Constructing Snake-In-The-Box Codes and Families of Such Codes Covering the Hypercube

Total Page:16

File Type:pdf, Size:1020Kb

Constructing Snake-In-The-Box Codes and Families of Such Codes Covering the Hypercube Constructing Snake-in-the-box Codes and Families of such Codes Covering the Hypercube Proefschrift Ter verkrijging van de graad van doctor aan de Technische Universiteit Delft, op gezag van de Rector Magnificus prof. dr. ir. J.T. Fokkema voorzitter van het College voor Promoties, in het openbaar te verdedigen op maandag 15 januari 2007 om 10.00 uur door Loeky Haryanto Master of Science in Mathematics, University of Florida, Master of Arts in Teaching, University of Florida, Gainesville, Florida-United States geboren te Solo, Central Java-Indonesia. Dit proefschrift is goedgekeurd door de promotor: Prof. dr. A.J. van Zanten Samenstelling promotiecommissie: Rector Magnificus, voorzitter Prof.dr. A. J. van Zanten, Universiteit Maastricht, promotor Prof. dr. S. M. Dodunekov, Bulgarian Academy of Sciences, Bulgarije Prof. dr. V. A. Zinoviev, Russian Academy of Sciences, Rusland Prof. dr. F. I. Solov’jeva, State University Novosibirsk, Rusland Prof. dr. H. C. A. van Tilborg, Technische Universiteit Eindhoven Prof. dr. C. Roos, Technische Universiteit Delft Prof. dr. C. Witteveen, Technische Universiteit Delft Prof. dr. ir. J. Biemond (reservelid) Technische Universiteit Delft Constructing Snake-in-the-box Codes and Families of such Codes Covering the Hypercube Dissertation at Delft University of Technology Copyright © 2007 by Loeky Haryanto This work has been carried out with financial support from the Royal Netherlands Academy of Arts and Sciences (KNAW) under the framework of the Scientific Programme Indonesia - Netherlands (SPIN). ISBN: 90-8559-265-8 Keywords: Standard Gray codes, symmetric transition sequence, snake-in-the-box codes (snakes), minimum-weight basis, fixed-position property, ordered basis of linear code, Reed- Muller codes, p-cover of hypercube Qn by disjoint snakes, invariance translation group. Cover: Two (vertex-)disjoint snake-in-the-box codes (snakes) cover the hypercube Q4. To my wife and children: Ogi (Oktafien Somalinggi), Bagas (Bagaskara Galois Somalinggi), and Laras (Tiara Monita Larasati). Delft, the Netherlands, January 2007 iii Acknowledgments This dissertation could not have been written without Prof. dr. A. J. van Zanten who introduced me further into the theory of algebraic coding, in particular into this special topic of ordered codes. My special thanks go to the Royal Netherlands Academy of Arts and Sciences (KNAW) for financially supporting this research, and to the Applied Mathematics Department (DIAM), TUDelft, for its hospitality and for providing me with academic facilities during the last two and half years of my work at TUDelft. My deep appreciation also goes to Mr. Paul Althuis at CICAT and to his project co- ordinators (Franca Post, Manon Post and Rene Tamboer) for their helpful administrative assistance, despite of the fact that there are so many students and Ph.D candidates to deal with. I also very much appreciate all my colleagues at TUDelft, especially my roommates Julius and Niels who always entertain me with their music, seemingly from the same song album. Neither will I forget my (former) roommates Berd and Sander, with whom I shared the same office at the 10-th floor before I had to move to the floor of DIAM. With respect to my own research, my special appreciation goes to I Nengah Suparta, the only colleague I knew at the TUDelft who was working in the area of finite ordered codes. This work is also for the memory of my late father, Lukito, who was so proud being educated in the Dutch educational system adapted in Indonesia. Unfortunately, he passed away during my stay in the Netherlands, while I was the only one of his sons and daughters who was not able to be with him in his last minutes. I am also very grateful to my late father-in-law (Somalinggi) and to my mother-in-law (Mathilda) who always prays for my success, just like my mother (Soehartati) uses to do. Last but not least, I am very grateful to my wife Oktafien, who keeps supporting me and who convinced me to be determined, and not to be worried by the absence of her and of our children (Bagas, 10, and Laras, 9) during my stay in the Netherlands, though their absence is the only thing that brings about feelings of loneliness. v Table of Contents Acknowledgments...................................................................................................... v Table of Contents......................................................................................................vii 1. Introduction ............................................................................................................1 1.1 The Main Objectives..................................................................................................1 1.2 Outline of the Next Sections......................................................................................3 2. Gray Codes and Circuit Codes...............................................................................6 2.1 The Standard Gray Code G(n) ...................................................................................6 2.2 Index Problem of G(n)...............................................................................................7 2.3 Properties of the Standard Gray Code G(n).............................................................10 2.4 DP-Codes, <m, n>- Codes and Snakes...................................................................19 3. A Construction of Snake-in-the-box Codes ..........................................................22 3.1. Snakes Based on Necklaces....................................................................................22 3.2. Generalized Necklaces............................................................................................31 