Notes on Information Theory
 Published on
 ∘ 170 min read ∘ ––– views
Notes on Information Theory from various sources
Index
Lectures
1  Introduction to Coding Theory
 Shannon's seminal book “A Mathematical theory of communication” (1948) measured information content in the output of a random source in terms of its entropy
 In his book, he presented the Noiseless Coding Theorem: given $n$ independent and identically distributed random variables, each with entropy $H(x)$...
 $H(x)$ can be compressed into $n(H(x) + \epsilon)$ bits with negligible loss
 or alternatively compressed into $n(H(x)  \epsilon)$ bits entailing certain loss
 Given a noisy communication channel whose behavior is given by a stochastic channel law and considering a message of $k$ bits output by a source coder, the theorem states that every such channel has a precisely defined real numbered capacity that quantifies the maximum rate of reliable communication
 Given a noisy channel with a capacity $C$, if information is transmitted at rate $R$ (meaning $k=nR$ message bits are transmitted in $n$ uses of the channel), then if $R < C$, there exist coding schemes (encoding and decoding pairs) that guarantee negligible probability of miscommunication, whereas if $R > C$, then –regardless of a coding scheme– the probability of an error at the receiver is bounded below some constant (which increases with $R$)
 Conversely, when $R > C$, the probability of miscommunication goes exponentially to 1 in $k$
1  A Simple Code
Suppose we need to store 64bit words in such a way that they can be recovered even if a single bit per word gets flipped
 We could duplicate each bit at least three times, thus storing 21 bits of information per word, and limiting ourselves to roughly 1/3 of the information per word. But the tradeoff is that we could correct any single bit flip since the majority value of the three copies gives te correct value of the bit if one of them is flipped.
In 1949, Hamming proferred his code to correct 1bit errors using fewer redundant bits. Chunks of 4 information bits $x_1, x_2, x_3, x_4$ get mapped to (encoded) to a codeword of 7 bits as
which can be equivalently represented as a mapping from $x$ to $Gx$ (operations do $\mod 2$ ) where $x$ if the column vector $[1, 2]^T$ and $G$ is the matrix
 Two distinct 4bit vectors $x, y$ get mapped to the codewords $Gx, Gy$ which differ in the last 3 bits (define $w = x  y, w \neq 0$ and check that, for each nonzero $w$, $Gw$ has at least 3 bits which are $1$)
 This code can correct all single bit flips since, for any 7bit vector, there is at most 1 codeword which can be obtained by a single bit flip
 For any $y \in \{0, 1\}^7$ which is not a codeword, there is always a codeword which can be obtained by a single bit flip
Basic Definitions
Hamming Distance
The Hamming Distance between two strings $x,y$ of the same length over the alphabet $\Sigma$ is denoted $\Delta(x,y)$ and defined as the number of positions at which $x$ and $y$ differ:
The fractional or relative Hamming Distance between $x,y \in \Sigma^n$ is given by
 The distance of an error correcting code is the measurement of error resilience quantified in terms of how many errors need to be introduced to cofuse one codeword with another
 The minimum distance of a code $C$ denoted $\Delta(C)$ is the minimum Hamming distance between two distinct codewords of $C$:
 For every pair of distinct codewords in $C$, the Hamming Distance is at least $\Delta(C)$
 The relative distance of $C$ denoted $\delta(C)$ is the normalized quantity $\frac{\Delta(C)}{n}$ where $n$ is the block length of $C$. Thus, any two codewords of $C$ differ in at least a fraction of $\sigma(C)$ positions
 For example, the parity check code, which maps $k$ bits to $k+1$ bits by appending the parity of the message bits, is an example of a distance 2 code with rate $k/(k+1)$
Hamming Weight
The Hamming Weight is the number of nonzero symbols in a string $x$ over alphabet $\Sigma$
Hamming
A Hamming Ball is given by the radius $r$ around a string $x \in \Sigma^n$ given by the set
Code
An error correcting code $C$ of length $n$ over a finite alphabet $\Sigma$ is a subset of $\Sigma^n$.
 Elements of $C$ are codewords in $C$, and the collection of all the codewords is sometimes called a codebook.
 The alphabet of $C$ is $\Sigma$, and if $\Sigma = q$, we say that $C$ is $q$ary (binary, ternary, etc.)
 The length $n$ of codewords in $C$ is called the block length of $C$
 Associated with a code is also an encoding map $E$ which maps the message set $\mathcal M$, identified in some canonical way with $\{1, 2, ..., C \}$ to codewords in $\Sigma^n$
 The code is then the image of the encoding map
Rate
The rate of a code is defined by the amount of redundancy it introduces.
which is the amount of nonredundant information per bit in codewords of $C$.
