rational Vector Recovery.

slide-7
SLIDE 7

3

Overview Continued

slide-8
SLIDE 8

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

slide-9
SLIDE 9

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

— Description of the problem. — Description of the model. — A model to test our model. — Some experimental results.

slide-10
SLIDE 10

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

— Description of the problem. — Description of the model. — A model to test our model. — Some experimental results.

— Rank Deficient Parametric Linear Systems with Errors:

slide-11
SLIDE 11

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

— Description of the problem. — Description of the model. — A model to test our model. — Some experimental results.

— Rank Deficient Parametric Linear Systems with Errors:

— Description of the problem. — Two types of errors. — The Algorithm.

slide-12
SLIDE 12

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

— Description of the problem. — Description of the model. — A model to test our model. — Some experimental results.

— Rank Deficient Parametric Linear Systems with Errors:

— Description of the problem. — Two types of errors. — The Algorithm.

Possible Future Directions:

slide-13
SLIDE 13

3

Overview Continued

— A Polynomial Vector Recovery Model for a Burst Error Correcting Code

— Description of the problem. — Description of the model. — A model to test our model. — Some experimental results.

— Rank Deficient Parametric Linear Systems with Errors:

— Description of the problem. — Two types of errors. — The Algorithm.

Possible Future Directions:

— Connect our Burst Error Model to work done in Information Theory — Error Correction as an Algorithmic Paradigm

slide-14
SLIDE 14

4

Background

Error Correcting Codes

Definitions:

— Error Correcting Code: Adding redundant data to a transmitted message to aid in recovery if errors occur. — Linear Codes: Any linear combination of codewords (message plus redundant or parity data) is also a codeword. — Block Codes: Data is encoded in blocks of fixed length.

slide-15
SLIDE 15

4

Background

Error Correcting Codes

Definitions:

— Error Correcting Code: Adding redundant data to a transmitted message to aid in recovery if errors occur. — Linear Codes: Any linear combination of codewords (message plus redundant or parity data) is also a codeword. — Block Codes: Data is encoded in blocks of fixed length.

General Idea:

Codeword Received word

(f(ξ0), f(ξ1),..., f(ξL−1)) (β0,β1,...,βL−1)

slide-16
SLIDE 16

5

Background

Reed-Solomon Codes

Encoding: Example:

[Reed and Solomon 1960]

slide-17
SLIDE 17

5

Background

Reed-Solomon Codes

Encoding:

— Construct a polynomial, f(u) ∈ K[u], with the message as its coefficients. — Let E ≥ |{ξℓ | f(ξℓ) = βℓ}|. — Pick L = deg(f)+2E +1 distinct elements ξℓ ∈ K, where K is a field. — The codeword is the evaluations of f(u) at the L distinct elements.

Example:

— Message : (1,2,1) — f(u) = u2 +2u+1 — We pick L distinct points ξ ← (0,1,2,3,4,5,6) — Codeword: f(ξℓ) → (1,4,9,16,25,36,49) — Received word: β ← (1,4,9,16,25,9,49) [Reed and Solomon 1960]

slide-18
SLIDE 18

6

Background

Reed-Solomon Codes

Welch/Berlekamp Decoding:

[Reed and Solomon 1960] [Welch and Berlekamp 1986] [Gemmell and Sudan ’92] [Olshevsky and Shokrollahi ’03] [Kaltofen and Pernet ’13] [Kaltofen and Yang ’14]

slide-19
SLIDE 19

6

Background

Reed-Solomon Codes

Welch/Berlekamp Decoding:

— Define Λ(u) such that Λ(ξλ) = 0 whenever f(ξλ) = βλ — Equation βℓΛ(ξℓ) = f(ξℓ)Λ(ξℓ) is true for all evaluation points ξℓ — Let Φ(u) and Ψ(u) be generic polynomial where, deg(Φ) = deg( f)+E, and deg(Ψ) = E — Solve the linear system βℓΨ(ξℓ) = Φ(ξℓ) for the coefficients of Φ and Ψ Φ(u)/Ψ(u) = f(u) [Reed and Solomon 1960] [Welch and Berlekamp 1986] [Gemmell and Sudan ’92] [Olshevsky and Shokrollahi ’03] [Kaltofen and Pernet ’13] [Kaltofen and Yang ’14]

slide-20
SLIDE 20

7

Background

Parametric Linear Systems

Let A(u) ∈ K[u]m×n and b(u) ∈ K[u]m

slide-21
SLIDE 21

7

Background

Parametric Linear Systems

Let A(u) ∈ K[u]m×n and b(u) ∈ K[u]m Assume rank(A(u)) = n and m ≥ n and that the system A(u)x = b(u) is consistent

slide-22
SLIDE 22

7

Background

Parametric Linear Systems

Let A(u) ∈ K[u]m×n and b(u) ∈ K[u]m Assume rank(A(u)) = n and m ≥ n and that the system A(u)x = b(u) is consistent Find x(u) =     . . .

