Show
In mathematics, a permutation of a set is, loosely speaking, an arrangement of its members into a sequence or linear order, or if the set is already ordered, a rearrangement of its elements. The word "permutation" also refers to the act or process of changing the linear order of an ordered set.[1] Permutations differ from combinations, which are selections of some members of a set regardless of order. For example, written as tuples, there are six permutations of the set {1, 2, 3}, namely (1, 2, 3), (1, 3, 2), (2, 1, 3), (2, 3, 1), (3, 1, 2), and (3, 2, 1). These are all the possible orderings of this three-element set. Anagrams of words whose letters are different are also permutations: the letters are already ordered in the original word, and the anagram is a reordering of the letters. The study of permutations of finite sets is an important topic in the fields of combinatorics and group theory. Permutations are used in almost every branch of mathematics, and in many other fields of science. In computer science, they are used for analyzing sorting algorithms; in quantum physics, for describing states of particles; and in biology, for describing RNA sequences. The number of permutations of n distinct objects is n factorial, usually written as n!, which means the product of all positive integers less than or equal to n. Technically, a permutation of a set S is defined as a bijection from S to itself.[2][3] That is, it is a function from S to S for which every element occurs exactly once as an image value. This is related to the rearrangement of the elements of S in which each element s is replaced by the corresponding f(s). For example, the permutation (3, 1, 2) mentioned above is described by the function
α
{\displaystyle \alpha }
The collection of all permutations of a set form a group called the symmetric group of the set. The group operation is the composition (performing two given rearrangements in succession), which results in another rearrangement. As properties of permutations do not depend on the nature of the set elements, it is often the permutations of the set
{
1
,
2
,
…
,
n
}
{\displaystyle \{1,2,\ldots ,n\}}
In elementary combinatorics, the k-permutations, or partial permutations, are the ordered arrangements of k distinct elements selected from a set. When k is equal to the size of the set, these are the permutations of the set. HistoryPermutations called hexagrams were used in China in the I Ching (Pinyin: Yi Jing) as early as 1000 BC. Al-Khalil (717–786), an Arab mathematician and cryptographer, wrote the Book of Cryptographic Messages. It contains the first use of permutations and combinations, to list all possible Arabic words with and without vowels.[4] The rule to determine the number of permutations of n objects was known in Indian culture around 1150 AD. The Lilavati by the Indian mathematician Bhaskara II contains a passage that translates to:
In 1677, Fabian Stedman described factorials when explaining the number of permutations of bells in change ringing. Starting from two bells: "first, two must be admitted to be varied in two ways", which he illustrates by showing 1 2 and 2 1.[6] He then explains that with three bells there are "three times two figures to be produced out of three" which again is illustrated. His explanation involves "cast away 3, and 1.2 will remain; cast away 2, and 1.3 will remain; cast away 1, and 2.3 will remain".[7] He then moves on to four bells and repeats the casting away argument showing that there will be four different sets of three. Effectively, this is a recursive process. He continues with five bells using the "casting away" method and tabulates the resulting 120 combinations.[8] At this point he gives up and remarks:
Stedman widens the consideration of permutations; he goes on to consider the number of permutations of the letters of the alphabet and of horses from a stable of 20.[10] A first case in which seemingly unrelated mathematical questions were studied with the help of permutations occurred around 1770, when Joseph Louis Lagrange, in the study of polynomial equations, observed that properties of the permutations of the roots of an equation are related to the possibilities to solve it. This line of work ultimately resulted, through the work of Évariste Galois, in Galois theory, which gives a complete description of what is possible and impossible with respect to solving polynomial equations (in one unknown) by radicals. In modern mathematics, there are many similar situations in which understanding a problem requires studying certain permutations related to it. Permutations without repetitionsThe simplest example of permutations is permutations without repetitions where we consider the number of possible ways of arranging n items into n places. The factorial has special application in defining the number of permutations in a set which does not include repetitions. The number n!, read "n factorial", is precisely the number of ways we can rearrange n things into a new order. For example, if we have three fruits: an orange, apple and pear, we can eat them in the order mentioned, or we can change them (for example, an apple, a pear then an orange). The exact number of permutations is then
3
!
=
1
⋅
2
⋅
3
=
6
{\displaystyle 3!=1\cdot 2\cdot 3=6}
In a similar manner, the number of arrangements of k items from n objects is sometimes called a partial permutation or a k-permutation. It can be written as
n
P
k
{\displaystyle nPk}
DefinitionIn mathematics texts it is customary to denote permutations using lowercase Greek letters. Commonly, either
α
{\displaystyle \alpha }
and
β
{\displaystyle \beta }
Permutations can be defined as bijections from a set S onto itself. All permutations of a set with n elements form a symmetric group, denoted
S
n
{\displaystyle S_{n}}
In general, composition of two permutations is not commutative, that is,
π
σ
≠
σ
π
.