 The dimension of $C$ is given by $\frac{\log C}{\log \Sigma^n}$
 A $q$ary code of dimension $\ell$ has $q^\ell$ codewords
Distance
 The distance of an error correcting code is the measurement of error resilience quantified in terms of how many errors need to be introduced to confuse one codeword with another
 The minimum distance of a code $C$ denoted $\Delta(C)$ is the minimum Hamming distance between two distinct codewords of $C$:
 For every pair of distinct codewords in $C$, the Hamming distance is at least $\Delta(C)$
 The relative distance of $C$ denoted $\delta(C)$ is the normalized quantity $\frac{\Delta(C)}{n}$ where $n$ is the block length of $C$. Thus, any two codewords of $C$ differ in at least a fraction of $\sigma(C)$ positions
 For example, the parity check code, which maps $k$ bits to $k+1$ bits by appending the parity of the message bits, is an example of a distance 2 code with rate $k/(k+1)$
Properties of Codes
 $C$ has a minimum distance of $2t + 1$
 $C$ can be used to correct all $t$ symbol errors
 $C$ can be used to detect all $2t$ symbol errors
 $C$ can be used to correct all $2t$ symbol erasures – that is, some symbols are erased and we can determine the locations of all erasures and fill them in using filled position and the redundancy code
An Aside about Galois Fields
 A finite or Galois Field is a finite set on which addition, subtraction, multiplicaiton, and division are defined and correspond to the same operations on rationals and reals
 A field is denoted as $\mathbb F_q$ or $\mathbf {GF}_q$ where $q$ is a the order or size of the field given by the number of elements within
 A finite field of order $q$ exists if and only if $q$ is a prime power $p^k$, where $p$ is prime and $k$ is a positive integer
 In a field of order $p^k$, adding $p$ copies of any element always results in zero, meaning tat the characteristic of the field is $p$
 All fields of order $q = p^k$ are isomorphic, so we can unambiguously refer to them as $\mathbb F_q$
 $\mathbb F_q$, then, is the field with the least number of elements and is said to be unique if the additive and multiplicative identities are denoted $0, 1$ respectively
 It should be pretty familiar for bitwise logic then as these identities correspond to modulo 2 arithmetic and the boolean XOR operation:
$\pm$  0  1 

0  0  1 
1  1  0 
XOR  AND  



 Other properties of binary fields
 Every element $x$ of $\mathbb F_2$ satisfies $x + x = 0; \;x = x$
 Every element $x$ of $\mathbb F_2$ satisfies $x^2 = 0$
3  Linear Codes
General codes may have no structures, but of particular interest to us are a subclass of codes with an additional structure, called Linear Codes defined over alphabets $\Sigma$ which are finite fields $\mathbb F_q$ where $q$ is a prime number in which case $\mathbb F_q = \{0, 1, ..., q1\}$ with addition and multiplication defined modulo $q$.
 Formally, if $\Sigma$ is a field and $C \subset \Sigma^n$ is a subspace of $\Sigma^n$ then $C$ is said to be a Linear code
 As $C$ is a subspace, there exists a basis $c_1, c_2, ..., c_k$ where $k$ is the dimension of the subspace. Any codeword can be expressed as the linear combination of these basis vectors. We can write these vectors in matrix form as the columns of an $n \times k$ matrix call a generator matrix
Generator Matrices and Encoding
 Let $C \subseteq \mathbb F_q^n$ be a linear code of dimension $k$. A matrix $G \in \mathbb F^{n \times k}_q$ is said to be a generator matrix for $C$ if its $k$ columns span $C$
 It provies a way to encode a message $x \in \mathbb F^k_q$ (a column vector) as the codeword which is a linear transformation from $x$ to $Gx$
 Note that a Linear Code admits many different generator matrices, corresponding to the different choices of bases for the code as a vector space
 A $q$ary code block of length $n$ and dimension $k$ will be referred to as an $[n, k]_q$ code
 If the code has distance $d$, it may be expressed as $[n, k, d]_q$ and when the alphabet size is obvious or irrelevant, the subscript may be ommitted
Aside about ParityBit Check Codes
A simple Paritybit Check code uses an additional bit denoting the even or odd parity of a messages Hamming Weight which is appended to the message to serve as a mechanism for error detection (but not correction since it provides no means of determing the position of error).
