SlideShare une entreprise Scribd logo
1  sur  29
Technological Educational Institute of PIRAEUS
        Computer Systems Engineering Department




   A new approach in specifying the inverse
quadratic matrix in modulo-2 for controllable and
        observable information channels


  CH. N. TASIOPOULOS, A. A. FOTOPOULOS, D. VOUKALIS,
                   P. H. YANNAKOPOULOS



              International Scientific Conference
                            eRA-5
                             2010
Introduction
                               Noisy Communication System




     [Figure 5.1, page 200, “Fundamentals of Information Theory and Coding Design”, R. Togneri, Ch. deSilva]



 In the above diagram we can see the use of channel & source coders in
 modern digital communication systems provide efficient and reliable
 transmission of information in the presence of noise.

                       TEI of PIRAEUS, Computer Systems Engineering Department
                                         International Scientific Conference eRA-5                             2
Introduction

A common noisy communication system is described by the channel
encoder, the source encoder, the digital channel, the channel decoder and the
source decoder.
We can model such a system, according to the principles of digital control
theory, as a digital communication channel between transmitter and receiver.
The function of the new modeled system can be described from the state space
equations that will be analyzed bellow.
For the encoding of information we will use, from the principles of code and
information theory, a generator matrix .
In this presentation we will use the state space matrixes as components of the
generator matrix for the channel encoding. Finally we will investigate the
controllable and observable theorems for the above suggested encoding using
modulo-2 arithmetic in Galois field.


                 TEI of PIRAEUS, Computer Systems Engineering Department
                                   International Scientific Conference eRA-5     3
Concepts of Digital Control Theory

 The controllable of a system refers to the
  possibility for it to be transferred from a given
  initial state in any final, in finite time, and the
  observable constitutes the dualism of the
  controllable. [Kalman 1960]




            TEI of PIRAEUS, Computer Systems Engineering Department
                              International Scientific Conference eRA-5   4
Concepts of Digital Control Theory
 State Equations

                                                                                          u (k 1)
      x(k      1)     Ax ( k )     Bu ( k ),     x (0)       x0                           u (k 2)
                                                 x(k )   Ak x(0) [ B  AB ... Ak 1B ]
                                                                                             
      y (k )    Cx ( k )                                                                   u (0)

                                                                                     u (k 1)
                                  k                                     k 1
                                                                                     u (k 2)
      where:        x(k )        A x(0) [ B  AB ... A B ]
                                                                                             
                                                                                          u (0)




                     TEI of PIRAEUS, Computer Systems Engineering Department
                                       International Scientific Conference eRA-5                    5
Concepts of Digital Control Theory


 Controllable Definition
For | A | 0 the state equation x(k 1) is controllable if is possible a
control sequence {u(0), u(1),u(q 1)} to be found, that can, in finite
time even q, lead the system from any initial state x(0) to any final
state x(q)        ,        Rn
                                                u (q 1)
                                               u (q 2)
Then:        q
                 x(0) [ B  AB    Aq 1 B]
                                                      
                                                           .
                                                 u (0)

It is known from linear algebra, that this equation has solution when:
    rank [ B    A q 1 B |                      q
                                                      x(0)] rank [ B    A q 1B]
                      TEI of PIRAEUS, Computer Systems Engineering Department
                                        International Scientific Conference eRA-5    6
Concepts of Digital Control Theory


 Controllable Definition
To apply the above equation, for any arbitrary final
state should : rank [ B    A q 1B] n, q N
From Cayley-Hamilton theorem, conditions A j B, for j n
are linearly dependent on the first n terms  ( B, AB, , A n 1B)

The above equality must be satisfied for q=n. This
means: rank [ B    A n 1B] n

               TEI of PIRAEUS, Computer Systems Engineering Department
                                 International Scientific Conference eRA-5   7
Concepts of Digital Control Theory


 Controllable Definition
Finally the system x( k 1) Ax( k ) Bu ( k ), x(0) x is                      0




controllable, when rank S=n , S [ B  AB  An 1B]

Where the nxnm table S called controllability
table



              TEI of PIRAEUS, Computer Systems Engineering Department
                                International Scientific Conference eRA-5       8
Concepts of Digital Control Theory

 Observable definition

The state space equations model is observable
If there exists finite q, such that knowledge of
inputs {u(0), u(1),…, u(q-1)} and outputs
{y(0),y(1), …, y(q-1)}, can uniquely determine
The initial state x(0) of the system.


           TEI of PIRAEUS, Computer Systems Engineering Department
                             International Scientific Conference eRA-5   9
Concepts of Digital Control Theory

 Observable definition

Specifically the state space model is observable
                                        C
                                      CA
If   rank R     n , R=
                                         
                                   CAn        1



Where the npxn table R called observability
table

              TEI of PIRAEUS, Computer Systems Engineering Department
                                International Scientific Conference eRA-5   10
Concepts of Digital Control Theory
The loss of controllable and observable because of
sampling
It is known that when sampling a continuous time
system, we have a discrete time system with tables
that depend on the sampling period T. A discrete time
system is controllable if the continuous time system is
also controllable. This is because the control signals in a
sampled system are a subset of control signals of the
continuous time system. Nevertheless it is possible to
lose controllability for some values of the sampling
period. While the original continuous system is controllable,
the equivalent discrete system may not be controllable.
Similar problems occur with observable.
              TEI of PIRAEUS, Computer Systems Engineering Department
                                International Scientific Conference eRA-5   11
Concepts of information and code theory