{\displaystyle \pi \sigma \neq \sigma \pi .}
As a bijection from a set to itself, a permutation is a function that performs a rearrangement of a set, and is not an arrangement itself. An older and more elementary viewpoint is that permutations are the arrangements themselves. To distinguish between these two, the identifiers active and passive are sometimes prefixed to the term permutation, whereas in older terminology substitutions and permutations are used.[14] A permutation can be decomposed into one or more disjoint cycles, that is, the orbits, which are found by repeatedly tracing the application of the permutation on some elements. For example, the permutation
σ
{\displaystyle \sigma }
defined by
σ
(
7
)
=
7
{\displaystyle \sigma (7)=7}
An element in a 1-cycle
(
x
)
{\displaystyle (\,x\,)}
NotationsSince writing permutations elementwise, that is, as piecewise functions, is cumbersome, several notations have been invented to represent them more compactly. Cycle notation is a popular choice for many mathematicians due to its compactness and the fact that it makes a permutation's structure transparent. It is the notation used in this article unless otherwise specified, but other notations are still widely used, especially in application areas. Two-line notationIn Cauchy's two-line notation,[15] one lists the elements of S in the first row, and for each one its image below it in the second row. For instance, a particular permutation of the set S = {1, 2, 3, 4, 5} can be written as σ = ( 1 2 3 4 5 2 5 4 3 1 ) ; {\displaystyle \sigma ={\begin{pmatrix}1&2&3&4&5\\2&5&4&3&1\end{pmatrix}};}this means that σ satisfies σ(1) = 2, σ(2) = 5, σ(3) = 4, σ(4) = 3, and σ(5) = 1. The elements of S may appear in any order in the first row. This permutation could also be written as: σ = ( 3 2 5 1 4 4 5 1 2 3 ) , {\displaystyle \sigma ={\begin{pmatrix}3&2&5&1&4\\4&5&1&2&3\end{pmatrix}},}or σ = ( 5 1 4 3 2 1 2 3 4 5 ) . {\displaystyle \sigma ={\begin{pmatrix}5&1&4&3&2\\1&2&3&4&5\end{pmatrix}}.}One-line notationIf there is a "natural" order for the elements of S,[a] say
x
1
,
x
2
,
…
,
x
n
{\displaystyle x_{1},x_{2},\ldots ,x_{n}}
Under this assumption, one may omit the first row and write the permutation in one-line notation as ( σ ( x 1 ) σ ( x 2 ) σ ( x 3 ) ⋯ σ ( x n ) ) {\displaystyle (\sigma (x_{1})\;\sigma (x_{2})\;\sigma (x_{3})\;\cdots \;\sigma (x_{n}))}that is, as an ordered arrangement of the elements of S.[16][17] Care must be taken to distinguish one-line notation from the cycle notation described below. In mathematics literature, a common usage is to omit parentheses for one-line notation, while using them for cycle notation. The one-line notation is also called the word representation of a permutation.[18] The example above would then be 2 5 4 3 1 since the natural order 1 2 3 4 5 would be assumed for the first row. (It is typical to use commas to separate these entries only if some have two or more digits.) This form is more compact, and is common in elementary combinatorics and computer science. It is especially useful in applications where the elements of S or the permutations are to be compared as larger or smaller. Cycle notationCycle notation describes the effect of repeatedly applying the permutation on the elements of the set. It expresses the permutation as a product of cycles; since distinct cycles are disjoint, this is referred to as "decomposition into disjoint cycles". To write down the permutation σ {\displaystyle \sigma } in cycle notation, one proceeds as follows:
So the permutation 2 5 4 3 1 (in one-line notation) could be written as (125)(34) in cycle notation. While permutations in general do not commute, disjoint cycles do; for example, ( 1 2 5 ) ( 3 4 ) = ( 3 4 ) ( 1 2 5 ) . {\displaystyle (\,1\,2\,5\,)(\,3\,4\,)=(\,3\,4\,)(\,1\,2\,5\,).} In addition, each cycle can be written in different ways, by choosing different starting points; for example,( 1 2 5 ) ( 3 4 ) = ( 5 1 2 ) ( 3 4 ) = ( 2 5 1 ) ( 4 3 ) . {\displaystyle (\,1\,2\,5\,)(\,3\,4\,)=(\,5\,1\,2\,)(\,3\,4\,)=(\,2\,5\,1\,)(\,4\,3\,).} One may combine these equalities to write the disjoint cycles of a given permutation in many different ways.1-cycles are often omitted from the cycle notation, provided that the context is clear; for any element x in S not appearing in any cycle, one implicitly assumes
σ
(
x
)
=
x
{\displaystyle \sigma (x)=x}
A convenient feature of cycle notation is that cycle notation of the inverse permutation is given by reversing the order of the elements in the permutation's cycles. For example, [ ( 1 2 5 ) ( 3 4 ) ] − 1 = ( 5 2 1 ) ( 4 3 ) . {\displaystyle [(\,1\,2\,5\,)(\,3\,4\,)]^{-1}=(\,5\,2\,1\,)(\,4\,3\,).} Canonical cycle notationIn some combinatorial contexts it is useful to fix a certain order for the elements in the cycles and of the (disjoint) cycles themselves. Miklós Bóna calls the following ordering choices the canonical cycle notation:
For example, (312)(54)(8)(976) is a permutation in canonical cycle notation.[22] The canonical cycle notation does not omit one-cycles. Richard P. Stanley calls the same choice of representation the "standard representation" of a permutation,[23] and Martin Aigner uses the term "standard form" for the same notion.[18] Sergey Kitaev also uses the "standard form" terminology, but reverses both choices; that is, each cycle lists its least element first and the cycles are sorted in decreasing order of their least, that is, first elements.[24] Composition of permutationsThere are two ways to denote the composition of two permutations.
σ
⋅
π
{\displaystyle \sigma \cdot \pi }
Since function composition is associative, so is the composition operation on permutations:
(
σ
π
)
τ
=
σ
(
π
τ
)
{\displaystyle (\sigma \pi )\tau =\sigma (\pi \tau )}
Some authors prefer the leftmost factor acting first,[26][27][28] but to that end permutations must be written to the right of their argument, often as an exponent, where σ acting on x is written xσ; then the product is defined by xσ·π = (xσ)π. However this gives a different rule for multiplying permutations; this article uses the definition where the rightmost permutation is applied first. Other uses of the term permutationThe concept of a permutation as an ordered arrangement admits several generalizations that are not permutations, but have been called permutations in the literature. k-permutations of nA weaker meaning of the term permutation, sometimes used in elementary combinatorics texts, designates those ordered arrangements in which no element occurs more than once, but without the requirement of using all the elements from a given set. These are not permutations except in special cases, but are natural generalizations of the ordered arrangement concept. Indeed, this use often involves considering arrangements of a fixed length k of elements taken from a given set of size n, in other words, these k-permutations of n are the different ordered arrangements of a k-element subset of an n-set (sometimes called variations or arrangements in older literature[c]). These objects are also known as partial permutations or as sequences without repetition, terms that avoid confusion with the other, more common, meaning of "permutation". The number of such
k
{\displaystyle k}
which is 0 when k > n, and otherwise is equal to n ! ( n − k ) ! . {\displaystyle {\frac {n!}{(n-k)!}}.}The product is well defined without the assumption that
n
{\displaystyle n}
is a non-negative integer, and is of importance outside combinatorics as well; it is known as the Pochhammer symbol
(
n
)
k
{\displaystyle (n)_{k}}
This usage of the term permutation is closely related to the term combination. A k-element combination of an n-set S is a k element subset of S, the elements of which are not ordered. By taking all the k element subsets of S and ordering each of them in all possible ways, we obtain all the k-permutations of S. The number of k-combinations of an n-set, C(n,k), is therefore related to the number of k-permutations of n by: C ( n , k ) = P ( n , k ) P ( k , k ) = n ! ( n − k ) ! k ! 0 ! = n ! ( n − k ) ! k ! . {\displaystyle C(n,k)={\frac {P(n,k)}{P(k,k)}}={\frac {\tfrac {n!}{(n-k)!}}{\tfrac {k!}{0!}}}={\frac {n!}{(n-k)!\,k!}}.}These numbers are also known as binomial coefficients and are denoted by
(
n
k
)
{\displaystyle {\binom {n}{k}}}
Permutations with repetitionOrdered arrangements of k elements of a set S, where repetition is allowed, are called k-tuples. They have sometimes been referred to as permutations with repetition, although they are not permutations in general. They are also called words over the alphabet S in some contexts. If the set S has n elements, the number of k-tuples over S is
n
k
.
