65 research outputs found
Recommended from our members
Diameter, Girth And Other Properties Of Highly Symmetric Graphs
We consider a number of problems in graph theory, with the unifying theme being the properties of graphs which have a high degree of symmetry.
In the degree-diameter problem, we consider the question of finding asymptotically large graphs of given degree and diameter. We improve a number of the current best published results in the case of Cayley graphs of cyclic, dihedral and general groups.
In the degree-diameter problem for mixed graphs, we give a new corrected formula for the Moore bound and show non-existence of mixed Cayley graphs of diameter 2 attaining the Moore bound for a range of open cases.
In the degree-girth problem, we investigate the graphs of Lazebnik, Ustimenko and Woldar which are the best asymptotic family identified to date. We give new information on the automorphism groups of these graphs, and show that they are more highly symmetrical than has been known to date.
We study a related problem in group theory concerning product-free sets in groups, and in particular those groups whose maximal product-free subsets are complete. We take a large step towards a classification of such groups, and find an application to the degree-diameter problem which allows us to improve an asymptotic bound for diameter 2 Cayley graphs of elementary abelian groups.
Finally, we study the problem of graphs embedded on surfaces where the induced map is regular and has an automorphism group in a particular family. We give a complete enumeration of all such maps and study their properties
Design of tch-type sequences for communications
This thesis deals with the design of a class of cyclic codes inspired by TCH codewords.
Since TCH codes are linked to finite fields the fundamental concepts and facts about abstract
algebra, namely group theory and number theory, constitute the first part of the thesis.
By exploring group geometric properties and identifying an equivalence between some operations
on codes and the symmetries of the dihedral group we were able to simplify the generation
of codewords thus saving on the necessary number of computations. Moreover, we
also presented an algebraic method to obtain binary generalized TCH codewords of length
N = 2k, k = 1,2, . . . , 16. By exploring Zech logarithm’s properties as well as a group theoretic
isomorphism we developed a method that is both faster and less complex than what was
proposed before. In addition, it is valid for all relevant cases relating the codeword length N
and not only those resulting from N = p
Graph Coverings with Few Eigenvalues or No Short Cycles
This thesis addresses the extent of the covering graph construction. How much must a cover X resemble the graph Y that it covers? How much can X deviate from Y? The main statistics of X and Y which we will measure are their regularity, the spectra of their adjacency matrices, and the length of their shortest cycles. These statistics are highly interdependent and the main contribution of this thesis is to advance our understanding of this interdependence. We will see theorems that characterize the regularity of certain covering graphs in terms of the number of distinct eigenvalues of their adjacency matrices. We will see old examples of covers whose lack of short cycles is equivalent to the concentration of their spectra on few points, and new examples that indicate certain limits to this equivalence in a more general setting. We will see connections to many combinatorial objects such as regular maps, symmetric and divisible designs, equiangular lines, distance-regular graphs, perfect codes, and more. Our main tools will come from algebraic graph theory and representation theory. Additional motivation will come from topological graph theory, finite geometry, and algebraic topology
Sparse graph codes for compression, sensing, and secrecy
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from student PDF version of thesis.Includes bibliographical references (p. 201-212).Sparse graph codes were first introduced by Gallager over 40 years ago. Over the last two decades, such codes have been the subject of intense research, and capacity approaching sparse graph codes with low complexity encoding and decoding algorithms have been designed for many channels. Motivated by the success of sparse graph codes for channel coding, we explore the use of sparse graph codes for four other problems related to compression, sensing, and security. First, we construct locally encodable and decodable source codes for a simple class of sources. Local encodability refers to the property that when the original source data changes slightly, the compression produced by the source code can be updated easily. Local decodability refers to the property that a single source symbol can be recovered without having to decode the entire source block. Second, we analyze a simple message-passing algorithm for compressed sensing recovery, and show that our algorithm provides a nontrivial f1/f1 guarantee. We also show that very sparse matrices and matrices whose entries must be either 0 or 1 have poor performance with respect to the restricted isometry property for the f2 norm. Third, we analyze the performance of a special class of sparse graph codes, LDPC codes, for the problem of quantizing a uniformly random bit string under Hamming distortion. We show that LDPC codes can come arbitrarily close to the rate-distortion bound using an optimal quantizer. This is a special case of a general result showing a duality between lossy source coding and channel coding-if we ignore computational complexity, then good channel codes are automatically good lossy source codes. We also prove a lower bound on the average degree of vertices in an LDPC code as a function of the gap to the rate-distortion bound. Finally, we construct efficient, capacity-achieving codes for the wiretap channel, a model of communication that allows one to provide information-theoretic, rather than computational, security guarantees. Our main results include the introduction of a new security critertion which is an information-theoretic analog of semantic security, the construction of capacity-achieving codes possessing strong security with nearly linear time encoding and decoding algorithms for any degraded wiretap channel, and the construction of capacity-achieving codes possessing semantic security with linear time encoding and decoding algorithms for erasure wiretap channels. Our analysis relies on a relatively small set of tools. One tool is density evolution, a powerful method for analyzing the behavior of message-passing algorithms on long, random sparse graph codes. Another concept we use extensively is the notion of an expander graph. Expander graphs have powerful properties that allow us to prove adversarial, rather than probabilistic, guarantees for message-passing algorithms. Expander graphs are also useful in the context of the wiretap channel because they provide a method for constructing randomness extractors. Finally, we use several well-known isoperimetric inequalities (Harper's inequality, Azuma's inequality, and the Gaussian Isoperimetric inequality) in our analysis of the duality between lossy source coding and channel coding.by Venkat Bala Chandar.Ph.D
Multicoloured Random Graphs: Constructions and Symmetry
This is a research monograph on constructions of and group actions on
countable homogeneous graphs, concentrating particularly on the simple random
graph and its edge-coloured variants. We study various aspects of the graphs,
but the emphasis is on understanding those groups that are supported by these
graphs together with links with other structures such as lattices, topologies
and filters, rings and algebras, metric spaces, sets and models, Moufang loops
and monoids. The large amount of background material included serves as an
introduction to the theories that are used to produce the new results. The
large number of references should help in making this a resource for anyone
interested in beginning research in this or allied fields.Comment: Index added in v2. This is the first of 3 documents; the other 2 will
appear in physic
Abstract Algebra: Theory and Applications
Tom Judson\u27s Abstract Algebra: Theory and Applications is an open source textbook designed to teach the principles and theory of abstract algebra to college juniors and seniors in a rigorous manner. Its strengths include a wide range of exercises, both computational and theoretical, plus many nontrivial applications. Rob Beezer has contributed complementary material using the open source system, Sage.An HTML version on the PreText platform is available here.
The first half of the book presents group theory, through the Sylow theorems, with enough material for a semester-long course. The second-half is suitable for a second semester and presents rings, integral domains, Boolean algebras, vector spaces, and fields, concluding with Galois Theory.https://scholarworks.sfasu.edu/ebooks/1022/thumbnail.jp
- …