 Such methods are inadeqaute for multibit errors of matching parity e.g., 2 bit flips might still pass a parity check, despite a corrupted message
data  Hamming Weight  Code (even parity)  odd 

$0000000$  0  $0000000\color{red}{0}$  $\color{red}{1}$ 
$1010001$  3  $1010001\color{red}{1}$  $\color{red}{0}$ 
$1101001$  4  $1101001\color{red}{0}$  $\color{red}{1}$ 
$1111111$  7  $1111111\color{red}{1}$  $\color{red}{0}$ 
Application
 Suppose Alice wants to send a message $m=1001$
 She computes the parity of her message $p_{even}(m) = 1+ 0 + 0 + 0 + 1 (\mod 2) = 0$
 And appends it to her message: $m' = m  p(m) = 10010$
 And transmits it to Bob $A \xrightarrow{m'} B$
 Bob recieves $m'$ with questionable integrity and computes the parity for himself: $1+ 0 + 0 + 0 + 1 + 0(\mod 2) = 0$ and observes the expected evenparity result
 This same process works under and oddparity scheme as well
Examples of Codes
 $[n, n1, 2]_2$ corresponds to the binary parity check code consisting of all vectors in $\mathbb F^n_2$ of even Hamming Weight
 $[n, 1, n]_2$ is a binary repetition code consisting of the two vectors $0^n, 1^n$
 $[7,4,3]_2$ is the linear Hamming Code discussed above
 If $H$ is the parity check matrix of the Linear Code $C$, then $\Delta(C)$ is the minimum number of columns of $H$ that are Linearly Dependent
Hamming Codes Revisited
 Hamming Codes can be understood by the structure of its parity check matrix which allows us to generalize them to codes of larger lengths
 $C_\text{Ham}$ = $[7,4,3]_2$ is a Hamming Code using the Generator Matrix $G$, and a parity matrix $H$
and see that $HG = \mathbf 0$.
Correcting single errors with Hamming codes
 Suppose that $y$ is a corrupted version of some unknown codeword $c \in C$ with a single error (bit flip)
 We know that by the distance property of $C_\text{Ham}$, $c$ is uniquely determined by $y$. We could determine $c$ by flipping each bit of $y$ and check if the resulting vector is in the null space of $H$,
 Recall that the nullspace of a matrix $A$ is the set of all ndimensional column vectors $x$ such that $Ax = \mathbf 0$
 However, a more efficient correction can be performed. We know that $y = c + e_i$, where $e_i$ is the column vector of all zeros except for a single 1 in the $i$th position. Note that $Hy = H(c+ e_i) = Hc + He_i =$ the $i$th column of $H$ which is the binary representation of $i$, and thus this recovers the location $i$ of the error
 Syndrome: We say that $Hy$ is the syndrome of $y$
Generalized Haming Codes
We define $H_r$ to be the $r \times 2^r  1$ matrix where column $i$ of $H_r$ is the binary representation of $i$. This matrix must contain $e_1$ through $e_r$, which are binary representations of all powers of 2 from $1, 2^{r1}$ and thus has full row rank
 The $r$th generalized Hamming Code then is given by
and is the binary code with the parity check matrix $H_r$
 Note that $C^{(r)}_\text{Ham}$ is an $[2^r 1, 2^r  1  r, 3]_2$ code
 Proof:
 Since $H_r$ has rank $r, \text{dim}(C^{(r)}_\text{Ham})=r$, and we must simply check that no two columns of $Hr$ are linearly dependent, and that there are three linearly dependent columns in $H_r$
 The former follows since all the columns are distinct, and the latter since the first three columns of $H$ are the binary representations of 1,2,3 add up to 0.
If $C$ is a binary code of block length $n$, and has a minimum distance of 3, then
and it follows that the Hamming Code $C^{(r)}_\text{Ham}$ has the maximum possible number of code words (and thus, an optimal rate) amongst all binary codes of block length $2^r 1$ and a minimum distance of at least 3.
 Proof:
 For each $c \in C$, define its neighbordhood $N(c) = \{y \in \{0,1\}^n  \Delta(y,c) \leq 1 \}$ of all strings that differ in at most one bit from $c$.
 Since $C$ has distance 3, by the triangle inequality we have
yielding the desired upper bound on $C$ per this “Hamming Volume” upper bound on size of codes.
 Note that $C^{(r)}_\text{Ham}$ has a dimension of $2^r1r$ and therefore a size $2^{2^r 1}/2^r$ which meets the upper bound for block length $n = 2^r  1$
 The general definition of a Hamming or Volume Bound for binary codes $C$ of block length $n$, and distance $d$ is given by
for equality to hold in (2), Hamming Balls of radius $\lfloor \frac{d1}{2} \rfloor$ around the code words must cover each point in $\{0,1\}^n$ exactly once, giving a perfect packing of nonoverlapping Hamming spheres that cover the full space.
 Codes which meet the bound in (2) are therefore called perfect codes
Perfect Codes
There are few perfect binary codes:
 The Hamming Code $C^{(r)}_\text{Ham}$
 The Golay Code
 The trivial codes consistng of just 1 codeword, or the whole space, or the repetition code $\{0^n, 1^n\}$ for odd $n$
The Golay Code
Like other Hamming Codes, the Golay Code can be constructed in a number of ways. $\text{Gol}_{23}$ consists of $(c_0, c_1, ..., c_{22}) \in \{0,1\}^{23}$ when the polynomial $c(X) = c_0X^0 + c_1X^1 + ... +c_{22}X^{22}$ is divisible by
in the ring $\mathbb F[X]/(X^{23}1)$.