{\displaystyle n^{k}.}
Permutations of multisetsIf M is a finite multiset, then a multiset permutation is an ordered arrangement of elements of M in which each element appears a number of times equal exactly to its multiplicity in M. An anagram of a word having some repeated letters is an example of a multiset permutation.[d] If the multiplicities of the elements of M (taken in some order) are
m
1
{\displaystyle m_{1}}
For example, the number of distinct anagrams of the word MISSISSIPPI is:[31] 11 ! 1 ! 4 ! 4 ! 2 ! = 34650 {\displaystyle {\frac {11!}{1!\,4!\,4!\,2!}}=34650}A k-permutation of a multiset M is a sequence of length k of elements of M in which each element appears a number of times less than or equal to its multiplicity in M (an element's repetition number). Circular permutationsPermutations, when considered as arrangements, are sometimes referred to as linearly ordered arrangements. In these arrangements there is a first element, a second element, and so on. If, however, the objects are arranged in a circular manner this distinguished ordering no longer exists, that is, there is no "first element" in the arrangement, any element can be considered as the start of the arrangement. The arrangements of objects in a circular manner are called circular permutations.[32][e] These can be formally defined as equivalence classes of ordinary permutations of the objects, for the equivalence relation generated by moving the final element of the linear arrangement to its front. Two circular permutations are equivalent if one can be rotated into the other (that is, cycled without changing the relative positions of the elements). The following four circular permutations on four letters are considered to be the same. 1 4 2 3 4 3 2 1 3 4 1 2 2 3 1 4The circular arrangements are to be read counter-clockwise, so the following two are not equivalent since no rotation can bring one to the other. 1 1 4 3 3 4 2 2The number of circular permutations of a set S with n elements is (n – 1)!. PropertiesThe number of permutations of n distinct objects is n!. The number of n-permutations with k disjoint cycles is the signless Stirling number of the first kind, denoted by c(n, k).[33] Cycle typeThe cycles (including the fixed points) of a permutation
σ
{\displaystyle \sigma }
of a set with n elements partition that set; so the lengths of these cycles form an integer partition of n, which is called the cycle type (or sometimes cycle structure or cycle shape) of
σ
{\displaystyle \sigma }
. There is a "1" in the cycle type for every fixed point of
σ
{\displaystyle \sigma }
, a "2" for every transposition, and so on. The cycle type of
β
=
(
1
2
5
)
(
3
4
)
(
6
8
)
(
7
)
{\displaystyle \beta =(1\,2\,5\,)(\,3\,4\,)(6\,8\,)(\,7\,)}
This may also be written in a more compact form as [112231].
More precisely, the general form is
[
1
α
1
2
α
2
⋯
n
α
n
]
{\displaystyle [1^{\alpha _{1}}2^{\alpha _{2}}\dotsm n^{\alpha _{n}}]}
Conjugating permutationsIn general, composing permutations written in cycle notation follows no easily described pattern – the cycles of the composition can be different from those being composed. However the cycle type is preserved in the special case of conjugating a permutation
σ
{\displaystyle \sigma }
by another permutation
π
{\displaystyle \pi }
, which means forming the product
π
σ
π
−
1
{\displaystyle \pi \sigma \pi ^{-1}}
Permutation orderThe order of a permutation
σ
{\displaystyle \sigma }
is the smallest positive integer m so that
σ
m
=
i
d
{\displaystyle \sigma ^{m}=\mathrm {id} }
Parity of a permutationEvery permutation of a finite set can be expressed as the product of transpositions.[36] Although many such expressions for a given permutation may exist, either they all contain an even number of transpositions or they all contain an odd number of transpositions. Thus all permutations can be classified as even or odd depending on this number. This result can be extended so as to assign a sign, written
sgn
σ
{\displaystyle \operatorname {sgn} \sigma }
It follows that
sgn
(
σ
σ
−
1
)
=
+
1.