1 g(u) f [i](u)

. . .     ∈ K(u)n g = 0 is the monic least common denominator

slide-23
SLIDE 23

8

Background

Systems with Errors

Consider A(u), b(u) ξℓ ˆ A[ℓ], ˆ b[ℓ] Note that ˆ A[ℓ] and ˆ b[ℓ] are not guaranteed to be A(ξℓ) and b(ξℓ) respectively

slide-24
SLIDE 24

8

Background

Systems with Errors

Consider A(u), b(u) ξℓ ˆ A[ℓ], ˆ b[ℓ] Note that ˆ A[ℓ] and ˆ b[ℓ] are not guaranteed to be A(ξℓ) and b(ξℓ) respectively Assume that for kERR ≤ E evaluations ξλ we have ˆ A[λ] f(ξλ) = g(ξλ)ˆ b[λ] Our definition of errors rules out dealing with inconsistent systems Compute

1 g(u) f(u) such that A(u)f(u) = g(u)b(u) and Λ(u) such

that Λ(ξℓ) = 0

slide-25
SLIDE 25

9

Evaluation Counts

Generalized Welch/Berlekamp Count LBK = d f +dg +R+2E +1 Cabay Count LCAB = max{dA +df ,db +dg}+R+2E +1

slide-26
SLIDE 26

10

Early Termination

  • 1. Initialize L
  • 2. The algorithm tries all possible values for d∗

f and d∗ g such that

L∗

BK = max{df +d∗

g,dg +d∗ f }+R∗ +2E∗ +1 = L

  • 3. If our algorithm determines that deg(f) > d∗

f and/or deg(g) > d∗ g

then the number of evaluations ,L, is incremented

  • 4. The algorithm continues incrementing the number of evaluations

and then trying all possible pairs of d∗

f and d∗ g until the solution is

found

slide-27
SLIDE 27

10

Early Termination

  • 1. Initialize L
  • 2. The algorithm tries all possible values for d∗

f and d∗ g such that

L∗

BK = max{df +d∗

g,dg +d∗ f }+R∗ +2E∗ +1 = L

  • 3. If our algorithm determines that deg(f) > d∗

f and/or deg(g) > d∗ g

then the number of evaluations ,L, is incremented

  • 4. The algorithm continues incrementing the number of evaluations

and then trying all possible pairs of d∗

f and d∗ g until the solution is

found The algorithm terminates when d∗

f ≥ deg(f) and d∗ g ≥ deg(g)

slide-28
SLIDE 28

10

Early Termination

  • 1. Initialize L
  • 2. The algorithm tries all possible values for d∗

f and d∗ g such that

L∗

BK = max{df +d∗

g,dg +d∗ f }+R∗ +2E∗ +1 = L

  • 3. If our algorithm determines that deg(f) > d∗

f and/or deg(g) > d∗ g

then the number of evaluations ,L, is incremented

  • 4. The algorithm continues incrementing the number of evaluations

and then trying all possible pairs of d∗

f and d∗ g until the solution is

found The algorithm terminates when d∗

f ≥ deg(f) and d∗ g ≥ deg(g)

Since LET

BK is sufficient to solve our system and LET BK ≤ LBK,

We compute the solution with possibly fewer evaluations than the Generalized Welch/Berlekamp count

slide-29
SLIDE 29

11

Early Termination

  • 1. Initialize L
  • 2. The algorithm tries all possible values for d∗

f and d∗ g such that

L∗

CAB = max{dA +d∗

f ,db +d∗ g}+R∗ +2E∗ +1 = L

  • 3. If our algorithm determines that deg(f) > d∗

f and/or deg(g) > d∗ g

then the number of evaluations ,L, is incremented

  • 4. The algorithm continues incrementing the number of evaluations

and then trying all possible pairs of d∗

f and d∗ g until the solution is

found The algorithm terminates when d∗

f ≥ deg( f) and d∗ g ≥ deg(g)

Since LET

CAB is sufficient to find the solution the same Early

Termination strategy applies Since LET

CAB ≤ LCAB we compute the solution with possibly fewer

evaluations than the Cabay Count

slide-30
SLIDE 30

12

Rational Vector Recovery

        

. . .

