What Happens When Projective Geometry Meets Information Theory? (I)
Published on August 14, 2022 by Hemanth
--
To understand what happens when projective geometry meets information theory, we will start with a specific requirement. Imagine that you are in charge of a research mission on mars. You have managed to launch and land your space vehicle successfully on the red planet.
Following this, your drone sets about its mission flying toward Mount Olympus, the tallest mountain on Mars. However, you almost immediately notice something wrong with its trajectory. If it stays on course, it would collide with a rock and damage itself.
Mars Drone â Illustrative art created by the author
To avoid this situation, you need to act fast and send a corrective instruction signal to your Drone on Mars from your mission control on Earth. The challenge is that when you transmit signals over such distances through space, signal noise might corrupt the signal and cause errors.
So, your challenge is to make sure that your Mars drone gets the correct instruction signal at any cost. How would you go about solving this challenge?
A picture of Claude Shannon â Image credit: WikiCC
Most of the signal noise for your transmission would be caused by cosmic radiation. You could come up with equipment that essentially physically filters out such radiation. This was how this problem was being solved initially.
That was until the point when a young 21-year-old masterâs degree student named Claude Elwood Shannon published his master thesis titled âA Symbolic Analysis of Relay and Switching Circuits.â Shannon then sealed the deal with his 1948 paper, âA Mathematical Theory of Communication.â
This man single-handedly started a new field of science that we called âInformation Theoryâ today. We will go into more details about his work a bit later. For now, let us return to the problem at hand.
Error Detecting Codes
A signal is essentially just âinformationâ that could be transmitted as binary zeroes and ones. Let us say that the following is the corrective signal that you wish to transmit:
10101
If cosmic radiation flips one of your bits (a term that Shannon published first after borrowing it from his colleague, John W. Tukey), it could end up like this:
11101
It might be just one âbitâ for you and me, but it might mean âcrash and burnâ for your Mars drone. In order to avoid this, what if we repeated the original bits in blocks of two? Well, the following is the result:
10101 â 11 00 11 00 11
In this version of the signal, the drone would expect two identical bits in each block of code. As soon as a cosmic ray flips one bit, the code might look as follows:
11 01 11 00 11
The drone would not know what information was essentially transmitted in the second block. But it would know that something has gone wrong. All of a sudden, we have gone from transmitting just âinformationâ to transmitting âerror detectingâ information.
This is a simple, yet profound transformation. Such is the genius of Claude Shannon. But he did not stop there; he went further into the rabbit hole.
The Magic of Error Correcting Code
To go one step further, Shannon asked the following question:
âWhat happens if we pack in three identical bits of information into each block?â
Then, the intended transmission signal would look like this:
111 000 111 000 111
If a cosmic ray flips one of the bits, the corrupted signal might be as follows:
111 010 111 000 111
Now, when the drone detects two zeroes and just one âoneâ in the second block, the drone knows that the probability of it having been three identical zeroes is very high (because of the low cosmic ray frequency).
This is, of course, not fail-proof. But it is a good start in the direction of error-correcting code. But before we celebrate, did you notice that our information is taking up three times the space as it ideally should?
This was another one of Shannonâs genius discoveries: the more robust or error-resistant you want your signal to be, the slower your transmission gets (because of the redundancies introduced).
Shannon mathematically worked out the limit, which he termed the capacity of any given channel. In his research, he even made the profound discovery that one need not even try for a self-correcting signal.
It turns out that even unstructured ârandomâ code exhibits self-correcting properties. So does that mean that we could turn to randomness for a solution? Well, not quite. Shannonâs colleague, Richard Hamming had other plans.
The Hamming Code
Both Claude Shannon and Richard Hamming worked at Bell Labs back in the day (this was THE tech heavyweight of the time). Hamming was a brilliant mathematician. For his research work, Hamming had acquired âweekend-onlyâ low-priority access to Bellâs Model V mechanical relay computer.
The challenge he faced was that during weekends, there was no computer operator doing shifts. Consequently, he had to wait until Monday if any mechanical errors halted the computation. And this bothered Hamming.