3.3. A More General Construction.................................................................................32 3.4. The Structures of 2-Necklaces in Q2p, p > 2 prime.................................................41 4. Snakes Based on a Linear Code..........................................................................45 4.1 Outlines of the Construction ....................................................................................45 4.2 Necessary and Sufficient Conditions.......................................................................47 4.3 The Index Problem of a Snake in Qn .......................................................................56 5. Snakes in the Hypercubes Qn. for 3 < n ≤ 16. ......................................................59 5.1 Euclidean Geometries ..............................................................................................59 5.2 Reed-Muller Codes ..................................................................................................62 5.3. Parallel Systems in EG(3,2) and EG(4,2) ...............................................................66 5.4. Snakes Embedded in EG(3,2).................................................................................68 5.5 Snakes Embedded in EG(4, 2).................................................................................71 5.6 A Sufficient Condition for a Block List to Generate a Snake..................................79 6. Translations of Snakes.........................................................................................81 6.1 Conditions for Disjoint Translated Snakes ..............................................................81 6.2 Special Cases ...........................................................................................................87 6.3 Disjoint Snakes Based on Lexicographically Ordered Lists....................................90 7. Covers and Near-Covers of Qn, for 2 ≤ n ≤ 16.....................................................94 7.1 Symmetric Covers of Qn, for 2 ≤ n ≤ 15..................................................................94 7.2 Near-Covers of Q16 ..................................................................................................98 7.3 A Symmetric 8-Cover of Q16 .................................................................................105 vii 8. More about Covers of Hypercubes.....................................................................109 8.1 Covers of Qn and the Griesmer Bound ..................................................................109 8.2 Covers of Qn and Gray Codes................................................................................112 8.3 Special Bases for R(m − 2, m) and Covers of Qn ...................................................120 Appendices ............................................................................................................129 Appendix A..................................................................................................................129 Appendix B ..................................................................................................................132 Appendix C ..................................................................................................................136 Appendix D..................................................................................................................138 List of References ..................................................................................................139 Summary................................................................................................................143 Samenvatting .........................................................................................................144 Curriculum Vitae.....................................................................................................145
Recommended publications
  • Final-Del-Lab-Manual-2018-19
    LAB MANUAL DIGITAL ELECTRONICS LABORATORY Subject Code: 210246 2018 - 19 INDEX Batch : - Page Date of Date of Signature of Sr.No Title No Conduction Submission Staff GROUP - A Realize Full Adder and Subtractor using 1 a) Basic Gates and b) Universal Gates Design and implement Code converters-Binary to Gray and BCD to 2 Excess-3 Design of n-bit Carry Save Adder (CSA) and Carry Propagation Adder (CPA). Design and Realization of BCD 3 Adder using 4-bit Binary Adder (IC 7483). Realization of Boolean Expression for suitable combination logic using MUX 4 74151 / DMUX 74154 Verify the truth table of one bit and two bit comparators using logic gates and 5 comparator IC Design & Implement Parity Generator 6 using EX-OR. GROUP - B Flip Flop Conversion: Design and 7 Realization Design of Ripple Counter using suitable 8 Flip Flops a. Realization of 3 bit Up/Down Counter using MS JK Flip Flop / D-FF 9 b. Realization of Mod -N counter using ( 7490 and 74193 ) Design and Realization of Ring Counter 10 and Johnson Ring counter Design and implement Sequence 11 generator using JK flip-flop INDEX Batch : - Design and implement pseudo random 12 sequence generator. Design and implement Sequence 13 detector using JK flip-flop Design of ASM chart using MUX 14 controller Method. GROUP - C Design and Implementation of 15 Combinational Logic using PLAs. Design and simulation of - Full adder , 16 Flip flop, MUX using VHDL (Any 2) Use different modeling styles. Design & simulate asynchronous 3- bit 17 counter using VHDL. Design and Implementation of 18 Combinational Logic using PALs GROUP - D Study of Shift Registers ( SISO,SIPO, 19 PISO,PIPO ) Study of TTL Logic Family: Feature, 20 Characteristics and Comparison with CMOS Family Study of Microcontroller 8051 : 21 Features, Architecture and Programming Model ` Digital Electronics Lab (Pattern 2015) GROUP - A Digital Electronics Lab (Pattern 2015) Assignment: 1 Title: Adder and Subtractor Objective: 1.