{\displaystyle \operatorname {sgn} \left(\sigma \sigma ^{-1}\right)=+1.}
Matrix representationA permutation matrix is an n × n matrix that has exactly one entry 1 in each column and in each row, and all other entries are 0. There are several different conventions that one can use to assign a permutation matrix to a permutation of {1, 2, ..., n}. One natural approach is to associate to the permutation σ the matrix
M
σ
{\displaystyle M_{\sigma }}
For example, with this convention, the matrix associated to the permutation
σ
(
1
,
2
,
3
)
=
(
2
,
1
,
3
)
{\displaystyle \sigma (1,2,3)=(2,1,3)}
M ( 2 , 1 , 3 ) M ( 2 , 3 , 1 ) = ( 0 1 0 1 0 0 0 0 1 ) ( 0 0 1 1 0 0 0 1 0 ) = ( 1 0 0 0 0 1 0 1 0 ) = M ( 1 , 3 , 2 ) . {\displaystyle M_{(2,1,3)}M_{(2,3,1)}={\begin{pmatrix}0&1&0\\1&0&0\\0&0&1\end{pmatrix}}{\begin{pmatrix}0&0&1\\1&0&0\\0&1&0\end{pmatrix}}={\begin{pmatrix}1&0&0\\0&0&1\\0&1&0\end{pmatrix}}=M_{(1,3,2)}.} It is also common in the literature to find the inverse convention, where a permutation σ is associated to the matrix
P
σ
=
(
M
σ
)
−
1
=
(
M
σ
)
T
{\displaystyle P_{\sigma }=(M_{\sigma })^{-1}=(M_{\sigma })^{T}}
The Cayley table on the right shows these matrices for permutations of 3 elements. Permutations of totally ordered setsIn some applications, the elements of the set being permuted will be compared with each other. This requires that the set S has a total order so that any two elements can be compared. The set {1, 2, ..., n} is totally ordered by the usual "≤" relation and so it is the most frequently used set in these applications, but in general, any totally ordered set will do. In these applications, the ordered arrangement view of a permutation is needed to talk about the positions in a permutation. There are a number of properties that are directly related to the total ordering of S. Ascents, descents, runs and excedancesAn ascent of a permutation σ of n is any position i < n where the following value is bigger than the current one. That is, if σ = σ1σ2...σn, then i is an ascent if σi < σi+1. For example, the permutation 3452167 has ascents (at positions) 1, 2, 5, and 6. Similarly, a descent is a position i < n with σi > σi+1, so every i with
1
≤
i
<
n
{\displaystyle 1\leq i<n}
An ascending run of a permutation is a nonempty increasing contiguous subsequence of the permutation that cannot be extended at either end; it corresponds to a maximal sequence of successive ascents (the latter may be empty: between two successive descents there is still an ascending run of length 1). By contrast an increasing subsequence of a permutation is not necessarily contiguous: it is an increasing sequence of elements obtained from the permutation by omitting the values at some positions. For example, the permutation 2453167 has the ascending runs 245, 3, and 167, while it has an increasing subsequence 2367. If a permutation has k − 1 descents, then it must be the union of k ascending runs.[37] The number of permutations of n with k ascents is (by definition) the Eulerian number
⟨
n
k
⟩
{\displaystyle \textstyle \left\langle {n \atop k}\right\rangle }
An excedance of a permutation σ1σ2...σn is an index j such that σj > j. If the inequality is not strict (that is, σj ≥ j), then j is called a weak excedance. The number of n-permutations with k excedances coincides with the number of n-permutations with k descents.[39] Foata's transition lemmaThere is a relationship between the one-line notation and the canonical cycle notation. Consider the permutation
(
2
)
(
3
1
)
{\displaystyle (\,2\,)(\,3\,1\,)}
Let
f
(
p
)
=
q
{\displaystyle f(p)=q}
For example, in the permutation
q
=
312548976
{\displaystyle q=312548976}
The following table shows both
q
{\displaystyle q}
and
p
{\displaystyle p}
for the six permutations of
123
{\displaystyle 123}
As a first corollary, the number of n-permutations with exactly k left-to-right maxima is also equal to the signless Stirling number of the first kind,
c
(
n
,
k
)
{\displaystyle c(n,k)}
InversionsAn inversion of a permutation σ is a pair (i, j) of positions where the entries of a permutation are in the opposite order:
i
<
j
{\displaystyle i<j}
Sometimes an inversion is defined as the pair of values (σi,σj) whose order is reversed; this makes no difference for the number of inversions, and this pair (reversed) is also an inversion in the above sense for the inverse permutation σ−1. The number of inversions is an important measure for the degree to which the entries of a permutation are out of order; it is the same for σ and for σ−1. To bring a permutation with k inversions into order (that is, transform it into the identity permutation), by successively applying (right-multiplication by) adjacent transpositions, is always possible and requires a sequence of k such operations. Moreover, any reasonable choice for the adjacent transpositions will work: it suffices to choose at each step a transposition of i and i + 1 where i is a descent of the permutation as modified so far (so that the transposition will remove this particular descent, although it might create other descents). This is so because applying such a transposition reduces the number of inversions by 1; as long as this number is not zero, the permutation is not the identity, so it has at least one descent. Bubble sort and insertion sort can be interpreted as particular instances of this procedure to put a sequence into order. Incidentally this procedure proves that any permutation σ can be written as a product of adjacent transpositions; for this one may simply reverse any sequence of such transpositions that transforms σ into the identity. In fact, by enumerating all sequences of adjacent transpositions that would transform σ into the identity, one obtains (after reversal) a complete list of all expressions of minimal length writing σ as a product of adjacent transpositions. The number of permutations of n with k inversions is expressed by a Mahonian number,[43] it is the coefficient of Xk in the expansion of the product ∏ m = 1 n ∑ i = 0 m − 1 X i = 1 ( 1 + X ) ( 1 + X + X 2 ) ⋯ ( 1 + X + X 2 + ⋯ + X n − 1 ) , {\displaystyle \prod _{m=1}^{n}\sum _{i=0}^{m-1}X^{i}=1\left(1+X\right)\left(1+X+X^{2}\right)\cdots \left(1+X+X^{2}+\cdots +X^{n-1}\right),} which is also known (with q substituted for X) as the q-factorial [n]q! . The expansion of the product appears in Necklace (combinatorics).Let
σ
∈
S
n
,
i
,
j
∈
{
1
,
2
,
…
,
n
}
{\displaystyle \sigma \in S_{n},i,j\in \{1,2,\dots ,n\}}
∑ i < j , σ ( i ) > σ ( j ) ( σ ( i ) − σ ( j ) ) = | { τ ∈ S n ∣ τ ≤ σ , τ is bigrassmannian } {\displaystyle \sum _{i<j,\sigma (i)>\sigma (j)}(\sigma (i)-\sigma (j))=|\{\tau \in S_{n}\mid \tau \leq \sigma ,\tau {\text{ is bigrassmannian}}\}} where
≤
{\displaystyle \leq }
Permutations in computingNumbering permutationsOne way to represent permutations of n things is by an integer N with 0 ≤ N < n!, provided convenient methods are given to convert between the number and the representation of a permutation as an ordered arrangement (sequence). This gives the most compact representation of arbitrary permutations, and in computing is particularly attractive when n is small enough that N can be held in a machine word; for 32-bit words this means n ≤ 12, and for 64-bit words this means n ≤ 20. The conversion can be done via the intermediate form of a sequence of numbers dn, dn−1, ..., d2, d1, where di is a non-negative integer less than i (one may omit d1, as it is always 0, but its presence makes the subsequent conversion to a permutation easier to describe). The first step then is to simply express N in the factorial number system, which is just a particular mixed radix representation, where, for numbers less than n!, the bases (place values or multiplication factors) for successive digits are (n − 1)!, (n − 2)!, ..., 2!, 1!. The second step interprets this sequence as a Lehmer code or (almost equivalently) as an inversion table.