1 g(u) f [i](u)

. . .

         ξℓ     . . . γ[ℓ]

i.

. .     γ[ℓ]

i

=

  • f [i](ξℓ)/g(ξℓ)

if g(ξℓ) = 0 ∞ if g(ξℓ) = 0 Note GCD(GCDi(f [i]),g) = 1 g(u) is the monic least common denominator

slide-31
SLIDE 31

12

Rational Vector Recovery

        

. . .

1 g(u) f [i](u)

. . .

         ξℓ     . . . β [ℓ]

i

. . .     ∀ℓ / ∈ {λ1,...,λkERR}: β [ℓ] = γ[ℓ] ∀ℓ ∈ {λ1,...,λkERR}: β [ℓ] = γ[ℓ] kERR ≤ E

slide-32
SLIDE 32

12

Rational Vector Recovery

        

. . .

1 g(u) f [i](u)

. . .

         ξℓ     . . . β [ℓ]

i

. . .     Let d f ≥ max

1≤i≤ndeg(f [i]) and dg ≥ deg(g)

Our algorithm can be specialized for rational vector recovery

slide-33
SLIDE 33

12

Rational Vector Recovery

        

. . .

1 g(u) f [i](u)

. . .

         ξℓ     . . . β [ℓ]

i

. . .     Let d f ≥ max

1≤i≤ndeg(f [i]) and dg ≥ deg(g)

Our algorithm can be specialized for rational vector recovery

slide-34
SLIDE 34

13

Rational Vector Recovery

Let ˆ A[ℓ] =     In 0...0 . . . ... . . . 0...0     and ˆ b[ℓ] =           β [ℓ]

1

. . . β [ℓ]

n

. . .           , at non-poles1 and ˆ A[ℓ] = 0m×n and ˆ b[ℓ] =     1 . . .    , at poles

1evaluations where the denominator is zero

slide-35
SLIDE 35

14

Rational Vector Recovery

Lemma (Kaltofen, Pernet, Storjohann, and Waddell ’17)

If m = n = 1 and we take only L = deg(f)+deg(g)+2kERR then for a sufficiently large field we can always construct a second solution that has all the characteristics of the original solution.

slide-36
SLIDE 36

14

Rational Vector Recovery

Theorem (Kaltofen, Pernet, Storjohann, and Waddell ’17)

If all degree bounds are exact then LCAB < LBK ⇐ ⇒ deg(A) < deg(g).

slide-37
SLIDE 37

14

Rational Vector Recovery

Lemma (Kaltofen, Pernet, Storjohann, and Waddell ’17)

If A is full rank and f [i1] = f [i2] = 0 for 1 ≤ i1 < i2 ≤ n then deg(g) ≤ deg(A), thus in the exact case LBK ≤ LCAB.

slide-38
SLIDE 38

15

Burst Errors

Consider f(ξℓ) =      f [1](ξℓ) f [2](ξℓ) . . . f [m](ξℓ)      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u].

slide-39
SLIDE 39

15

Burst Errors

Consider

slide-40
SLIDE 40

15

Burst Errors

Consider       β [ℓ]

1 = f [1](ξℓ)

β [ℓ]

2 = f [2](ξℓ)

. . . β [ℓ]

m = f [m](ξℓ)

      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u].