Group definition

A group (G,*) is a pair consisting of a set G and an operation
* on that set , that is a function from the Cartesian product
GxG to G , with the result of operating on a and b denoted
by a*b , which satisfies
 1. associativity : a*(b*c)= (a*b)*c for all a, b, c G
 2. Existence of identity: There exists e G such that
     e*a=a and a*e=a for all a G
 3.Existence of inverses: For each a G there exists a 1 G
    such that a * a 1 e and a 1 * a e



               TEI of PIRAEUS, Computer Systems Engineering Department
                                 International Scientific Conference eRA-5   12
Concepts of information and code theory

Cyclic Groups definition

For each positive integer p, there is a group called the cyclic
group of order p, with set of elements
                           Z p {0,1, ,( p 1)}
and operation        defined by i     j i j
If i j p , where (+ )denotes the usual operation
of addition of integers, and i      j i j p
If i j p ,where (-) denotes the usual operation of subtraction of integers.
The operation in the cyclic group is addition modulo p. We shall use the sign +
instead of     to denote this operation in what follows and refer to “the cyclic
Group ( Z p , ) ” , or simply the cyclic group Z p



                    TEI of PIRAEUS, Computer Systems Engineering Department
                                      International Scientific Conference eRA-5    13
Concepts of information and code theory

Ring definition

A ring is a triple ( R,       , ) consisting of a set R, and two operations + and                       , referred to
as addition and multiplication, respectively, which satisfy the following conditions:
1.Associativity of +: a (b c)                (a b) c, for all a,b,c                R
2.Commutativity of +: a b                 b a for all a,b              R
3.Existence of additive identity: there exists 0 R such that 0 a a and a 0 a for all a R
                                                                                                        a ( a) 0
4.Existence of additive inverses: for each               a R    there exists       a R      such that   and ( a ) a   0
5.Associativity of        :    a (b c)      (a b) c, for all a, b, c       R

6. Distributivity of          over +:    a (b c) (a b)(a c), for all a, b, c R




                                                                 Evariste Galois
                                                                     1811-1832
                              TEI of PIRAEUS, Computer Systems Engineering Department
                                                International Scientific Conference eRA-5                                 14
Concepts of information and code theory

Cyclic rings definition


For every positive integer p, there is a ring ( Z p ,         , ) , called the cyclic ring of order p,
with set of elements

                                 Zp      {0,1, , ( p 1)}


and operations + denoting addition modulo p, and                    denoting multiplication modulo p




                                                           Evariste Galois
                                                               1811-1832
                        TEI of PIRAEUS, Computer Systems Engineering Department
                                          International Scientific Conference eRA-5                      15
Concepts of information and code theory

Linear codes definition
                                               n
   A binary block code is a subset of B for some n .Elements of the code are called
    code words
                                                                     n
   Linear code : A linear code is a linear subspace of B
   Minimum distance : The minimum distance of a linear code is the minimum of the
    weights of the non –zero code words




                                                        Evariste Galois
                                                            1811-1832
                     TEI of PIRAEUS, Computer Systems Engineering Department
                                       International Scientific Conference eRA-5       16
Concepts of information and code theory

Generator Matrix

A generator matrix for a linear code is a binary matrix whose rows are the code words
belonging to some basis for the code


   Example : The code { 0000, 0001, 1000, 1001} is a two- dimensional linear code in
    {0001, 1000} is a basis for this code , which give us the generator matrix         B
                                                                                           4




                                                  0    0   0   1
                                             G=
                                                  1    0   0   0


To find the code words from the generator matrix , we perform the following multiplications:

                0 0 0 1                                                  0 0 0 1
          0 0                 0 0 0 0                              0 1               1 0 0 0
                1 0 0 0                                                  1 0 0 0


                0 0 0 1                                                  0 0 0 1
          1 0                 0 0 0 1                              1 1               1 0 0 1
                1 0 0 0                                                  1 0 0 0


                       TEI of PIRAEUS, Computer Systems Engineering Department
                                         International Scientific Conference eRA-5             17
Concepts of information and code theory

Elementary Row Operation & Canonical Form

   An elementary row operation on a binary matrix consists of replacing a row of the matrix
    with the sum of that row and any other row.


   The generator matrix G of a k-dimensional linear code in B n is in canonical form if it is
    of the form G [ I : A] where I is a k k identity matrix and A is arbitrary k (n k )
    binary matrix

     If the generator matrix G is in canonical form, and w is any k-bit word, the code word s=wG is in
        systematic form and the first k bits of s are the same as the bits of w.




                        TEI of PIRAEUS, Computer Systems Engineering Department
                                          International Scientific Conference eRA-5                       18
Combining the theories
For a common noisy digital channel of the following diagram




we propose a state space equations modeling according to the digital control
theory.
                            x ( k 1) Ax ( k ) Bu ( k )

                                 y(k )      Cx ( k )




                  TEI of PIRAEUS, Computer Systems Engineering Department
                                    International Scientific Conference eRA-5   19
Combining the theories
x (k     1)   Ax (k )    Bu (k )

y (k )    Cx (k )
 Where:


       U(k)                                     u ( k ) {b0 , b1 ,...bk } B n


                                                                                       A [aij ], ij 1, 2,..., n

Aij                     Bij                   Cij                                      B [bij ], ij 1, 2,..., n
                                                                                       C   [cij ], ij 1, 2,..., n




                         TEI of PIRAEUS, Computer Systems Engineering Department
                                           International Scientific Conference eRA-5                          20
Modulo-2 Arithmetic

From the cyclic groups definition we have:
                       Zp      {0,1, , ( p 1)}

The equation becomes for p=2:
                              Z2      {0,1}

Where Z 2 is a cyclic group in modulo-2
arithmetic.
The operations stands as referred previously.