In the Lehmer code for a permutation σ, the number dn represents the choice made for the first term σ1, the number dn−1 represents the choice made for the second term σ2 among the remaining n − 1 elements of the set, and so forth. More precisely, each dn+1−i gives the number of remaining elements strictly less than the term σi. Since those remaining elements are bound to turn up as some later term σj, the digit dn+1−i counts the inversions (i,j) involving i as smaller index (the number of values j for which i < j and σi > σj). The inversion table for σ is quite similar, but here dn+1−k counts the number of inversions (i,j) where k = σj occurs as the smaller of the two values appearing in inverted order.[44] Both encodings can be visualized by an n by n Rothe diagram[45] (named after Heinrich August Rothe) in which dots at (i,σi) mark the entries of the permutation, and a cross at (i,σj) marks the inversion (i,j); by the definition of inversions a cross appears in any square that comes both before the dot (j,σj) in its column, and before the dot (i,σi) in its row. The Lehmer code lists the numbers of crosses in successive rows, while the inversion table lists the numbers of crosses in successive columns; it is just the Lehmer code for the inverse permutation, and vice versa. To effectively convert a Lehmer code dn, dn−1, ..., d2, d1 into a permutation of an ordered set S, one can start with a list of the elements of S in increasing order, and for i increasing from 1 to n set σi to the element in the list that is preceded by dn+1−i other ones, and remove that element from the list. To convert an inversion table dn, dn−1, ..., d2, d1 into the corresponding permutation, one can traverse the numbers from d1 to dn while inserting the elements of S from largest to smallest into an initially empty sequence; at the step using the number d from the inversion table, the element from S inserted into the sequence at the point where it is preceded by d elements already present. Alternatively one could process the numbers from the inversion table and the elements of S both in the opposite order, starting with a row of n empty slots, and at each step place the element from S into the empty slot that is preceded by d other empty slots. Converting successive natural numbers to the factorial number system produces those sequences in lexicographic order (as is the case with any mixed radix number system), and further converting them to permutations preserves the lexicographic ordering, provided the Lehmer code interpretation is used (using inversion tables, one gets a different ordering, where one starts by comparing permutations by the place of their entries 1 rather than by the value of their first entries). The sum of the numbers in the factorial number system representation gives the number of inversions of the permutation, and the parity of that sum gives the signature of the permutation. Moreover, the positions of the zeroes in the inversion table give the values of left-to-right maxima of the permutation (in the example 6, 8, 9) while the positions of the zeroes in the Lehmer code are the positions of the right-to-left minima (in the example positions the 4, 8, 9 of the values 1, 2, 5); this allows computing the distribution of such extrema among all permutations. A permutation with Lehmer code dn, dn−1, ..., d2, d1 has an ascent n − i if and only if di ≥ di+1. Algorithms to generate permutationsIn computing it may be required to generate permutations of a given sequence of values. The methods best adapted to do this depend on whether one wants some randomly chosen permutations, or all permutations, and in the latter case if a specific ordering is required. Another question is whether possible equality among entries in the given sequence is to be taken into account; if so, one should only generate distinct multiset permutations of the sequence. An obvious way to generate permutations of n is to generate values for the Lehmer code (possibly using the factorial number system representation of integers up to n!), and convert those into the corresponding permutations. However, the latter step, while straightforward, is hard to implement efficiently, because it requires n operations each of selection from a sequence and deletion from it, at an arbitrary position; of the obvious representations of the sequence as an array or a linked list, both require (for different reasons) about n2/4 operations to perform the conversion. With n likely to be rather small (especially if generation of all permutations is needed) that is not too much of a problem, but it turns out that both for random and for systematic generation there are simple alternatives that do considerably better. For this reason it does not seem useful, although certainly possible, to employ a special data structure that would allow performing the conversion from Lehmer code to permutation in O(n log n) time. Random generation of permutationsFor generating random permutations of a given sequence of n values, it makes no difference whether one applies a randomly selected permutation of n to the sequence, or chooses a random element from the set of distinct (multiset) permutations of the sequence. This is because, even though in case of repeated values there can be many distinct permutations of n that result in the same permuted sequence, the number of such permutations is the same for each possible result. Unlike for systematic generation, which becomes unfeasible for large n due to the growth of the number n!, there is no reason to assume that n will be small for random generation. The basic idea to generate a random permutation is to generate at random one of the n! sequences of integers d1,d2,...,dn satisfying 0 ≤ di < i (since d1 is always zero it may be omitted) and to convert it to a permutation through a bijective correspondence. For the latter correspondence one could interpret the (reverse) sequence as a Lehmer code, and this gives a generation method first published in 1938 by Ronald Fisher and Frank Yates.[46] While at the time computer implementation was not an issue, this method suffers from the difficulty sketched above to convert from Lehmer code to permutation efficiently. This can be remedied by using a different bijective correspondence: after using di to select an element among i remaining elements of the sequence (for decreasing values of i), rather than removing the element and compacting the sequence by shifting down further elements one place, one swaps the element with the final remaining element. Thus the elements remaining for selection form a consecutive range at each point in time, even though they may not occur in the same order as they did in the original sequence. The mapping from sequence of integers to permutations is somewhat complicated, but it can be seen to produce each permutation in exactly one way, by an immediate induction. When the selected element happens to be the final remaining element, the swap operation can be omitted. This does not occur sufficiently often to warrant testing for the condition, but the final element must be included among the candidates of the selection, to guarantee that all permutations can be generated. The resulting algorithm for generating a random permutation of a[0], a[1], ..., a[n − 1] can be described as follows in pseudocode: for i from n downto 2 do di ← random element of { 0, ..., i − 1 } swap a[di] and a[i − 1]This can be combined with the initialization of the array a[i] = i as follows for i from 0 to n−1 do di+1 ← random element of { 0, ..., i } a[i] ← a[di+1] a[di+1] ← iIf di+1 = i, the first assignment will copy an uninitialized value, but the second will overwrite it with the correct value i. However, Fisher-Yates is not the fastest algorithm for generating a permutation, because Fisher-Yates is essentially a sequential algorithm and "divide and conquer" procedures can achieve the same result in parallel.[47] Generation in lexicographic orderThere are many ways to systematically generate all permutations of a given sequence.[48] One classic, simple, and flexible algorithm is based upon finding the next permutation in lexicographic ordering, if it exists. It can handle repeated values, for which case it generates each distinct multiset permutation once. Even for ordinary permutations it is significantly more efficient than generating values for the Lehmer code in lexicographic order (possibly using the factorial number system) and converting those to permutations. It begins by sorting the sequence in (weakly) increasing order (which gives its lexicographically minimal permutation), and then repeats advancing to the next permutation as long as one is found. The method goes back to Narayana Pandita in 14th century India, and has been rediscovered frequently.[49] The following algorithm generates the next permutation lexicographically after a given permutation. It changes the given permutation in-place.