3.3 Dual of a Code
Since a Linear Code is a subspace of $\mathbb F_q^n$, we can define its dual in orthogonal space – a cocode, if you will
 Dual Code: If $C \subseteq \mathbb F_q^n$ is a linear code, then its dual $C^\perp$ is a linear code over over $\mathbb F_q$ given by
where $\langle z, c \rangle = \sum^n_{i=1} z_ic_i$ is the dot product over $\mathbb F_q$ of vectors $z,c$
 Unlike vector spaces over $\mathbb R$, where the dial (or orthogonal complement) vector $W^\perp$ of a subspace $w \subseteq \mathbb R^n$ satisfies $W \cap W^\perp = \{ \mathbf 0 \}$ and ($W + W^\perp + \mathbb R^n$), for subspaces of $\mathbb F^n_q$, $C$ and $C^\perp$ can intersect nontrivially
 In fact, we can devise $C^\perp \subseteq C$ (a selforthogonal code) or even just $C = C^\perp$, a selfdual
3.4 Dual of the Hamming Code
The Dual of the Hamming Code $C^{(r)}_\text{Ham}$ has a generator matrix $G_r = (H_r)^T$ which is a $(2^r1)\times r$ matrix whose rows are all nonzero bit vectors of length $r$. This yields a $[2^r1, r]_2$ code and is called a simplex code
The Hadamard Code, the Hamming Code's dual, is obtained by adding an allzeros row to $G_r$
$\text{Had}_r$ is a $[2^r, r]_2$ linear code whose $2^r \times r$ generator matrix has all $r$bit vecotrs as its rows.
 Its encoding map encodes $x \in \mathbb F_2^r$ by a string in $F_2^{2^r}$ consisting of the dot product $\langle x,a \rangle$ for every $a \in \mathbb F^k_q$
 The hadamard code can also be dinfed over $\mathbb F_q$, buby encoding a message in $\mathbb F_q^k$ with its dot product with ever other vector in that field
 The Hadamard Code is the most redundant linear code in which no two codeword symbols are equal in every codeword, implying a robust distance property:
 The Hadamard Code and simplex codes have a minimum distance of $2^{r1}$. The $q$ary Hadamard Code of dimension $r$ has a distance $(1\frac{1}{q})q^r$
 Proof: For $x\neq0, \langle z, a \rangle \neq 0$ for exactly $2^{r1}$ (i.e. half) of the elemtns of $a \in \mathbb F_2^r$.
 Assume for definiteness that $x_1=1$.
 Then, for every $a, \langle x, a \rangle + \langle x, a+e_1 \rangle = x_1 = 1$, and therefore exactly one of $\langle x, a \rangle$ and $\langle x, a + e_i\rangle$ equals 1. The proof for the $q$ary case$ is similar.
 Binary codes cannot have a relative distance $\delta(c)$ of more than $\frac{1}{2}$, unless they only have a fixed number of code words. This the relative distance of Hadamard Codes is optimal, but their rate is necessarily poor
Code Families and Asymptotically Good Codes
 The Hamming and Hadamard codes exhibit two extreme tradeoffs between rate and distance
 Hamming Code's rates appraochs 1 (optimal), but their distance is only 3
 Conversely, Hadamard Code's have an optimal relative distance of $\frac{1}{2}$, but their rate approaces 0
 The natural question that follows is is there a class of codes which have good rate and good relative distance such that neither approach 0 for large block lengths?
 To answer this question, we consider asymptotic behavior of code families:
 Define a code family $\mathcal C$ to be an infinite collection $\{ C_i  i \in N \}$, where $C_i$ is a $q_i$ary code of block length $n_i$, with $n_i > n_{i1}$ and $q_i > q_{i1}$
 Many constructions of codes will belong to an infinite family of codes that share general structure and properties whoe asymptotic behavior guides their construction
 We also need extend the notion of relative rate and distance to these inifinite families:
 A $q$ary family of codes is said to be asymptotically good if its rate and relative distance are bounded away from zero such that there exist constant $\mathcal{R_0> 0, \delta_0 >0 \; s.t. R(C) > R_0, \delta(C) > \delta_0}$
While a good deal is known about the existence or even explicit construction of good codes as well as their limitations, the best possible asymptotic tradeoff between rate and relative distance for binary codes remains a fundamental open question which has seen no improvement since the late 70s in part due to the the fundamental trade off between large rate and large relative distance
Error Correction Coding: Mathematical Methods and Algorithms  Todd Moon
1  A Context for Error Correction Coding
1.2  Where Are Codes
 Error Control Codes are comprised of error correction and error detection
Da heck is an ISBN
 For a valid ISBN, the sumofthesum of the digits must be equal to $0 \mod 11$
digit  cum. sum  cum. sum of sum 

0  0  0 
2  2  2 
0  2  4 
1  3  7 
3  6  13 
6  12  25 
1  13  38 
8  21  59 
6  27  86 
8  35  121 
The final sum is $121 = 0 \mod 11$
1.3  The Communication System
Information theory treats information as a pseudophysical quantity which can be measured, transformed, stored, and moved from place to place. A fundemental concept of information theory is that information is conveyed by the resolution of uncertainty.