           TEI of PIRAEUS, Computer Systems Engineering Department
                             International Scientific Conference eRA-5   21
Generator Matrix
 From    the principles      of code and
  information theory , we use a generator
  matrix for the encoding of the information
  channel.
          G [b 'ij ], ij 1,2,..., nwith 'b                        Bn
 For example:
                                   1 0 0 1
                                   1 1 1 0
                          G
                                   0 1 0 1
                                   1 0 0 0

          TEI of PIRAEUS, Computer Systems Engineering Department
                            International Scientific Conference eRA-5   22
Combining the theories
 It is known that a generator matrix of the
  above form G can be divided into submatrixes.
 In the proposed model we use 3 submatrixes,
  that come from the state space tables A,B,C.
 The suggested generator matrix G consists
  itself an encoding channel protocol, with the
  tables A,B,C accruing from different encoding
  protocols



            TEI of PIRAEUS, Computer Systems Engineering Department
                              International Scientific Conference eRA-5   23
Controllable
We will investigate whether the matrixes A,B,C of the
proposed generator matrix model of a specific protocol in
modulo-2 arithmetic of Galois field can lead the system in
controllable Form.

                       S        [ B  AB  An 1 B]
where Aij , Bij        Bn ' with n' means the length of the code word

    The system is controllable if:                  rank [ B    A n 1 B]    n
     where n is the dimension of the quadratic matrix S.
    In different case the system isn’t controllable.



                  TEI of PIRAEUS, Computer Systems Engineering Department
                                    International Scientific Conference eRA-5       24
Observable
We will investigate whether the matrixes A,B,C of the
proposed generator matrix model of a specific protocol in
modulo-2 arithmetic of Galois field can lead the system in
observable form.             C
                                            CA
                               R=
                                               
                                          CAn       1


                 n'
where Aij , Cij B with n' means the length of the code w ord
   The system is observable if rank R=n where n is the
    dimension of the quadratic matrix R.
   In different case the system isn’t observable.


              TEI of PIRAEUS, Computer Systems Engineering Department
                                International Scientific Conference eRA-5   25
Determinant of quadratic matrix in
modulo-2
To calculate the controllable and observable is necessary to
calculate the determinant of the quadratic matrix R, S in
modulo-2
                        k11     k12  k1n
                        k21     k22  k2 n
               K                                            b Bn
                              
                        kn1 kn 2  knn


          D    K        ki1K i1 ki 2 K i 2 ... kin K in
          where: Kij            ( 1)i j Dij



              TEI of PIRAEUS, Computer Systems Engineering Department
                                International Scientific Conference eRA-5   26
Example implementation
                                                                            x (k      1)     Ax (k )   Bu (k )

                                                                             y (k )      Cx (k )
     Suppose we have a system which described by the following
     state space tables:
                               1 1 0                   1
                       A       0 1 1 , B= 1 , C= 1 1 0 with n=3
                               1 1 1                   0
       0          1
AB     1 , A2 B   1
                                                                CA          1 0 1 , CA 2 [0 0 1]
       0          1
                       1 0 1                                                C                1 1 0
R [B     AB   A2 B ]   1 1 1 ,                R      1 0         R         CA                1 0 1               1 0
                       0 0 1                                               CA2               0 0 1
     The system is controllable                                 The system is observable
                           TEI of PIRAEUS, Computer Systems Engineering Department
                                             International Scientific Conference eRA-5                             27
Conclusion

As we observe before it’s possible the design of a
digital system in controllable and observable form
encoded in modulo-2 arithmetic.
Key advantage of the proposed model is the study
of controllability and observability in a
binary(modulo-2) information channel.
The direct connection between machine language
and digital controllers can create many
opportunities and application in design level.
            TEI of PIRAEUS, Computer Systems Engineering Department
                              International Scientific Conference eRA-5   28
Technological Educational Institute of PIRAEUS
       Computer Systems Engineering Department



  END OF PRESENTATION

    Thank you for your attention


Ch. N. Tasiopoulos, A. A. Fotopoulos, D. Voukalis,
               P. H.Yannakopoulos


        International Scientific Conference
                      eRA-5
                        2010                            29

Contenu connexe

Tendances

Maapr3
Maapr3Maapr3
Maapr3FNian
 
VahidAkbariTalk.pdf
VahidAkbariTalk.pdfVahidAkbariTalk.pdf
VahidAkbariTalk.pdfgrssieee
 
VahidAkbariTalk_v3.pdf
VahidAkbariTalk_v3.pdfVahidAkbariTalk_v3.pdf
VahidAkbariTalk_v3.pdfgrssieee
 
An algorithm for computing resultant polytopes
An algorithm for computing resultant polytopesAn algorithm for computing resultant polytopes
An algorithm for computing resultant polytopesVissarion Fisikopoulos
 