    [Show full text]
  • A New Approach to the Snake-In-The-Box Problem
    462 ECAI 2012 Luc De Raedt et al. (Eds.) © 2012 The Author(s). This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License. doi:10.3233/978-1-61499-098-7-462 A New Approach to the Snake-In-The-Box Problem David Kinny1 Abstract. The “Snake-In-The-Box” problem, first described more Research on the SIB problem initially focused on applications in than 50 years ago, is a hard combinatorial search problem whose coding [14]. Coils are spread-k circuit codes for k =2, in which solutions have many practical applications. Until recently, techniques n-words k or more positions apart in the code differ in at least k based on Evolutionary Computation have been considered the state- bit positions [12]. (The well-known Gray codes are spread-1 circuit of-the-art for solving this deterministic maximization problem, and codes.) Longest snakes and coils provide the maximum number of held most significant records. This paper reviews the problem and code words for a given word size (i.e., hypercube dimension). prior solution techniques, then presents a new technique, based on A related application is in encoding schemes for analogue-to- Monte-Carlo Tree Search, which finds significantly better solutions digital converters including shaft (rotation) encoders. Longest SIB than prior techniques, is considerably faster, and requires no tuning. codes provide greatest resolution, and single bit errors are either recognised as such or map to an adjacent codeword causing an off- 1 INTRODUCTION by-one error.
    [Show full text]
  • NOTE on GRAY CODES for PERMUTATION LISTS Seymour
    PUBLICATIONS DE L’INSTITUT MATHEMATIQUE´ Nouvelle s´erie,tome 78(92) (2005), 87–92 NOTE ON GRAY CODES FOR PERMUTATION LISTS Seymour Lipschutz, Jie Gao, and Dianjun Wang Communicated by Slobodan Simi´c Abstract. Robert Sedgewick [5] lists various Gray codes for the permutations in Sn including the classical algorithm by Johnson and Trotter. Here we give an algorithm which constructs many families of Gray codes for Sn, which closely follows the construction of the Binary Reflexive Gray Code for the n-cube Qn. 1. Introduction There are (n!)! ways to list the n! permutations in Sn. Some such permutation lists have been generated by a computer, and some such permutation lists are Gray codes (where successive permutations differ by a transposition). One such famous Gray code for Sn is by Johnson [4] and Trotter [6]. In fact, each new permutation in the Johnson–Trotter (JT ) list for Sn is obtained from the preceding permutation by an adjacent transposition. Sedgewick [5] gave a survey of various Gray codes for Sn in 1977. Subsequently, Conway, Sloane and Wilks [1] gave a new Gray code CSW for Sn in 1989 while proving the existence of Gray codes for the reflection groups. Recently, Gao and Wang [2] gave simple algorithms, each with an efficient implementation, for two new permutation lists GW1 and GW2 for Sn, where the second such list is a Gray code for Sn. The four lists, JT , CSW , GW1 and GW2, for n = 4, are pictured in Figure 1. This paper gives an algorithm for constructing many families of Gray codes for Sn which uses an idea from the construction of the Binary Reflected Gray Code (BRGC) of the n-cube Qn.