Probabilities are used to described uncertainty. For a discrete random variable $X \in \{0, 1\}$, the information conveyed by observing an outcome $x$ is $\log_2 P(X=x)$ bits.
 If $P(X=1)=1$, outcome of 1 is certain, then observing $X=1$ yields $ \log_2(1) = 0$ bits of information.
 Conversely, observing $X=0$ in this case yields $ \log_2(0) = \infty$; a total surprise at observing an impossible outcome
Entropy is the average information. For our above example with a discrete, binary, random variable $X$, we have either $H_2(X)$ (entropy of the source) or $H_2(p)$ (a function of the outcome probabilities) given by
 For a source $X$ having $N$ outcomes $x_1, x_2, ..., x_N$ with probabilities $P(X=x_i) = p_i, i = 1, 2, ..., N$, the entropy is
SourceChannel Separation Theorem: Treating the problems of data compression and error correction separately, rather than seeking a jointly optimal source/channel coding solution, is asymptotically optimal in block sizes
Because of redundancy introduced by the channel coder, there must be more symbols at the output of the coder than at the input. A channel coder operates by accepting a block of $k$ input symbols and outputting a block of $n > k$ symbols.
The Rate of a channel coder is $R = k/n < 1$
Channel Coding Theorem: Provided that the rate $R$ of transmission is less than the channel capacity $C$, there exists a code such that the probability of error can be made arbitrarily small
1.4  Binary PhaseShift Keying
 Process of mapping a binary sequence to a waveform for transmission over a channel
 Given a binary sequence $\{..., b_{2}, b_{1}, b_{0}, b_{1}, b_{2}, ... \}$, we map the set $\{0, 1\} \rarr \{1, 1\}$ via
 We also have $a_i = \sqrt{E_b}(2b_i 1) = \sqrt{E_b}(1)^{b_i} = \sqrt{E_b}\tilde{b}_i$, a mapping of a bit $b_i$ or ($\tilde{b}_i$) to a signal amplitude which multiplies a waveform $\varphi_1(t)$ which is a unitenergy signal
over $[0, T)$. A bit $b_i$ arriving at $iT$ can be represented as the signal $a_i\varphi_1(t  iT)$ where the energy required to transmit the bit $b_i$ is given by
 The transmitted signal $\pm \sqrt{E_b}\varphi_1(t)$ are points $\pm \sqrt{E_b}$ in a (for our purposes: one) dimensional signal space on the unitenergy $\varphi_1$ axis
such that a sequence of bits $[1,1,0,1,0]$ can be expressed as a waveform:
We can expand this representation to two dimensions by introducing another signal $\varphi_2(t)$ and modulating the two to establish a signal constellation. Let $M = 2^m$, for some inteeger $m$, be the number of points in a constellation. $M$ary transmission is obtained by placing $M$ points $\mathcal{S} = \{(a_{1k}, a_{2k}), k = 0, 1, ..., M1 \}$ in this signal space and assigning each point a unique pattern of $m$ bits.
 Note that the assignment of the bits to constellation points is such that adjacent points differ by only 1 bit. Such an assignment is called Gray code order. Since it is most probably that errors will move from a point to an adjacent point, this reduces the probability of bit error
Associated with each signal (stream of $k$ bits) $s_k(t) = a_{1k}\varphi_1(t) + a_{2k}\varphi_2(t)$ and signal constellation point $(a_{1k},a_{2k}) \in \mathcal S$ is a signal energy
The average signal energy $E_s$ is the average of all signal energies, assuming that each point is used with equal probability
and ca be related to the average energy per bit
2  Groups and Vector Space
2.1  Introduction
Linear block codes form a group and a vector space, which is useful
2.2  Groups
A Group formalizes some basic rules of arithmetic necessary for cancellation and solution of simple equations
A binary operation $*$ on a set is a rule that assigns to each ordered pair of elements of a set $a,b$ some element of the set
Since the operation is deinfed to return an element of the set, this operation is closed
We can further assume that all binary operations are closed
Examples include: $\min(a, b), \; fst(a,b), \; a + b$
A Group $\langle G, * \rangle$ is a set $G$ with a binary operation $*$ on $G$ such that
 The operator is associative: for any $a, b, c \in G\; (a * b) * c = a * (b * c)$
 For all $a\in G$ there exists $b \in G$ which is the inverse of $a$ such that $a * b = e$, where $e$ is called the identity of the group. The inverse can be denoted $a^{1}, a$ for multiplicationlike and additionlike operations, respectively
When $*$ is obvious from context, the group may be referred to as just the set $G$.