Conctructing Polytopes via a Vertex Oracle
Conctructing Polytopes via a Vertex OracleConctructing Polytopes via a Vertex Oracle
Conctructing Polytopes via a Vertex OracleVissarion Fisikopoulos
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVissarion Fisikopoulos
 
Mathematical analysis of Graph and Huff amn coding
Mathematical analysis of Graph and Huff amn codingMathematical analysis of Graph and Huff amn coding
Mathematical analysis of Graph and Huff amn codingDr Anjan Krishnamurthy
 
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithm
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithmno U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithm
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithmChristian Robert
 
Polyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationPolyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationVissarion Fisikopoulos
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control systemAlireza Mirzaei
 
Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Shiang-Yun Yang
 
Polyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometryPolyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometrySpringer
 
Efficient Hill Climber for Multi-Objective Pseudo-Boolean Optimization
Efficient Hill Climber for Multi-Objective Pseudo-Boolean OptimizationEfficient Hill Climber for Multi-Objective Pseudo-Boolean Optimization
Efficient Hill Climber for Multi-Objective Pseudo-Boolean Optimizationjfrchicanog
 

Tendances (19)

DSP System Assignment Help
DSP System Assignment HelpDSP System Assignment Help
DSP System Assignment Help
 
Maapr3
Maapr3Maapr3
Maapr3
 
VahidAkbariTalk.pdf
VahidAkbariTalk.pdfVahidAkbariTalk.pdf
VahidAkbariTalk.pdf
 
VahidAkbariTalk_v3.pdf
VahidAkbariTalk_v3.pdfVahidAkbariTalk_v3.pdf
VahidAkbariTalk_v3.pdf
 
O2
O2O2
O2
 
An algorithm for computing resultant polytopes
An algorithm for computing resultant polytopesAn algorithm for computing resultant polytopes
An algorithm for computing resultant polytopes
 
Conctructing Polytopes via a Vertex Oracle
Conctructing Polytopes via a Vertex OracleConctructing Polytopes via a Vertex Oracle
Conctructing Polytopes via a Vertex Oracle
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensions
 
Stack of Tasks Course
Stack of Tasks CourseStack of Tasks Course
Stack of Tasks Course
 
Mathematical analysis of Graph and Huff amn coding
Mathematical analysis of Graph and Huff amn codingMathematical analysis of Graph and Huff amn coding
Mathematical analysis of Graph and Huff amn coding
 
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithm
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithmno U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithm
no U-turn sampler, a discussion of Hoffman & Gelman NUTS algorithm
 
Cs 2008(1)
Cs 2008(1)Cs 2008(1)
Cs 2008(1)
 
Polyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationPolyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimization
 
Control assignment#2
Control assignment#2Control assignment#2
Control assignment#2
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 
Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)
 
Polyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometryPolyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometry
 
Efficient Hill Climber for Multi-Objective Pseudo-Boolean Optimization
Efficient Hill Climber for Multi-Objective Pseudo-Boolean OptimizationEfficient Hill Climber for Multi-Objective Pseudo-Boolean Optimization
Efficient Hill Climber for Multi-Objective Pseudo-Boolean Optimization
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
 

En vedette

My Big Birthday Wishlist
My Big Birthday WishlistMy Big Birthday Wishlist
My Big Birthday Wishlistguesteda9ab
 
C. Porchietto La Stampa Torino 12.06.09
C. Porchietto La Stampa Torino 12.06.09C. Porchietto La Stampa Torino 12.06.09
C. Porchietto La Stampa Torino 12.06.09Claudia Porchietto
 
Summer Special International 2009
Summer Special International 2009Summer Special International 2009
Summer Special International 2009guestd3fee6
 

En vedette (6)

My Big Birthday Wishlist
My Big Birthday WishlistMy Big Birthday Wishlist
My Big Birthday Wishlist
 
C. Porchietto La Stampa Torino 12.06.09
C. Porchietto La Stampa Torino 12.06.09C. Porchietto La Stampa Torino 12.06.09
C. Porchietto La Stampa Torino 12.06.09
 
Introduction
IntroductionIntroduction
Introduction
 
Summer Special International 2009
Summer Special International 2009Summer Special International 2009
Summer Special International 2009
 
Cuadro Digital3
Cuadro Digital3Cuadro Digital3
Cuadro Digital3
 
Rf35
Rf35Rf35
Rf35
 

Similaire à A new approach in specifying the inverse quadratic matrix in modulo-2 for controllable and observable information channels

A new approach in specifying the inverse quadratic matrix in modulo -2 for co...
A new approach in specifying the inverse quadratic matrix in modulo -2 for co...A new approach in specifying the inverse quadratic matrix in modulo -2 for co...
A new approach in specifying the inverse quadratic matrix in modulo -2 for co...Anax_Fotopoulos
 
Control of linear systems using
Control of linear systems usingControl of linear systems using
Control of linear systems usingcsandit
 
State equations model based on modulo 2 arithmetic and its applciation on rec...
State equations model based on modulo 2 arithmetic and its applciation on rec...State equations model based on modulo 2 arithmetic and its applciation on rec...
State equations model based on modulo 2 arithmetic and its applciation on rec...Anax Fotopoulos
 
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...Anax_Fotopoulos
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
state space representation,State Space Model Controllability and Observabilit...
state space representation,State Space Model Controllability and Observabilit...state space representation,State Space Model Controllability and Observabilit...
state space representation,State Space Model Controllability and Observabilit...Waqas Afzal
 