    [Show full text]
  • Degree in Mathematics
    Degree in Mathematics Title: An Experimental Study of the Minimum Linear Colouring Arrangement Problem. Author: Montserrat Brufau Vidal Advisor: Maria José Serna Iglesias Department: Computer Science Department Academic year: 2016-2017 ii An experimental study of the Minimum Linear Colouring Arrangement Problem Author: Montserrat Brufau Vidal Advisor: Maria Jos´eSerna Iglesias Facultat de Matem`atiquesi Estad´ıstica Universitat Polit`ecnicade Catalunya 26th June 2017 ii Als meus pares; a la Maria pel seu suport durant el projecte; al meu poble, Men`arguens. iii iv Abstract The Minimum Linear Colouring Arrangement problem (MinLCA) is a variation from the Min- imum Linear Arrangement problem (MinLA) and the Colouring problem. The objective of the MinLA problem is finding the best way of labelling each vertex of a graph in such a manner that the sum of the induced distances between two adjacent vertices is the minimum. In our case, instead of labelling each vertex with a different integer, we group them with the condition that two adjacent vertices cannot be in the same group, or equivalently, by allowing the vertex labelling to be a proper colouring of the graph. In this project, we undertake the task of broadening the previous studies for the MinLCA problem. The main goal is developing some exact algorithms based on backtracking and some heuristic algorithms based on a maximal independent set approach and testing them with dif- ferent instances of graph families. As a secondary goal we are interested in providing theoretical results for particular graphs. The results will be made available in a simple, open-access bench- marking platform.
    [Show full text]
  • Other Binary Codes (3A)
    Other Binary Codes (3A) Young Won Lim 1/3/14 Copyright (c) 2011-2013 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Please send corrections (or suggestions) to [email protected]. This document was produced by using OpenOffice and Octave. Young Won Lim 1/3/14 Coding A code is a rule for converting a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. Young Won Lim Other Binary Codes (4A) 3 1/3/14 Character Coding ASCII code BCD (Binary Coded Decimal) definitions for 128 characters: Number characters (0-9) 33 non-printing control characters (many now obsolete) 95 printable charactersi Young Won Lim Other Binary Codes (4A) 4 1/3/14 Representation of Numbers Fixed Point Number representation ● 2's complement +1234 ● 1's complement 0 -582978 coding ● sign-magnitude Floating Point Number representation +23.84380 ● IEEE 754 -1.388E+08
    [Show full text]
  • The Snake-In-The-Box Problem: a Primer
    THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA (Under the Direction of Walter D. Potter) ABSTRACT This thesis is a primer designed to introduce novice and expert alike to the Snake-in-the- Box problem (SIB). Using plain language, and including explanations of prerequisite concepts necessary for understanding SIB throughout, it introduces the essential concepts of SIB, its origin, evolution, and continued relevance, as well as methods for representing, validating, and evaluating snake and coil solutions in SIB search. Finally, it is structured to serve as a convenient reference for those exploring SIB. INDEX WORDS: Snake-in-the-Box, Coil-in-the-Box, Hypercube, Snake, Coil, Graph Theory, Constraint Satisfaction, Canonical Ordering, Canonical Form, Equivalence Class, Disjunctive Normal Form, Conjunctive Normal Form, Heuristic Search, Fitness Function, Articulation Points THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA B.A., George Mason University, 1991 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2015 © 2015 Thomas E. Drapela All Rights Reserved THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA Major Professor: Walter D. Potter Committee: Khaled Rasheed Pete Bettinger Electronic Version Approved: Julie Coffield Interim Dean of the Graduate School The University of Georgia May 2015 DEDICATION To my dearest Kristin: For loving me enough to give me a shove. iv ACKNOWLEDGEMENTS I wish to express my deepest gratitude to Dr. Potter for introducing me to the Snake-in-the-Box problem, for giving me the freedom to get lost in it, and finally, for helping me to find my way back.