slide-41
SLIDE 41

16

Burst Errors

Recall that the system we solve is overdetermined Theorem [Bleichenbacher, Kiayias, and Yung ’03] Assume that the errors are random field elements and they occur in bursts. The matrix of the system, β [ℓ]

i Ψ(ξℓ)−Φ[i](ξℓ) = 0, has a non-zero

minor of dimension m(d f +E +1)+E with probability 1− E

|K|

Theorem [Kaltofen, and Waddell 2019] Assume the errors occur in bursts The matrix of the system, β [ℓ]

i Ψ(ξℓ)−Φ[i](ξℓ) = 0, always has a

non-zero minor of dimension m(df +E +1)+E We remove the requirement that the errors be random field elements

slide-42
SLIDE 42

17

Burst Errors

β [ℓ]

i Ψ(ξℓ)−Φ[i](ξℓ) = 0

d f +2E +1 df +E +1 E +1

slide-43
SLIDE 43

17

Burst Errors

β [ℓ]

i Ψ(ξℓ)−Φ[i](ξℓ) = 0

d f +E +1 E +1 d f +E +1 E

slide-44
SLIDE 44

17

Burst Errors

β [ℓ]

i Ψ(ξℓ)−Φ[i](ξℓ) = 0

df +E +1 E +1 df +E +1

slide-45
SLIDE 45

18

Data Transmission

Consider f(u) =      f [1](u) f [2](u) . . . f [m](u)      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u].

[Bleichenbacher, Kiayias, and Yung ’03], [Schmidt, Sidorenko, and Bossert ’06]

slide-46
SLIDE 46

18

Data Transmission

Consider f(u) =      f [1](u) f [2](u) . . . f [m](u)      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u]. Recall that in traditional Reed-Solomon decoding codewords are: [ f [1](ξ0), f [1](ξ1),..., f [1](ξL−1)], [ f [2](ξ0), f [2](ξ1),..., f [2](ξL−1)], ...,[ f [m](ξ0), f [m](ξ1),..., f [m](ξL−1)]

[Bleichenbacher, Kiayias, and Yung ’03], [Schmidt, Sidorenko, and Bossert ’06]

slide-47
SLIDE 47

18

Data Transmission

Consider f(u) =      f [1](u) f [2](u) . . . f [m](u)      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u]. In the vector model, if we assume L = m the codewords are: [ f [1](ξ0), f [2](ξ0),..., f [m](ξ0)], [ f [1](ξ1), f [2](ξ1),..., f [m](ξ1)], ...,[ f [1](ξL−1), f [2](ξL−1),..., f [m](ξL−1)]

[Bleichenbacher, Kiayias, and Yung ’03], [Schmidt, Sidorenko, and Bossert ’06]

slide-48
SLIDE 48

18

Data Transmission

Consider f(u) =      f [1](u) f [2](u) . . . f [m](u)      where for all i,1 ≤ i ≤ m : f [i] ∈ K[u]. In the vector model, if we assume L = m the codewords are: [ f [1](ξ0), f [2](ξ0),..., f [m](ξ0)], [ f [1](ξ1), f [2](ξ1),..., f [m](ξ1)], ...,[ f [1](ξL−1), f [2](ξL−1),..., f [m](ξL−1)] So the vector model can be thought of as an interleaved Reed-Solomon code.

[Bleichenbacher, Kiayias, and Yung ’03], [Schmidt, Sidorenko, and Bossert ’06]

slide-49
SLIDE 49

19

Data Transmission

— Simplified Gilbert Channel

slide-50
SLIDE 50

19

Data Transmission

— Simplified Gilbert Channel — Channel Burst Length CBL = 1 1−P

BB

. — Symbol Error Rate ρ = 1−P

GG

1−P

BB +1−P GG

. — Mean Number of Bursts CBN = ρML/CBL.

slide-51
SLIDE 51

20

Data Transmission

Let d f = 3 and E = 4 then L = df +2E +1 = 12 ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4]

slide-52
SLIDE 52

20

Data Transmission

Let d f = 3 and E = 4 then L = df +2E +1 = 12 ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4]

slide-53
SLIDE 53

20

Data Transmission

Let d f = 3 and E = 4 then L = df +2E +1 = 12 ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1](ξ8) f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [1](ξ9) f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [1](ξ10) f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [1](ξ11)

slide-54
SLIDE 54

21

Data Transmission

ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [3] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4]

slide-55
SLIDE 55

21

Data Transmission

ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 X f [1] f [1] X f [1] f [1] X f [1] f [1] f [1] f [1] f [1] X f [2] X f [2] f [2] f [2] X f [2] f [3] f [3] f [3] f [3] X f [3] X f [3] f [4] X f [4] f [4] f [4] f [4] f [4] f [4]

slide-56
SLIDE 56

21

Data Transmission

ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 X f [2] f [2] X f [2] f [2] X f [2] f [3] f [3] f [3] f [3] X f [1] X f [1] f [1] f [1] X f [1] f [1] f [1] f [1] f [1] X f [3] X f [3] f [4] X f [4] f [4] f [4] f [4] f [4] f [4]