Signals and systems: Part ii
Signals and systems:  Part iiSignals and systems:  Part ii
Signals and systems: Part iiPatrickMumba7
 
Passive network-redesign-ntua
Passive network-redesign-ntuaPassive network-redesign-ntua
Passive network-redesign-ntuaIEEE NTUA SB
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemNooria Sukmaningtyas
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...inventionjournals
 
06_Controllability.pdf
06_Controllability.pdf06_Controllability.pdf
06_Controllability.pdfgeremu2
 
Mathematical sciences-paper-ii
Mathematical sciences-paper-iiMathematical sciences-paper-ii
Mathematical sciences-paper-iiknowledgesociety
 
Presentation swith 9_7_13
Presentation swith 9_7_13Presentation swith 9_7_13
Presentation swith 9_7_13Yashar Kouhi
 

Similaire à A new approach in specifying the inverse quadratic matrix in modulo-2 for controllable and observable information channels (20)

A new approach in specifying the inverse quadratic matrix in modulo -2 for co...
A new approach in specifying the inverse quadratic matrix in modulo -2 for co...A new approach in specifying the inverse quadratic matrix in modulo -2 for co...
A new approach in specifying the inverse quadratic matrix in modulo -2 for co...
 
Digital Signal Processing Assignment Help
Digital Signal Processing Assignment HelpDigital Signal Processing Assignment Help
Digital Signal Processing Assignment Help
 
D025030035
D025030035D025030035
D025030035
 
Control of linear systems using
Control of linear systems usingControl of linear systems using
Control of linear systems using
 
State equations model based on modulo 2 arithmetic and its applciation on rec...
State equations model based on modulo 2 arithmetic and its applciation on rec...State equations model based on modulo 2 arithmetic and its applciation on rec...
State equations model based on modulo 2 arithmetic and its applciation on rec...
 
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...
State Equations Model Based On Modulo 2 Arithmetic And Its Applciation On Rec...
 
Assignment2 control
Assignment2 controlAssignment2 control
Assignment2 control
 
Signal Processing Assignment Help
Signal Processing Assignment HelpSignal Processing Assignment Help
Signal Processing Assignment Help
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
state space representation,State Space Model Controllability and Observabilit...
state space representation,State Space Model Controllability and Observabilit...state space representation,State Space Model Controllability and Observabilit...
state space representation,State Space Model Controllability and Observabilit...
 
Signals and systems: Part ii
Signals and systems:  Part iiSignals and systems:  Part ii
Signals and systems: Part ii
 
Passive network-redesign-ntua
Passive network-redesign-ntuaPassive network-redesign-ntua
Passive network-redesign-ntua
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous System
 
D024025032
D024025032D024025032
D024025032
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
 
06_Controllability.pdf
06_Controllability.pdf06_Controllability.pdf
06_Controllability.pdf
 
Ke3617561763
Ke3617561763Ke3617561763
Ke3617561763
 
Mathematical sciences-paper-ii
Mathematical sciences-paper-iiMathematical sciences-paper-ii
Mathematical sciences-paper-ii
 
Presentation swith 9_7_13
Presentation swith 9_7_13Presentation swith 9_7_13
Presentation swith 9_7_13
 

Plus de Anax Fotopoulos

Tzitzikosta message for the world heritage monuments exhibition
Tzitzikosta message for the world heritage monuments exhibitionTzitzikosta message for the world heritage monuments exhibition
Tzitzikosta message for the world heritage monuments exhibitionAnax Fotopoulos
 
Acropoils & other hellenic world monuments
Acropoils & other hellenic world monumentsAcropoils & other hellenic world monuments
Acropoils & other hellenic world monumentsAnax Fotopoulos
 
Architecture of the human regulatory network derived from encode data
Architecture of the human regulatory network derived from encode dataArchitecture of the human regulatory network derived from encode data
Architecture of the human regulatory network derived from encode dataAnax Fotopoulos
 
From Smart Homes to Smart Cities: An approach based on Internet-of-Things
From Smart Homes to Smart Cities: An approach based on Internet-of-ThingsFrom Smart Homes to Smart Cities: An approach based on Internet-of-Things
From Smart Homes to Smart Cities: An approach based on Internet-of-ThingsAnax Fotopoulos
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models Anax Fotopoulos
 
TIS prediction in human cDNAs with high accuracy
TIS prediction in human cDNAs with high accuracyTIS prediction in human cDNAs with high accuracy
TIS prediction in human cDNAs with high accuracyAnax Fotopoulos
 
Wef the future role of civil society report 2013
Wef the future role of civil society report 2013Wef the future role of civil society report 2013
Wef the future role of civil society report 2013Anax Fotopoulos
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace ReportAnax Fotopoulos
 
Europa Nostra Athens Congress - Registration fees
Europa Nostra Athens Congress - Registration feesEuropa Nostra Athens Congress - Registration fees
Europa Nostra Athens Congress - Registration feesAnax Fotopoulos
 
Europa Nostra Congress Athens 2013 - Programme
Europa Nostra Congress Athens 2013 - ProgrammeEuropa Nostra Congress Athens 2013 - Programme
Europa Nostra Congress Athens 2013 - ProgrammeAnax Fotopoulos
 
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυα
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυαΣυστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυα
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυαAnax Fotopoulos
 