If $G$ has a finite number of elements, it is said to be a finite group with order $G$, the number of elements.
A group $G$ is commutative if $a * b = b * a; \; \forall a, b \in G$.
$\langle \Z, + \rangle$, the integers under addition, forms a group with the identity $0$ since $a + 0 = 0 + a; \; \forall a \in \Z$
 The invert of $a \in \Z = a$. Thus the group is commutative.
 Groups with an additionlike operator are called Abelian
$\langle \Z, \cdot \rangle$, the integers under multiplication, does not form a group since there does not exist a multiplicative inverse for every element of the integers.
$\langle \mathbb Q \backslash \{0\}, \cdot \rangle$, the rationals without zero under multiplication with the identity of $1$ and the inverse $a^{1} = \frac{1}{a}$ forms a group
These rules are strong enough to introduce the notion of cancellation. In a group $G$, if $a * b = a * c$, then $b = c$ by left cancellation via
and similarly for right hand cancellation via properties of associativity and identity.
We can also identify that solution to linear equations of the form $a *x = b$ are unique.
 Immediately, we get $a = a^{1} b$. If $x_1, x_2$ are the two solutions such that
then by cancellation, we get $x_1 = x_2$.
For example, let $\langle \Z_5, + \rangle$ be addition $\mod 5$ on the set $\{0, 1, 2, 3, 4, 5 \}$ with the identity $0$.
$+$  $\mathbf 0$  $\mathbf 1$  $\mathbf 2$  $\mathbf 3$  $\mathbf 4$ 

$\mathbf 0$  $0$  $1$  $2$  $3$  $4$ 
$\mathbf 1$  $1$  $2$  $3$  $4$  $0$ 
$\mathbf 2$  $2$  $3$  $4$  $0$  $1$ 
$\mathbf 3$  $3$  $4$  $0$  $1$  $2$ 
$\mathbf 4$  $4$  $0$  $1$  $2$  $3$ 
 Since $0$ appears in each row and column, every element has an inverse.
 By uniqueness of solution, we must have every element appearing in every row and column, which we do. So $\langle \Z_5, + \rangle$ is a Abelian group.
One way to form groups is via the Cartesian production. Given groups $\langle G_1, * \rangle, \langle G_2, * \rangle, \langle G_3, * \rangle, .. \langle G_r, * \rangle$, the direct product group $G_1 \times G_2 \times ... \times G_r$ has elements $(a_1, a_2, ..., a_r)$ where $a_i \in G_i$. The operation is performed elementwise such that if
and
then
Example
The group $\langle \Z_2 \times Z_2, + \rangle$ consists of the tuplies and addition $\mod 2$.
$+$  $(\mathbf {0, 0})$  $(\mathbf {0, 1})$  $(\mathbf {1, 0})$  $(\mathbf {1, 1})$ 

$(\mathbf {0, 0})$  $(0, 0)$  $(0, 1)$  $(1, 0)$  $(1, 1)$ 
$(\mathbf {0, 1})$  $(0, 1)$  $(0, 0)$  $(1, 1)$  $(1, 0)$ 
$(\mathbf {1, 0})$  $(1, 0)$  $(1, 1)$  $(0, 0)$  $(0, 1)$ 
$(\mathbf {1, 1})$  $(1, 1)$  $(1, 0)$  $(0, 1)$  $(0, 0)$ 
This is called the Klein 4group, and intorduces the concept of permutations as elements of a group, and is a composable function as our operation as opposed to simple arithmetic groups.
Example
A permutation of set $A$ is a bijection (one to one, and onto) of $A$ onto itself. Let
then a permutation
meaning
There are $n!$ different permutations on $n$ distinct elements. We can think of $p_1$ as a prefix operation: $p_1 \circ 1 = 3$ or $p_1 \circ 4 = 1$. If
then
is the construction of permutations which is closed under the set of permutations with the identity $e$ and the inverse
Composition of permutations is associative: for
and thus the set of all $n!$ permutations on $n$ elements forms a group under composition.
 This is known as a symmetric group on $n$ letters $S_n$.
 Note that composition is not commutative since $p_1 \circ p_2 \neq p_2 \circ p_1$, so $S_4$ is a noncommutative group
2.2.1 Subgroups
A subgroup $\langle H, * \rangle$ of $G$ is a group formed from a subset of elements of $G$ where $H < G$ indicates the relation between the two sets where $H \subset G$ is said to be a proper subgroup.