    [Show full text]
  • An Archive of All Submitted Project Proposals
    CS 598 JGE ] Fall 2017 One-Dimensional Computational Topology Project Proposals Theory 0 Bhuvan Venkatesh: embedding graphs into hypercubes ....................... 1 Brendan Wilson: anti-Borradaile-Klein? .................................. 4 Charles Shang: vertex-disjoint paths in planar graphs ......................... 6 Hsien-Chih Chang: bichromatic triangles in pseudoline arrangements ............. 9 Sameer Manchanda: one more shortest-path tree in planar graphs ............... 11 Implementation 13 Jing Huang: evaluation of image segmentation algorithms ..................... 13 Shailpik Roy: algorithm visualization .................................... 15 Qizin (Stark) Zhu: evaluation of r-division algorithms ........................ 17 Ziwei Ba: algorithm visualization ....................................... 20 Surveys 22 Haizi Yu: topological music analysis ..................................... 22 Kevin Hong: topological data analysis .................................... 24 Philip Shih: planarity testing algorithms .................................. 26 Ross Vasko: planar graph clustering ..................................... 28 Yasha Mostofi: image processing via maximum flow .......................... 31 CS 598JGE Project Proposal Name and Netid: Bhuvan Venkatesh: bvenkat2 Introduction Embedding arbitrary graphs into Hypercubes has been the study of research for many practical implementation purposes such as interprocess communication or resource. A hypercube graph is any graph that has a set of 2d vertexes and all the vertexes are
    [Show full text]
  • Eindhoven University of Technology BACHELOR on the K-Independent
    Eindhoven University of Technology BACHELOR On the k-Independent Set Problem Koerts, Hidde O. Award date: 2021 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain On the k-Independent Set Problem Hidde Koerts Supervised by Aida Abiad February 1, 2021 Hidde Koerts Supervised by Aida Abiad Abstract In this thesis, we study several open problems related to the k-independence num- ber, which is defined as the maximum size of a set of vertices at pairwise dis- tance greater than k (or alternatively, as the independence number of the k-th graph power). Firstly, we extend the definitions of vertex covers and cliques to allow for natural extensions of the equivalencies between independent sets, ver- tex covers, and cliques.
    [Show full text]
  • Loopless Gray Code Enumeration and the Tower of Bucharest
    Loopless Gray Code Enumeration and the Tower of Bucharest Felix Herter1 and Günter Rote1 1 Institut für Informatik, Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany [email protected], [email protected] Abstract We give new algorithms for generating all n-tuples over an alphabet of m letters, changing only one letter at a time (Gray codes). These algorithms are based on the connection with variations of the Towers of Hanoi game. Our algorithms are loopless, in the sense that the next change can be determined in a constant number of steps, and they can be implemented in hardware. We also give another family of loopless algorithms that is based on the idea of working ahead and saving the work in a buffer. 1998 ACM Subject Classification F.2.2 Nonnumerical Algorithms and Problems Keywords and phrases Tower of Hanoi, Gray code, enumeration, loopless generation Contents 1 Introduction: the binary reflected Gray code and the Towers of Hanoi 2 1.1 The Gray code . .2 1.2 Loopless algorithms . .2 1.3 The Tower of Hanoi . .3 1.4 Connections between the Towers of Hanoi and Gray codes . .4 1.5 Loopless Tower of Hanoi and binary Gray code . .4 1.6 Overview . .4 2 Ternary Gray codes and the Towers of Bucharest 5 3 Gray codes with general radixes 7 4 Generating the m-ary Gray code with odd m 7 5 Generating the m-ary Gray code with even m 9 arXiv:1604.06707v1 [cs.DM] 22 Apr 2016 6 The Towers of Bucharest++ 9 7 Simulation 11 8 Working ahead 11 8.1 An alternative STEP procedure .