Introduction to Tempus Programme (5th Call)
Introduction to Tempus Programme (5th Call)Introduction to Tempus Programme (5th Call)
Introduction to Tempus Programme (5th Call)Anax Fotopoulos
 
TEI Piraeus IEEE Student Branch Actions 2011-2012
TEI Piraeus IEEE Student Branch  Actions 2011-2012 TEI Piraeus IEEE Student Branch  Actions 2011-2012
TEI Piraeus IEEE Student Branch Actions 2011-2012 Anax Fotopoulos
 
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ & ΤΩΝ ΜΕΤΡΩΝ Π...
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ &  ΤΩΝ ΜΕΤΡΩΝ Π...Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ &  ΤΩΝ ΜΕΤΡΩΝ Π...
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ & ΤΩΝ ΜΕΤΡΩΝ Π...Anax Fotopoulos
 
Measuring the EMF of various widely used electronic devices and their possibl...
Measuring the EMF of various widely used electronic devices and their possibl...Measuring the EMF of various widely used electronic devices and their possibl...
Measuring the EMF of various widely used electronic devices and their possibl...Anax Fotopoulos
 
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυα
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυαEισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυα
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυαAnax Fotopoulos
 

Plus de Anax Fotopoulos (20)

AFMM Manual
AFMM ManualAFMM Manual
AFMM Manual
 
Tzitzikosta message for the world heritage monuments exhibition
Tzitzikosta message for the world heritage monuments exhibitionTzitzikosta message for the world heritage monuments exhibition
Tzitzikosta message for the world heritage monuments exhibition
 
Acropoils & other hellenic world monuments
Acropoils & other hellenic world monumentsAcropoils & other hellenic world monuments
Acropoils & other hellenic world monuments
 
Architecture of the human regulatory network derived from encode data
Architecture of the human regulatory network derived from encode dataArchitecture of the human regulatory network derived from encode data
Architecture of the human regulatory network derived from encode data
 
Ret protooncogene
Ret protooncogeneRet protooncogene
Ret protooncogene
 
From Smart Homes to Smart Cities: An approach based on Internet-of-Things
From Smart Homes to Smart Cities: An approach based on Internet-of-ThingsFrom Smart Homes to Smart Cities: An approach based on Internet-of-Things
From Smart Homes to Smart Cities: An approach based on Internet-of-Things
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models
Introduction to HMMER - A biosequence analysis tool with Hidden Markov Models
 
TIS prediction in human cDNAs with high accuracy
TIS prediction in human cDNAs with high accuracyTIS prediction in human cDNAs with high accuracy
TIS prediction in human cDNAs with high accuracy
 
Wef the future role of civil society report 2013
Wef the future role of civil society report 2013Wef the future role of civil society report 2013
Wef the future role of civil society report 2013
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
 
Europa Nostra Athens Congress - Registration fees
Europa Nostra Athens Congress - Registration feesEuropa Nostra Athens Congress - Registration fees
Europa Nostra Athens Congress - Registration fees
 
Europa Nostra Congress Athens 2013 - Programme
Europa Nostra Congress Athens 2013 - ProgrammeEuropa Nostra Congress Athens 2013 - Programme
Europa Nostra Congress Athens 2013 - Programme
 
RMCEF
RMCEFRMCEF
RMCEF
 
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυα
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυαΣυστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυα
Συστήματα ανίχνευσης εισβολών με νευρωνικά δίκτυα
 
Introduction to Tempus Programme (5th Call)
Introduction to Tempus Programme (5th Call)Introduction to Tempus Programme (5th Call)
Introduction to Tempus Programme (5th Call)
 
TEI Piraeus IEEE Student Branch Actions 2011-2012
TEI Piraeus IEEE Student Branch  Actions 2011-2012 TEI Piraeus IEEE Student Branch  Actions 2011-2012
TEI Piraeus IEEE Student Branch Actions 2011-2012
 
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ & ΤΩΝ ΜΕΤΡΩΝ Π...
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ &  ΤΩΝ ΜΕΤΡΩΝ Π...Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ &  ΤΩΝ ΜΕΤΡΩΝ Π...
Η ΣΚΟΤΕΙΝΗ ΠΛΕΥΡΑ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ - ΠΑΡΟΥΣΙΑΣΗ ΤΩΝ ΠΡΟΒΛΗΜΑΤΩΝ & ΤΩΝ ΜΕΤΡΩΝ Π...
 
Measuring the EMF of various widely used electronic devices and their possibl...
Measuring the EMF of various widely used electronic devices and their possibl...Measuring the EMF of various widely used electronic devices and their possibl...
Measuring the EMF of various widely used electronic devices and their possibl...
 