For example, given the sequence [1, 2, 3, 4] (which is in increasing order), and given that the index is zero-based, the steps are as follows:
Following this algorithm, the next lexicographic permutation will be [1, 3, 2, 4], and the 24th permutation will be [4, 3, 2, 1] at which point a[k] < a[k + 1] does not exist, indicating that this is the last permutation. This method uses about 3 comparisons and 1.5 swaps per permutation, amortized over the whole sequence, not counting the initial sort.[50] Generation with minimal changesAn alternative to the above algorithm, the Steinhaus–Johnson–Trotter algorithm, generates an ordering on all the permutations of a given sequence with the property that any two consecutive permutations in its output differ by swapping two adjacent values. This ordering on the permutations was known to 17th-century English bell ringers, among whom it was known as "plain changes". One advantage of this method is that the small amount of change from one permutation to the next allows the method to be implemented in constant time per permutation. The same can also easily generate the subset of even permutations, again in constant time per permutation, by skipping every other output permutation.[49] An alternative to Steinhaus–Johnson–Trotter is Heap's algorithm,[51] said by Robert Sedgewick in 1977 to be the fastest algorithm of generating permutations in applications.[48] The following figure shows the output of all three aforementioned algorithms for generating all permutations of length
n
=
4
{\displaystyle n=4}
Meandric permutationsMeandric systems give rise to meandric permutations, a special subset of alternate permutations. An alternate permutation of the set {1, 2, ..., 2n} is a cyclic permutation (with no fixed points) such that the digits in the cyclic notation form alternate between odd and even integers. Meandric permutations are useful in the analysis of RNA secondary structure. Not all alternate permutations are meandric. A modification of Heap's algorithm has been used to generate all alternate permutations of order n (that is, of length 2n) without generating all (2n)! permutations.[57][unreliable source?] Generation of these alternate permutations is needed before they are analyzed to determine if they are meandric or not. The algorithm is recursive. The following table exhibits a step in the procedure. In the previous step, all alternate permutations of length 5 have been generated. Three copies of each of these have a "6" added to the right end, and then a different transposition involving this last entry and a previous entry in an even position is applied (including the identity; that is, no transposition).
ApplicationsPermutations are used in the interleaver component of the error detection and correction algorithms, such as turbo codes, for example 3GPP Long Term Evolution mobile telecommunication standard uses these ideas (see 3GPP technical specification 36.212[58]). Such applications raise the question of fast generation of permutations satisfying certain desirable properties. One of the methods is based on the permutation polynomials. Also as a base for optimal hashing in Unique Permutation Hashing.[59] See also
Notes
References
Bibliography
Further reading
External links
Wikiversity has learning resources about Permutation notation
Wikimedia Commons has media related to Permutations. Page 2
In telecommunications, long-term evolution (LTE) is a standard for wireless broadband communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA standards. It improves on those standards' capacity and speed by using a different radio interface and core network improvements.[1][2] LTE is the upgrade path for carriers with both GSM/UMTS networks and CDMA2000 networks. Because LTE frequencies and bands differ from country to country, only multi-band phones can use LTE in all countries where it is supported. The standard is developed by the 3GPP (3rd Generation Partnership Project) and is specified in its Release 8 document series, with minor enhancements described in Release 9. LTE is also called 3.95G and has been marketed as "4G LTE" and "Advanced 4G";[citation needed] but it does not meet the technical criteria of a 4G wireless service, as specified in the 3GPP Release 8 and 9 document series for LTE Advanced. The requirements were set forth by the ITU-R organisation in the IMT Advanced specification; but, because of market pressure and the significant advances that WiMAX, Evolved High Speed Packet Access, and LTE bring to the original 3G technologies, ITU later decided that LTE and the aforementioned technologies can be called 4G technologies.[3] The LTE Advanced standard formally satisfies the ITU-R requirements for being considered IMT-Advanced.[4] To differentiate LTE Advanced and WiMAX-Advanced from current 4G technologies, ITU has defined the latter as "True 4G".[5][6] OverviewLTE stands for Long-Term Evolution[7] and is a registered trademark owned by ETSI (European Telecommunications Standards Institute) for the wireless data communications technology and a development of the GSM/UMTS standards. However, other nations and companies do play an active role in the LTE project. The goal of LTE was to increase the capacity and speed of wireless data networks using new DSP (digital signal processing) techniques and modulations that were developed around the turn of the millennium. A further goal was the redesign and simplification of the network architecture to an IP-based system with significantly reduced transfer latency compared with the 3G architecture. The LTE wireless interface is incompatible with 2G and 3G networks, so that it must be operated on a separate radio spectrum. The idea of base of LTE was first proposed in 1998 , with the use of the COFDM radio access technique to replace the CDMA and studying its Terrestrial use in the L band at 1428 MHz (TE) In 2004 by Japan's NTT Docomo, with studies on the standard officially commenced in 2005.[8] In May 2007, the LTE/SAE Trial Initiative (LSTI) alliance was founded as a global collaboration between vendors and operators with the goal of verifying and promoting the new standard in order to ensure the global introduction of the technology as quickly as possible.[9][10] The LTE standard was finalized in December 2008, and the first publicly available LTE service was launched by TeliaSonera in Oslo and Stockholm on December 14, 2009, as a data connection with a USB modem. The LTE services were launched by major North American carriers as well, with the Samsung SCH-r900 being the world's first LTE Mobile phone starting on September 21, 2010,[11][12] and Samsung Galaxy Indulge being the world's first LTE smartphone starting on February 10, 2011,[13][14] both offered by MetroPCS, and the HTC ThunderBolt offered by Verizon starting on March 17 being the second LTE smartphone to be sold commercially.