slide-57
SLIDE 57

22

Data Transmission

ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [3] f [3] f [3] f [3] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [3] f [3] f [3] f [3] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [6] f [6] f [6] f [6] f [6] f [6] f [6] f [6] f [7] f [7] f [7] f [7] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [7] f [7] f [7] f [7] f [8] f [8] f [8] f [8] f [8] f [8] f [8] f [8] ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [10] f [10] f [10] f [10] f [10] f [10] f [10] f [10] f [11] f [11] f [11] f [11] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [11] f [11] f [11] f [11] f [12] f [12] f [12] f [12] f [12] f [12] f [12] f [12]

slide-58
SLIDE 58

22

Data Transmission

ξ0 ξ1 ξ2 ξ3 ξ4 ξ5 ξ6 ξ7 ξ8 ξ9 ξ10 ξ11 f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [2] f [3] f [3] f [3] f [3] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [1] f [3] f [3] f [3] f [3] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [4] f [6] f [6] f [6] f [6] f [6] f [6] f [6] f [6] f [7] f [7] f [7] f [7] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [5] f [7] f [7] f [7] f [7] f [8] f [8] f [8] f [8] f [8] f [8] f [8] f [8] f [10] f [10] f [10] f [10] f [10] f [10] f [10] f [10] f [11] f [11] f [11] f [11] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [9] f [11] f [11] f [11] f [11] f [12] f [12] f [12] f [12] f [12] f [12] f [12] f [12]

slide-59
SLIDE 59

23

Some Results

Table: Stack + Not Burst Only + Not Minimal Interleave c = ˆ c;EBRST = ENBRST = 2 Message Code Pct of Total Total Num Max Max Burst P

GG

P

BB df c Length Length Correct

Num Bursts Burst Length Decoding Bursts Corrected Length Corrected 0.9999 0.9 1110 660 1000 100.00 18.00 18.00 48.00 48.00 0.85 5 7 672 1372 100.00 19.00 19.00 11.00 11.00 0.999 0.9 1110 660 1000 100.00 125.00 125.00 45.00 45.00 0.85 5 7 672 1372 98.00 156.00 146.00 25.00 25.00 0.99 0.8535 7 576 1176 98.00 1151.00 1109.00 45.00 45.00 Table: Not Stack + Not Burst Only + Not Minimal Interleave c = ˆ c;EBRST = ENBRST = 2 Message Code Pct of Total Total Num Max Max Burst P

GG

P

BB df c Length Length Correct

Num Bursts Burst Length Decoding Bursts Corrected Length Corrected 0.9999 0.9 1110 660 1000 98.00 17.00 13.00 48.00 26.00 0.85 5 7 672 1372 100.00 19.00 19.00 11.00 11.00 0.999 0.9 1110 660 1000 85.00 125.00 86.00 45.00 34.00 0.85 5 7 672 1372 85.00 156.00 104.00 25.00 24.00 0.99 0.8535 7 576 1176 87.00 1151.00 937.00 45.00 45.00

slide-60
SLIDE 60

24

Rank Deficient Systems

The Matrix is fine it’s the Right Side Vector that is off

slide-61
SLIDE 61

25

Rank Deficient Systems

Let Wℓ = {w ∈ Kn | A(ξℓ)w = b(ξℓ)} and Wℓ = { ˆ w ∈ Kn | ˆ A[ℓ] ˆ w = ˆ b[ℓ]}. Error at ξλ : There exists w ∈ Wλ such that w / ∈ Wλ. Two types of Errors:

  • 1. Matrix Error: There exists w ∈ Wλ such that given ˆ

A[λ] there is no right side vector such that that w ∈ Wλ.

  • 2. Right Side Vector Error: There exists w ∈ Wλ such that w /

∈ Wλ for the given ˆ A[λ] and ˆ b[λ], but there exists a scalar right side vector such that there is no error.