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυα
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυαEισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυα
Eισήγηση στα χαοτικα τεχνητα νευρωνικα δικτυα
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

A new approach in specifying the inverse quadratic matrix in modulo-2 for controllable and observable information channels

  • 1. Technological Educational Institute of PIRAEUS Computer Systems Engineering Department A new approach in specifying the inverse quadratic matrix in modulo-2 for controllable and observable information channels CH. N. TASIOPOULOS, A. A. FOTOPOULOS, D. VOUKALIS, P. H. YANNAKOPOULOS International Scientific Conference eRA-5 2010
  • 2. Introduction Noisy Communication System [Figure 5.1, page 200, “Fundamentals of Information Theory and Coding Design”, R. Togneri, Ch. deSilva] In the above diagram we can see the use of channel & source coders in modern digital communication systems provide efficient and reliable transmission of information in the presence of noise. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 2
  • 3. Introduction A common noisy communication system is described by the channel encoder, the source encoder, the digital channel, the channel decoder and the source decoder. We can model such a system, according to the principles of digital control theory, as a digital communication channel between transmitter and receiver. The function of the new modeled system can be described from the state space equations that will be analyzed bellow. For the encoding of information we will use, from the principles of code and information theory, a generator matrix . In this presentation we will use the state space matrixes as components of the generator matrix for the channel encoding. Finally we will investigate the controllable and observable theorems for the above suggested encoding using modulo-2 arithmetic in Galois field. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 3
  • 4. Concepts of Digital Control Theory  The controllable of a system refers to the possibility for it to be transferred from a given initial state in any final, in finite time, and the observable constitutes the dualism of the controllable. [Kalman 1960] TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 4
  • 5. Concepts of Digital Control Theory State Equations u (k 1) x(k 1) Ax ( k ) Bu ( k ), x (0) x0 u (k 2) x(k ) Ak x(0) [ B  AB ... Ak 1B ]  y (k ) Cx ( k ) u (0) u (k 1) k k 1 u (k 2) where: x(k ) A x(0) [ B  AB ... A B ]  u (0) TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 5
  • 6. Concepts of Digital Control Theory  Controllable Definition For | A | 0 the state equation x(k 1) is controllable if is possible a control sequence {u(0), u(1),u(q 1)} to be found, that can, in finite time even q, lead the system from any initial state x(0) to any final state x(q) , Rn u (q 1) u (q 2) Then: q x(0) [ B  AB    Aq 1 B]  . u (0) It is known from linear algebra, that this equation has solution when: rank [ B    A q 1 B | q x(0)] rank [ B    A q 1B] TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 6
  • 7. Concepts of Digital Control Theory  Controllable Definition To apply the above equation, for any arbitrary final state should : rank [ B    A q 1B] n, q N From Cayley-Hamilton theorem, conditions A j B, for j n are linearly dependent on the first n terms ( B, AB, , A n 1B) The above equality must be satisfied for q=n. This means: rank [ B    A n 1B] n TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 7
  • 8. Concepts of Digital Control Theory  Controllable Definition Finally the system x( k 1) Ax( k ) Bu ( k ), x(0) x is 0 controllable, when rank S=n , S [ B  AB  An 1B] Where the nxnm table S called controllability table TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 8
  • 9. Concepts of Digital Control Theory  Observable definition The state space equations model is observable If there exists finite q, such that knowledge of inputs {u(0), u(1),…, u(q-1)} and outputs {y(0),y(1), …, y(q-1)}, can uniquely determine The initial state x(0) of the system. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 9
  • 10. Concepts of Digital Control Theory  Observable definition Specifically the state space model is observable C CA If rank R n , R=  CAn 1 Where the npxn table R called observability table TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 10
  • 11. Concepts of Digital Control Theory The loss of controllable and observable because of sampling It is known that when sampling a continuous time system, we have a discrete time system with tables that depend on the sampling period T. A discrete time system is controllable if the continuous time system is also controllable. This is because the control signals in a sampled system are a subset of control signals of the continuous time system. Nevertheless it is possible to lose controllability for some values of the sampling period. While the original continuous system is controllable, the equivalent discrete system may not be controllable. Similar problems occur with observable. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 11
  • 12. Concepts of information and code theory Group definition A group (G,*) is a pair consisting of a set G and an operation * on that set , that is a function from the Cartesian product GxG to G , with the result of operating on a and b denoted by a*b , which satisfies  1. associativity : a*(b*c)= (a*b)*c for all a, b, c G  2. Existence of identity: There exists e G such that e*a=a and a*e=a for all a G  3.Existence of inverses: For each a G there exists a 1 G such that a * a 1 e and a 1 * a e TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 12
  • 13. Concepts of information and code theory Cyclic Groups definition For each positive integer p, there is a group called the cyclic group of order p, with set of elements Z p {0,1, ,( p 1)} and operation defined by i j i j If i j p , where (+ )denotes the usual operation of addition of integers, and i j i j p If i j p ,where (-) denotes the usual operation of subtraction of integers. The operation in the cyclic group is addition modulo p. We shall use the sign + instead of to denote this operation in what follows and refer to “the cyclic Group ( Z p , ) ” , or simply the cyclic group Z p TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 13