He came up with a brilliant solution to scratch his own itch. He developed what we know today as the Hamming code. He essentially encoded each possible three-bit combination as a seven-bit string. This was his code combination:
000 â 0000000
001 â 0010111
010 â 0101011
011 â 0111100
101 â 1011010
110 â 1100110
100 â 1001101
111 â 1110001
So, you would transform your corrective transmission signal using the Hamming code as follows:
10101 â 010 101 â 0101011 1011010
The Hamming code might look arbitrary, but it has the same error correcting property as our ârepeat each bit thriceâ strategy. Furthermore, the Hamming codeâs redundancy-to-information ratio is 2.33 as compared to the 3 from our previous strategy.
What Happens When Projective Geometry Meets Information Theory
In order to understand how the Hamming code achieves this, we shall discuss a very specific projective geometry known as the Fano Plane.
The Fano Plane
Gino Fano was a nineteenth/twentieth century mathematician who was one of the pioneers of the notion of finite geometries. He came up with the notion of a small geometry known as the Fano plane. It looks like so:
The Fano Plane â Illustration created by the author
What is so special about this, you ask? Well, this geometry features seven points and seven lines. If you are a typical person, this would be your response to this:
âHold on a second! Where is the seventh line? I see only six.â
Well, the Fano plane features six lines that look like the typical Euclidean line. The seventh line just happens to be curved. In my essay on How To Actually Make Parallel Lines Intersect, I listed the governing axioms for projective geometry as follows:
1. Every pair of points creates a unique line.
2. Every pair of lines intersects exactly at one point.
The Fano plane does not violate any of these axioms. Hence, as per Fanoâs logic, the curved line is indistinguishable from the straight line. I love how Jordon Ellenberg describes this logic:
âIf it walks like geometry, and it quacks like geometry, we call it geometry.â
â Jordon Ellenberg.
Projective Geometry Meets Information Theory
All of this is great. But what does the Fano plane have to do with the Hamming code or your Mars drone? Well, it turns out that they are conceptually the same thing.
In order to understand how this is, I am afraid that you will have to wait until I publish the second part of this essay series. The concept that bridges the Fano plane with the Hamming code is so nuanced that it deserves more space than we have in this essay.
Projective Geometry Meets Information Theory – Closing Comments
Before we close, I thought I would go over some interesting applications of error correcting codes. The Hamming code started a revolution of increasingly advanced error correcting technology.
If you have ever used a Compact Disc (CD), the reason that (most) CDs would still play fine after enduring a physical scratch or two was due to an error correcting algorithm known as the Reed-Solomon code.
For those among you who belong to newer generations, your typical flash drive uses the so-called Bose-Chaudhuri-Hockenghem code to battle data corruption. The applications for such technologies range from Mars rovers to banking.
Speaking of mars rovers, whatever is going to happen to your mars drone? As it is heading at rapid pace towards the rock, can you come up with an error-proof transmission on time and save the Martian day?
I apologise to end this essay on such a cliff-hanger, but we will find out in the second instalment of this essay series. Until then, I hope you enjoyed our journey so far!
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking âAcceptâ, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-advertisement
1 year
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent
1 year
Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Cookie
Duration
Description
_gat
1 minute
This cookie is installed by Google Universal Analytics to restrain request rate and thus limit the collection of data on high traffic sites.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie
Duration
Description
__gads
1 year 24 days
The __gads cookie, set by Google, is stored under DoubleClick domain and tracks the number of times users see an advert, measures the success of the campaign and calculates its revenue. This cookie can only be read from the domain they are set on and will not track any data while browsing through other sites.
_ga
2 years
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_ga_R5WSNS3HKS
2 years
This cookie is installed by Google Analytics.
_gat_gtag_UA_131795354_1
1 minute
Set by Google to distinguish users.
_gid
1 day
Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
CONSENT
2 years
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Cookie
Duration
Description
IDE
1 year 24 days
Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile.
test_cookie
15 minutes
The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE
5 months 27 days
A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSC
session
YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devices
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-id
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
Comments