[15][16] In Canada, Rogers Wireless was the first to launch LTE network on July 7, 2011, offering the Sierra Wireless AirCard 313U USB mobile broadband modem, known as the "LTE Rocket stick" then followed closely by mobile devices from both HTC and Samsung.[17] Initially, CDMA operators planned to upgrade to rival standards called UMB and WiMAX, but major CDMA operators (such as Verizon, Sprint and MetroPCS in the United States, Bell and Telus in Canada, au by KDDI in Japan, SK Telecom in South Korea and China Telecom/China Unicom in China) have announced instead they intend to migrate to LTE. The next version of LTE is LTE Advanced, which was standardized in March 2011.[18] Services commenced in 2013.[19] Additional evolution known as LTE Advanced Pro have been approved in year 2015.[20] The LTE specification provides downlink peak rates of 300 Mbit/s, uplink peak rates of 75 Mbit/s and QoS provisions permitting a transfer latency of less than 5 ms in the radio access network. LTE has the ability to manage fast-moving mobiles and supports multi-cast and broadcast streams. LTE supports scalable carrier bandwidths, from 1.4 MHz to 20 MHz and supports both frequency division duplexing (FDD) and time-division duplexing (TDD). The IP-based network architecture, called the Evolved Packet Core (EPC) designed to replace the GPRS Core Network, supports seamless handovers for both voice and data to cell towers with older network technology such as GSM, UMTS and CDMA2000.[21] The simpler architecture results in lower operating costs (for example, each E-UTRA cell will support up to four times the data and voice capacity supported by HSPA[22]). History3GPP standard development timeline
Carrier adoption timelineMost carriers supporting GSM or HSUPA networks can be expected to upgrade their networks to LTE at some stage. A complete list of commercial contracts can be found at:[59]
The following is a list of top 10 countries/territories by 4G LTE coverage as measured by OpenSignal.com in February/March 2019.[70][71]
For the complete list of all the countries/territories, see list of countries by 4G LTE penetration. LTE-TDD and LTE-FDDLong-Term Evolution Time-Division Duplex (LTE-TDD), also referred to as TDD LTE, is a 4G telecommunications technology and standard co-developed by an international coalition of companies, including China Mobile, Datang Telecom, Huawei, ZTE, Nokia Solutions and Networks, Qualcomm, Samsung, and ST-Ericsson. It is one of the two mobile data transmission technologies of the Long-Term Evolution (LTE) technology standard, the other being Long-Term Evolution Frequency-Division Duplex (LTE-FDD). While some companies refer to LTE-TDD as "TD-LTE" for familiarity with TD-SCDMA, there is no reference to that abbreviation anywhere in the 3GPP specifications.[72][73][74] There are two major differences between LTE-TDD and LTE-FDD: how data is uploaded and downloaded, and what frequency spectra the networks are deployed in. While LTE-FDD uses paired frequencies to upload and download data,[75] LTE-TDD uses a single frequency, alternating between uploading and downloading data through time.[76][77] The ratio between uploads and downloads on a LTE-TDD network can be changed dynamically, depending on whether more data needs to be sent or received.[78] LTE-TDD and LTE-FDD also operate on different frequency bands,[79] with LTE-TDD working better at higher frequencies, and LTE-FDD working better at lower frequencies.[80] Frequencies used for LTE-TDD range from 1850 MHz to 3800 MHz, with several different bands being used.[81] The LTE-TDD spectrum is generally cheaper to access, and has less traffic.[79] Further, the bands for LTE-TDD overlap with those used for WiMAX, which can easily be upgraded to support LTE-TDD.[79] Despite the differences in how the two types of LTE handle data transmission, LTE-TDD and LTE-FDD share 90 percent of their core technology, making it possible for the same chipsets and networks to use both versions of LTE.[79][82] A number of companies produce dual-mode chips or mobile devices, including Samsung and Qualcomm,[83][84] while operators CMHK and Hi3G Access have developed dual-mode networks in Hong Kong and Sweden, respectively.[85] History of LTE-TDDThe creation of LTE-TDD involved a coalition of international companies that worked to develop and test the technology.[86] China Mobile was an early proponent of LTE-TDD,[79][87] along with other companies like Datang Telecom[86] and Huawei, which worked to deploy LTE-TDD networks, and later developed technology allowing LTE-TDD equipment to operate in white spaces—frequency spectra between broadcast TV stations.[73][88] Intel also participated in the development, setting up a LTE-TDD interoperability lab with Huawei in China,[89] as well as ST-Ericsson,[79] Nokia,[79] and Nokia Siemens (now Nokia Solutions and Networks),[73] which developed LTE-TDD base stations that increased capacity by 80 percent and coverage by 40 percent.[90] Qualcomm also participated, developing the world's first multi-mode chip, combining both LTE-TDD and LTE-FDD, along with HSPA and EV-DO.[84] Accelleran, a Belgian company, has also worked to build small cells for LTE-TDD networks.[91] Trials of LTE-TDD technology began as early as 2010, with Reliance Industries and Ericsson India conducting field tests of LTE-TDD in India, achieving 80 megabit-per second download speeds and 20 megabit-per-second upload speeds.[92] By 2011, China Mobile began trials of the technology in six cities.[73] Although initially seen as a technology utilized by only a few countries, including China and India,[93] by 2011 international interest in LTE-TDD had expanded, especially in Asia, in part due to LTE-TDD's lower cost of deployment compared to LTE-FDD.[73] By the middle of that year, 26 networks around the world were conducting trials of the technology.[74] The Global LTE-TDD Initiative (GTI) was also started in 2011, with founding partners China Mobile, Bharti Airtel, SoftBank Mobile, Vodafone, Clearwire, Aero2 and E-Plus.[94] In September 2011, Huawei announced it would partner with Polish mobile provider Aero2 to develop a combined LTE-TDD and LTE-FDD network in Poland,[95] and by April 2012, ZTE Corporation had worked to deploy trial or commercial LTE-TDD networks for 33 operators in 19 countries.