  • 14. Concepts of information and code theory Ring definition A ring is a triple ( R, , ) consisting of a set R, and two operations + and , referred to as addition and multiplication, respectively, which satisfy the following conditions: 1.Associativity of +: a (b c) (a b) c, for all a,b,c R 2.Commutativity of +: a b b a for all a,b R 3.Existence of additive identity: there exists 0 R such that 0 a a and a 0 a for all a R a ( a) 0 4.Existence of additive inverses: for each a R there exists a R such that and ( a ) a 0 5.Associativity of : a (b c) (a b) c, for all a, b, c R 6. Distributivity of over +: a (b c) (a b)(a c), for all a, b, c R Evariste Galois 1811-1832 TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 14
  • 15. Concepts of information and code theory Cyclic rings definition For every positive integer p, there is a ring ( Z p , , ) , called the cyclic ring of order p, with set of elements Zp {0,1, , ( p 1)} and operations + denoting addition modulo p, and denoting multiplication modulo p Evariste Galois 1811-1832 TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 15
  • 16. Concepts of information and code theory Linear codes definition n  A binary block code is a subset of B for some n .Elements of the code are called code words n  Linear code : A linear code is a linear subspace of B  Minimum distance : The minimum distance of a linear code is the minimum of the weights of the non –zero code words Evariste Galois 1811-1832 TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 16
  • 17. Concepts of information and code theory Generator Matrix A generator matrix for a linear code is a binary matrix whose rows are the code words belonging to some basis for the code  Example : The code { 0000, 0001, 1000, 1001} is a two- dimensional linear code in {0001, 1000} is a basis for this code , which give us the generator matrix B 4 0 0 0 1 G= 1 0 0 0 To find the code words from the generator matrix , we perform the following multiplications: 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 1 1 1 1 0 0 1 1 0 0 0 1 0 0 0 TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 17
  • 18. Concepts of information and code theory Elementary Row Operation & Canonical Form  An elementary row operation on a binary matrix consists of replacing a row of the matrix with the sum of that row and any other row.  The generator matrix G of a k-dimensional linear code in B n is in canonical form if it is of the form G [ I : A] where I is a k k identity matrix and A is arbitrary k (n k ) binary matrix  If the generator matrix G is in canonical form, and w is any k-bit word, the code word s=wG is in systematic form and the first k bits of s are the same as the bits of w. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 18
  • 19. Combining the theories For a common noisy digital channel of the following diagram we propose a state space equations modeling according to the digital control theory. x ( k 1) Ax ( k ) Bu ( k ) y(k ) Cx ( k ) TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 19
  • 20. Combining the theories x (k 1) Ax (k ) Bu (k ) y (k ) Cx (k ) Where: U(k) u ( k ) {b0 , b1 ,...bk } B n A [aij ], ij 1, 2,..., n Aij Bij Cij B [bij ], ij 1, 2,..., n C [cij ], ij 1, 2,..., n TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 20
  • 21. Modulo-2 Arithmetic From the cyclic groups definition we have: Zp {0,1, , ( p 1)} The equation becomes for p=2: Z2 {0,1} Where Z 2 is a cyclic group in modulo-2 arithmetic. The operations stands as referred previously. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 21
  • 22. Generator Matrix  From the principles of code and information theory , we use a generator matrix for the encoding of the information channel. G [b 'ij ], ij 1,2,..., nwith 'b Bn  For example: 1 0 0 1 1 1 1 0 G 0 1 0 1 1 0 0 0 TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 22
  • 23. Combining the theories  It is known that a generator matrix of the above form G can be divided into submatrixes.  In the proposed model we use 3 submatrixes, that come from the state space tables A,B,C.  The suggested generator matrix G consists itself an encoding channel protocol, with the tables A,B,C accruing from different encoding protocols TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 23
  • 24. Controllable We will investigate whether the matrixes A,B,C of the proposed generator matrix model of a specific protocol in modulo-2 arithmetic of Galois field can lead the system in controllable Form. S [ B  AB  An 1 B] where Aij , Bij Bn ' with n' means the length of the code word  The system is controllable if: rank [ B    A n 1 B] n where n is the dimension of the quadratic matrix S.  In different case the system isn’t controllable. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 24
  • 25. Observable We will investigate whether the matrixes A,B,C of the proposed generator matrix model of a specific protocol in modulo-2 arithmetic of Galois field can lead the system in observable form. C CA R=  CAn 1 n' where Aij , Cij B with n' means the length of the code w ord  The system is observable if rank R=n where n is the dimension of the quadratic matrix R.  In different case the system isn’t observable. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 25
  • 26. Determinant of quadratic matrix in modulo-2 To calculate the controllable and observable is necessary to calculate the determinant of the quadratic matrix R, S in modulo-2 k11 k12  k1n k21 k22  k2 n K b Bn     kn1 kn 2  knn D K ki1K i1 ki 2 K i 2 ... kin K in where: Kij ( 1)i j Dij TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 26
  • 27. Example implementation x (k 1) Ax (k ) Bu (k ) y (k ) Cx (k ) Suppose we have a system which described by the following state space tables: 1 1 0 1 A 0 1 1 , B= 1 , C= 1 1 0 with n=3 1 1 1 0 0 1 AB 1 , A2 B 1 CA 1 0 1 , CA 2 [0 0 1] 0 1 1 0 1 C 1 1 0 R [B AB A2 B ] 1 1 1 , R 1 0 R CA 1 0 1 1 0 0 0 1 CA2 0 0 1 The system is controllable The system is observable TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 27
  • 28. Conclusion As we observe before it’s possible the design of a digital system in controllable and observable form encoded in modulo-2 arithmetic. Key advantage of the proposed model is the study of controllability and observability in a binary(modulo-2) information channel. The direct connection between machine language and digital controllers can create many opportunities and application in design level. TEI of PIRAEUS, Computer Systems Engineering Department International Scientific Conference eRA-5 28
  • 29. Technological Educational Institute of PIRAEUS Computer Systems Engineering Department END OF PRESENTATION Thank you for your attention Ch. N. Tasiopoulos, A. A. Fotopoulos, D. Voukalis, P. H.Yannakopoulos International Scientific Conference eRA-5 2010 29