Let R ≥ |{ℓ | Wℓ ⊂ Wℓ for 0 ≤ ℓ ≤ L−1}|.

slide-62
SLIDE 62

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]).

slide-63
SLIDE 63

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]). Fact If N(A(ξℓ)) ⊆ N( ˆ A[ℓ]) then all column dependencies that exist in A(ξℓ) also exist in ˆ A[ℓ].

slide-64
SLIDE 64

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]). Fact If N(A(ξℓ)) ⊆ N( ˆ A[ℓ]) then all column dependencies that exist in A(ξℓ) also exist in ˆ A[ℓ]. Non Essential Column: A∗,j is a Non Essential Column of A if and only if Rg(A) = Rg(↓ A∗, j).

slide-65
SLIDE 65

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]). Fact If N(A(ξℓ)) ⊆ N( ˆ A[ℓ]) then all column dependencies that exist in A(ξℓ) also exist in ˆ A[ℓ]. Non Essential Column: A∗,j is a Non Essential Column of A if and only if Rg(A) = Rg(↓ A∗, j). Minimal Linearly Dependent Set: S is a Minimal Linearly Dependent Set of vectors if and only if S is a linearly dependent set and no proper subset of S is a linearly dependent set.

slide-66
SLIDE 66

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]). Fact If N(A(ξℓ)) ⊆ N( ˆ A[ℓ]) then all column dependencies that exist in A(ξℓ) also exist in ˆ A[ℓ]. Non Essential Column: A∗,j is a Non Essential Column of A if and only if Rg(A) = Rg(↓ A∗, j). Minimal Linearly Dependent Set: S is a Minimal Linearly Dependent Set of vectors if and only if S is a linearly dependent set and no proper subset of S is a linearly dependent set. Lemma The non zero entries in the last column of a canonical basis for the N(A) corresponds to the Right Most Minimal Linearly Dependent Set of columns in A.

slide-67
SLIDE 67

26

Rank Deficient Systems

Theorem There are no Matrix Errors if and only if N(A(ξℓ)) ⊆ N( ˆ A[ℓ]). Fact If N(A(ξℓ)) ⊆ N( ˆ A[ℓ]) then all column dependencies that exist in A(ξℓ) also exist in ˆ A[ℓ]. Non Essential Column: A∗,j is a Non Essential Column of A if and only if Rg(A) = Rg(↓ A∗, j). Minimal Linearly Dependent Set: S is a Minimal Linearly Dependent Set of vectors if and only if S is a linearly dependent set and no proper subset of S is a linearly dependent set. Lemma The non zero entries in the last column of a canonical basis for the N(A) corresponds to the Right Most Minimal Linearly Dependent Set of columns in A. Lemma Let A∗, j be a Non Essential Column of A. There exists a permutation matrix P such that A∗, j is in the Right Most Minimal Linearly Dependent Set of Columns in AP.

slide-68
SLIDE 68

27

Rank Deficient Systems

Assume there are M different Minimal Linearly Dependent Sets of columns on A(u).

slide-69
SLIDE 69

27

Rank Deficient Systems

Assume there are M different Minimal Linearly Dependent Sets of columns on A(u). Let A(u)P

1,A(u)P 2,...,A(u)P M be such that each Minimal

Linearly Dependent Set of columns in A(u) is the Right Most Minimal Linearly Dependent Set of columns in some A(u)P

η.

slide-70
SLIDE 70

27

Rank Deficient Systems

Assume there are M different Minimal Linearly Dependent Sets of columns on A(u). Let A(u)P

1,A(u)P 2,...,A(u)P M be such that each Minimal

Linearly Dependent Set of columns in A(u) is the Right Most Minimal Linearly Dependent Set of columns in some A(u)P

η.

Let dΩη be an upper bound on the minimum degree of the vectors in the N(A(u)P

η) with the property that only the rows that

correspond to the Right Most Minimal Linearly Dependent Set of columns in A(u)P

η are non zero.

slide-71
SLIDE 71

27

Rank Deficient Systems

Assume there are M different Minimal Linearly Dependent Sets of columns on A(u). Let A(u)P

1,A(u)P 2,...,A(u)P M be such that each Minimal

Linearly Dependent Set of columns in A(u) is the Right Most Minimal Linearly Dependent Set of columns in some A(u)P

η.

Let dΩη be an upper bound on the minimum degree of the vectors in the N(A(u)P

η) with the property that only the rows that

correspond to the Right Most Minimal Linearly Dependent Set of columns in A(u)P

η are non zero.