    [Show full text]
  • Connectivity 1
    Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer A Connectivity Problem Prove. The vertices of a connected graph 퐺 can always be ordered as 푣1, 푣2, … , 푣푛 such that for every 1 < 푖 ≤ 푛, if we remove 푣푖, 푣푖+1, … , 푣푛 and the edges adjacent to these vertices, 퐺 remains connected. 푣3 푣4 푣1 푣2 푣5 Proof Pick any vertex as 푣1. Pick a vertex that is connected to 푣1 in 퐺 and set it as 푣2. Pick a vertex that is connected either to 푣1 or to 푣2 in 퐺 and set it as 푣3. … Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should be reliable – a few malfunctioning routers should not disable the entire network. ◦ What condition should we require from the network? ◦ That after removing any 푘 routers, the network remains connected. 푘-connected Graphs An graph 퐺 = (푉, 퐸) is said to be 푘- connected if 푉 > 푘 and we cannot obtain a non-connected graph by removing 푘 − 1 vertices from 푉. Is the graph in the figure ◦ 1-connected? Yes. ◦ 2-connected? Yes. ◦ 3-connected? No! Connectivity Which graphs are 1-connected? ◦ These are exactly the connected graphs. The connectivity of a graph 퐺 is the maximum integer 푘 such that 퐺 is 푘- connected. What is the connectivity of the complete graph 퐾푛? 푛 − 1. The graph in the figure has a connectivity of 2. Hypercube A hypercube is a generalization of the cube into any dimension.
    [Show full text]
  • Layout Volumes of the Hypercube∗
    Layout Volumes of the Hypercube¤ Lubomir Torok Institute of Mathematics and Computer Science Severna 5, 974 01 Banska Bystrica, Slovak Republic Imrich Vrt'o Department of Informatics Institute of Mathematics, Slovak Academy of Sciences Dubravska 9, 841 04 Bratislava, Slovak Republic Abstract We study 3-dimensional layouts of the hypercube in a 1-active layer and general model. The problem can be understood as a graph drawing problem in 3D space and was addressed at Graph Drawing 2003 [5]. For both models we prove general lower bounds which relate volumes of layouts to a graph parameter cutwidth. Then we propose tight bounds on volumes of layouts of N-vertex hypercubes. Especially, we 2 3 3 have VOL (Q ) = N 2 log N + O(N 2 ); for even log N and VOL(Q ) = p 1¡AL log N 3 log N 3 2 6 2 4=3 9 N + O(N log N); for log N divisible by 3. The 1-active layer layout can be easily extended to a 2-active layer (bottom and top) layout which improves a result from [5]. 1 Introduction The research on three-dimensional circuit layouts started in seminal works [15, 17] as a response to advances in VLSI technology. Their model of a 3-dimensional circuit was a natural generalization of the 2-dimensional model [18]. Several basic results have been proved since then which show that the 3-dimensional layout may essentially reduce ma- terial, measured as volume [6, 12]. The problem may be also understood as a special 3-dimensional orthogonal drawing of graphs, see e.g., [9].
    [Show full text]
  • Algorithms for Generating Binary Reflected Gray Code Sequence: Time Efficient Approaches
    2009 International Conference on Future Computer and Communication Algorithms for Generating Binary Reflected Gray Code Sequence: Time Efficient Approaches Md. Mohsin Ali, Muhammad Nazrul Islam, and A. B. M. Foysal Dept. of Computer Science and Engineering Khulna University of Engineering & Technology Khulna – 9203, Bangladesh e-mail: [email protected], [email protected], and [email protected] Abstract—In this paper, we propose two algorithms for Coxeter groups [4], capanology (the study of bell-ringing) generating a complete n-bit binary reflected Gray code [5], continuous space-filling curves [6], classification of sequence. The first one is called Backtracking. It generates a Venn diagrams [7]. Today, Gray codes are widely used to complete n-bit binary reflected Gray code sequence by facilitate error correction in digital communications such as generating only a sub-tree instead of the complete tree. In this digital terrestrial television and some cable TV systems. approach, both the sequence and its reflection for n-bit is In this paper, we present the derivation and generated by concatenating a “0” and a “1” to the most implementation of two algorithms for generating the significant bit position of the n-1 bit result generated at each complete binary reflected Gray code sequence leaf node of the sub-tree. The second one is called MOptimal. It () ≤ ≤ n − is the modification of a Space and time optimal approach [8] G i ,0 i 2 1 , for a given number of bits n. We by considering the minimization of the total number of outer evaluate the performance of these algorithms and other and inner loop execution for this purpose.
    [Show full text]