The subgroups $H \backslash \{e\} \subset G$ and $H = G$ are the trivial subgroups.
Example
Let $G = \langle \Z_6, + \rangle, H = \langle \{ 0, 2, 4\}, +\rangle$, both $\mod 6$. We can show that $H \subset G$ is a group: $K = \langle \{0, 3\}, + \rangle$.
Similarly, $\langle \Z, + \rangle < \langle \mathbb Q, + \rangle < \langle \mathbb R, + \rangle < \langle \mathbb C, + \rangle$
Example
Consider the group of permutations on $S_4$, which has a subgroup formed by the closed compositions:
2.2.2 Cyrclic Groups and the Order of an Element
In a group $G$ with a multiplicationlike operation, we use $a^n$ to indicate
with $a^0=e$ being the identity element for $G$.
For a group with additive operations $na$ is used to indicate
If $a \in G$, any subgroup containing $a$ must also include $a^2, a^3$, etc.
It must also adhere to $e = aa^{1}, a^{n} = (a^{1})^n$.
For any $a \in G$, the set $\{a^n  n \in \Z\}$ generates a subgroup of $G$ called the cyclic subgroup. $a$ is said to be the generator of the subgroup and the resultant group is denote $\langle a \rangle$.
If every element of a group can be gneerated from a single element, the group is said to be cyclic.
Example
$\langle \Z_5, + \rangle$ is cyclice since every element can be generated by $a = 2$.
In a group $G$ with $a \in G$, the smallest $n$ such that $a^n$ is equal to the identity in $G$ is said to be the order of the element $a$.
 If no such $n$ exists, $a$ is of infinite order.
 In $\Z_5$, 2 is of order $5$, as are all nonzero elements of the set.
Example
If $G = \langle \Z_6, + \rangle$, then
Therefore $a \in \Z_6$ is a generator for the group if and only if $a$ and $6$ are relatively prime
[IMAGE Of the planes]
2.3  Cosets
The left coset of $H, H < G$ ($G$ not necessarily being commutative), $a * H$ is the set
and the right coset $H * a$ is given by the symmetric relation. In a commutative group, they are obviously equal.
Let $G$ be a group, $H$ a subgroup of $G$, and the left coset $a * H \in G$. Then, $b \in a *H$ if and only f $b = a * h, h \in H$. By cancellation, we have $a^{1}*b \in H$.
To determine if $a,b$ are in the same (left) coset, we simply check the above condition.
Exmaple
Let $G = \langle \Z, + \rangle$ and $S_0 = 3 \Z = \{ ..., 6, 3, 0, 3, 6, ...\}$ such that $S_0 < G$. Now, form the cosets:
and observe that neither $S_1, S_2$ are subgroups as they do not have an identity, but the union of all three cover the original group: $G = S_0 \cup S_1 \cup S_2$.
We can determine whether or not two numbers $a =4, b =6$ are in the same coset of $S_0$ by checking whether
2.2.4  Lagrange's Theorem
Basically, it's a prescription of subgroup size relative to its group.
 Every coset of $H$ in a group $G$ has the same number of elements
 Let $(a * h_1), (a * h_2 )\in a * H$ be two elements ub tge ciset $a * H$. If they are equal, then we have $h_1 = h_2$, and thereform the elements of a coset are uniquely identified by elements in $H$
It follows, then, that we have the following properties of cosets:
 reflecivity: An element $a$ is in the same coset of itself
 symmetry: If $a,b$ are in the same coset, then $b,a$ are in the same coset
 transitivity: If $a,b$ are in the same coset, and $b,c$ are in the same coset, then $a, c$ are in the same coset as well
Therefore, the relation of "being in the same coset" is an equivalence relation, and thus, every equivalence relation partitions its elements into disjoint sets.
 It follows then that the distinct coets of $H$ in a group $G$ are disjoint
With these properties and lemmas, Lagrange's Theorem states that: If $G$ is a group of finite order, and $H$ a subgroup of $G$, then the order of $H$ divides the order of $G$ such that $G \mod H = 0$. We say $a  b$ "$a$ divides $b$" without remainder
 If $G < \infty$ and $H < G$, then $H \big G$
Lagrange's Theorem implies that every group of prime order is cyclic.
 Let $G$ be of prime order, with $a \in G$ and $e = \mathbf {id}_G$. Let $H = \langle a \rangle$, the cyclic subgroup generated by $a$. Then $a,e \in H$. But by Lagrange's Theorem, the order of $H$ must ("cleanly") divide the order of $G$. Since $G$ is prime, we must have $H = G$, thus $a$ generates $G$, so $G$ must be cyclic.
2.2.5  Induced Operations; Isomorphism
Returning to the three sentence cosets we defined earlier, we have $S = \{S_0, S_1, S_2 \}$ and define addition on $S$ as follows: for
if and only if $a + b = c; \; \forall a, b, c \in A, B, C$. That is, addition of the sets is defined by representatives in the sets. The operation is said to be the induced operations on the coset: $S_1 + S_2 = S_0$.