Let dΩ ≥ max

1≤η≤M{dΩη,df }.

slide-72
SLIDE 72

27

Rank Deficient Systems

Assume there are M different Minimal Linearly Dependent Sets of columns on A(u). Let A(u)P

1,A(u)P 2,...,A(u)P M be such that each Minimal

Linearly Dependent Set of columns in A(u) is the Right Most Minimal Linearly Dependent Set of columns in some A(u)P

η.

Let dΩη be an upper bound on the minimum degree of the vectors in the N(A(u)P

η) with the property that only the rows that

correspond to the Right Most Minimal Linearly Dependent Set of columns in A(u)P

η are non zero.

Let dΩ ≥ max

1≤η≤M{dΩη,df }.

Let LKW = max{dA +dΩ,db +dg}+R+2E +1.

slide-73
SLIDE 73

28

Rank Deficient Systems

Solve ˆ A[ℓ]     . . . Ω[i](ξℓ) . . .     = 0m (1) deg(Ω[i]) ≤ dΩ +E 0 ≤ ℓ ≤ LKW −1

slide-74
SLIDE 74

28

Rank Deficient Systems

Solve ˆ A[ℓ]     . . . Ω[i](ξℓ) . . .     = 0m (1) deg(Ω[i]) ≤ dΩ +E 0 ≤ ℓ ≤ LKW −1 Let Ωlast be the last column in the Column Echelon Form for a basis of the solution of equation (1). Theorem There is a Matrix Error at ξλ due to a difference in the column dependency in the Right Most Minimal Dependent Set of columns in A(ξℓ)P

η and ˆ

A[λ]P

η if and only if (u−ξλ) is a factor of

Ωlast(u).

slide-75
SLIDE 75

29

Rank Deficient Systems

Solve simultaneously: Ψ(ξℓ)ˆ b[ℓ] − ˆ A[ℓ]Φ(ξℓ) = 0 and Φ[j](ξℓ) = 0 where ˆ A[ℓ]

∗,j has no pivot in the Row Echelon Form of ˆ

A[ℓ] deg(Φ) ≤ df +E, deg(Ψ) ≤ dg +E, and 0 ≤ ℓ ≤ LCAB −1.

slide-76
SLIDE 76

29

Rank Deficient Systems

Solve simultaneously: Ψ(ξℓ)ˆ b[ℓ] − ˆ A[ℓ]Φ(ξℓ) = 0 and Φ[j](ξℓ) = 0 where ˆ A[ℓ]

∗,j has no pivot in the Row Echelon Form of ˆ

A[ℓ] deg(Φ) ≤ df +E, deg(Ψ) ≤ dg +E, and 0 ≤ ℓ ≤ LCAB −1. Then (Φmin,Ψmin) = ( ¯ Λ ¯ f, ¯ Λ ¯ g) and ¯ Λ | Λ. Warning: The solution 1

¯ g ¯

f may not satisfy the input degree bounds.

slide-77
SLIDE 77

30

Rank Deficient Systems

{Matrix Errors} ∪ {Right Side Vector Errors} We can remove all errors as well as compute an error locator polynomial Λ.

slide-78
SLIDE 78

30

Rank Deficient Systems

{Matrix Errors} ∪ {Right Side Vector Errors} We can remove all errors as well as compute an error locator polynomial Λ. Solve Ψ(ξℓ)ˆ b[ℓ] − ˆ A[ℓ]     . . . Φ[i](ξℓ) . . .     = 0, (2) deg(Φ[i]) ≤ df ,deg(Ψ) ≤ dg,0 ≤ ℓ ≤ LCAB −(E +1). The solution to equation (2) satisfies the input degree bounds.

slide-79
SLIDE 79

31

Future Work

Prove conjectured polynomial time algorithm for rank deficient case correct

slide-80
SLIDE 80

31

Future Work

Prove conjectured polynomial time algorithm for rank deficient case correct Continue work on burst errors:

— Refine model — Hamming distance — List decoding

slide-81
SLIDE 81

31

Future Work

Prove conjectured polynomial time algorithm for rank deficient case correct Continue work on burst errors:

— Refine model — Hamming distance — List decoding

Investigate error correction as an algorithmic paradigm

— [Roche 2018]

slide-82
SLIDE 82

31

Future Work

Prove conjectured polynomial time algorithm for rank deficient case correct Continue work on burst errors:

— Refine model — Hamming distance — List decoding

Investigate error correction as an algorithmic paradigm

— [Roche 2018]

slide-83
SLIDE 83

32

Thank you!