[85] In late 2012, Qualcomm worked extensively to deploy a commercial LTE-TDD network in India, and partnered with Bharti Airtel and Huawei to develop the first multi-mode LTE-TDD smartphone for India.[84] In Japan, SoftBank Mobile launched LTE-TDD services in February 2012 under the name Advanced eXtended Global Platform (AXGP), and marketed as SoftBank 4G (ja). The AXGP band was previously used for Willcom's PHS service, and after PHS was discontinued in 2010 the PHS band was re-purposed for AXGP service.[96][97] In the U.S., Clearwire planned to implement LTE-TDD, with chip-maker Qualcomm agreeing to support Clearwire's frequencies on its multi-mode LTE chipsets.[98] With Sprint's acquisition of Clearwire in 2013,[75][99] the carrier began using these frequencies for LTE service on networks built by Samsung, Alcatel-Lucent, and Nokia.[100][101] As of March 2013, 156 commercial 4G LTE networks existed, including 142 LTE-FDD networks and 14 LTE-TDD networks.[86] As of November 2013, the South Korean government planned to allow a fourth wireless carrier in 2014, which would provide LTE-TDD services,[77] and in December 2013, LTE-TDD licenses were granted to China's three mobile operators, allowing commercial deployment of 4G LTE services.[102] In January 2014, Nokia Solutions and Networks indicated that it had completed a series of tests of voice over LTE (VoLTE) calls on China Mobile's TD-LTE network.[103] The next month, Nokia Solutions and Networks and Sprint announced that they had demonstrated throughput speeds of 2.6 gigabits per second using a LTE-TDD network, surpassing the previous record of 1.6 gigabits per second.[104] FeaturesMuch of the LTE standard addresses the upgrading of 3G UMTS to what will eventually be 4G mobile communications technology. A large amount of the work is aimed at simplifying the architecture of the system, as it transitions from the existing UMTS circuit + packet switching combined network, to an all-IP flat architecture system. E-UTRA is the air interface of LTE. Its main features are:
Voice callsThe LTE standard supports only packet switching with its all-IP network. Voice calls in GSM, UMTS and CDMA2000 are circuit switched, so with the adoption of LTE, carriers will have to re-engineer their voice call network.[106] Four different approaches sprang up: Voice over LTE (VoLTE) Circuit-switched fallback (CSFB) In this approach, LTE just provides data services, and when a voice call is to be initiated or received, it will fall back to the circuit-switched domain. When using this solution, operators just need to upgrade the MSC instead of deploying the IMS, and therefore, can provide services quickly. However, the disadvantage is longer call setup delay. Simultaneous voice and LTE (SVLTE) In this approach, the handset works simultaneously in the LTE and circuit switched modes, with the LTE mode providing data services and the circuit switched mode providing the voice service. This is a solution solely based on the handset, which does not have special requirements on the network and does not require the deployment of IMS either. The disadvantage of this solution is that the phone can become expensive with high power consumption. Single Radio Voice Call Continuity (SRVCC)One additional approach which is not initiated by operators is the usage of over-the-top content (OTT) services, using applications like Skype and Google Talk to provide LTE voice service.[107] Most major backers of LTE preferred and promoted VoLTE from the beginning. The lack of software support in initial LTE devices, as well as core network devices, however led to a number of carriers promoting VoLGA (Voice over LTE Generic Access) as an interim solution.[108] The idea was to use the same principles as GAN (Generic Access Network, also known as UMA or Unlicensed Mobile Access), which defines the protocols through which a mobile handset can perform voice calls over a customer's private Internet connection, usually over wireless LAN. VoLGA however never gained much support, because VoLTE (IMS) promises much more flexible services, albeit at the cost of having to upgrade the entire voice call infrastructure. VoLTE will also require Single Radio Voice Call Continuity (SRVCC) in order to be able to smoothly perform a handover to a 3G network in case of poor LTE signal quality.[109] While the industry has seemingly standardized on VoLTE for the future, the demand for voice calls today has led LTE carriers to introduce circuit-switched fallback as a stopgap measure. When placing or receiving a voice call, LTE handsets will fall back to old 2G or 3G networks for the duration of the call. Enhanced voice qualityTo ensure compatibility, 3GPP demands at least AMR-NB codec (narrow band), but the recommended speech codec for VoLTE is Adaptive Multi-Rate Wideband, also known as HD Voice. This codec is mandated in 3GPP networks that support 16 kHz sampling.[110] Fraunhofer IIS has proposed and demonstrated "Full-HD Voice", an implementation of the AAC-ELD (Advanced Audio Coding – Enhanced Low Delay) codec for LTE handsets.[111] Where previous cell phone voice codecs only supported frequencies up to 3.5 kHz and upcoming wideband audio services branded as HD Voice up to 7 kHz, Full-HD Voice supports the entire bandwidth range from 20 Hz to 20 kHz. For end-to-end Full-HD Voice calls to succeed, however, both the caller and recipient's handsets, as well as networks, have to support the feature.[112] Frequency bandsThe LTE standard covers a range of many different bands, each of which is designated by both a frequency and a band number:
As a result, phones from one country may not work in other countries. Users will need a multi-band capable phone for roaming internationally. PatentsAccording to the European Telecommunications Standards Institute's (ETSI) intellectual property rights (IPR) database, about 50 companies have declared, as of March 2012, holding essential patents covering the LTE standard.[119] The ETSI has made no investigation on the correctness of the declarations however,[119] so that "any analysis of essential LTE patents should take into account more than ETSI declarations."[120] Independent studies have found that about 3.3 to 5 percent of all revenues from handset manufacturers are spent on standard-essential patents. This is less than the combined published rates, due to reduced-rate licensing agreements, such as cross-licensing.[121][122][123] See also
References
Further reading
External linksLTE at Wikipedia's sister projects
|