Taking $1 \in S_1, 2 \in S_2$ and noting that $1 + 2 = 3 \in S_0$. Similarly, $S_1 + S_1 = S_2$ via $1 + 1 = 2$, taking the representatives to be $1 \in S_1$. Based on this induced operation, we can obtain the following table
$+$  $S_0$  $S_1$  $S_2$ 

$S_0$  $S_0$  $S_1$  $S_2$ 
$S_1$  $S_1$  $S_2$  $S_0$ 
$S_2$  $S_2$  $S_0$  $S_1$ 
which we say is $\cong$ to the table for $\langle \Z_3, + \rangle$:
$+$  $0$  $1$  $2$ 

$0$  $0$  $1$  $2$ 
$1$  $1$  $2$  $0$ 
$2$  $2$  $0$  $1$ 
Two groups $\langle G, * \rangle, \langle \mathcal G, \diamond \rangle$ are said to be (group) isomorphic if there exists a onetoone, onto function $\phi: G \rarr \mathcal G$ called the isomorphism such that
We denote isomorphism via $G \cong \mathcal G$. Isomorphic groups are essentially "the same thing"
Let $\langle G, * \rangle$ be a group, $H$ a subgroup, and $S = \{ H_0 = H, H_1, H_2, ..., H_m\}$ the set of cosets in $G$. The induced operation between cosets $A,B \in S$ is defined by $A * B = C$ if and only if $a * b = c$ for any $a, b, c \in A,B,C$ provided that the operation is welldefined (no ambiguity for those operands).
For any commutative group, the induced operation is always welldefined, otherwise only for normal groups
 A subgroup $H$ of $G$ is normal if $g^{1}Hg = H \; \forall g \in G$. All Abelian groups are normal.
If $H$ is a subgroup of a commutative group $\langle, G, * \rangle$ the induced operation $*$ on the set of cosets of $H$ satisfies
The group formed by the cosets of $H$ in a commutative (or normal subgroup) group $G$ with the induced operation is said to be the factor group of $G \mod H$, denoted $G / H$ and the cosets are called the residue classes of $G \mod H$
 We could express $\Z_3 \cong \Z_6/H_0, \; Z/3\Z \cong Z_3$ and in general $\Z / n\Z \cong \Z_n$.
A Lattice is formed by taking all the possible linear combination of a set of basis vectors. That is $[\mathbf{v_1}, \mathbf{v_1}, ..., \mathbf{v_1}]$ are a set of linearly independent vectors. A lattive is then formed from the basis by
e.g. the lattice formed by $V = \begin{bmatrix} 1 & 0 \\ 0 & 1 \end{bmatrix}$ is the set of points with the integer coorinates in the plane denoted $\Z^2$.
For the lattice $\varLambda = \Z^2$, let $\varLambda' = 2\Z^2$ be a subgroup with the cosets
and $\varLambda / \varLambda' \cong \Z_2 \times \Z_2$
2.2.6  Homomorphism
A homomorphism is a weaker condition than the structural and relational equivalence defined by an isomorphism. A homorphism exists when sets have when sets have the same algebraic structure, but they might have a different number of elements.
The groups $\langle G, * \rangle, \langle \mathcal G, \diamond \rangle$ are said to be homomorphic if there exists a function. (not necessarily one to one) $\phi: G \rarr \mathcal G$ called the homomorphism such that:
Example
Let $G = \langle \Z, + \rangle, \mathcal G = \langle \Z_n, + \rangle$, and $\phi(a) = a \mod n$. For $a, b \in \Z$, we have
This $\Z, \Z_n$ are homomorphic though they clearly have different orders.
Let $\langle G, * \rangle$ be a commutative group, $H$ a subgroup, so that $G / H$ is the factor group. Let $\phi: G \rarr G/H$ be defined by $\phi(a) = a * H$, then $\phi$ is a homomorph known as the natural or canonical homomorphism.
The kernel of a homomorphism $\phi$ of a group $G$ into a group $\mathcal G$ is the set of all elements of $G$ which mapped to $\mathbf{id}_\mathcal{G}$ by $\phi$.
2.3  Fields
A Field $\langle \mathbb F, + , \cdot \rangle$ is a set of of objects $\mathbb F$ on which addition, multiplication, and their inverse operations apply arithmetically (analagously to their behavior on the reals). The operations of a field must satisfy the following conditions:
 Closure under addition: $\forall a, b, \in \mathbb F, \; a + b \in \mathbb F$
 There is an additive identity: $\forall a \in \mathbb F, \; \exist e \in \mathbb F \; \text{s.t.} \; a + e = a + e = a$