9 research outputs found
Expander Chunked Codes
Chunked codes are efficient random linear network coding (RLNC) schemes with
low computational cost, where the input packets are encoded into small chunks
(i.e., subsets of the coded packets). During the network transmission, RLNC is
performed within each chunk. In this paper, we first introduce a simple
transfer matrix model to characterize the transmission of chunks, and derive
some basic properties of the model to facilitate the performance analysis. We
then focus on the design of overlapped chunked codes, a class of chunked codes
whose chunks are non-disjoint subsets of input packets, which are of special
interest since they can be encoded with negligible computational cost and in a
causal fashion. We propose expander chunked (EC) codes, the first class of
overlapped chunked codes that have an analyzable performance,where the
construction of the chunks makes use of regular graphs. Numerical and
simulation results show that in some practical settings, EC codes can achieve
rates within 91 to 97 percent of the optimum and outperform the
state-of-the-art overlapped chunked codes significantly.Comment: 26 pages, 3 figures, submitted for journal publicatio
Batched Sparse Codes
Network coding can significantly improve the transmission rate of
communication networks with packet loss compared with routing. However, using
network coding usually incurs high computational and storage costs in the
network devices and terminals. For example, some network coding schemes require
the computational and/or storage capacities of an intermediate network node to
increase linearly with the number of packets for transmission, making such
schemes difficult to be implemented in a router-like device that has only
constant computational and storage capacities. In this paper, we introduce
BATched Sparse code (BATS code), which enables a digital fountain approach to
resolve the above issue. BATS code is a coding scheme that consists of an outer
code and an inner code. The outer code is a matrix generation of a fountain
code. It works with the inner code that comprises random linear coding at the
intermediate network nodes. BATS codes preserve such desirable properties of
fountain codes as ratelessness and low encoding/decoding complexity. The
computational and storage capacities of the intermediate network nodes required
for applying BATS codes are independent of the number of packets for
transmission. Almost capacity-achieving BATS code schemes are devised for
unicast networks, two-way relay networks, tree networks, a class of three-layer
networks, and the butterfly network. For general networks, under different
optimization criteria, guaranteed decoding rates for the receiving nodes can be
obtained.Comment: 51 pages, 12 figures, submitted to IEEE Transactions on Information
Theor
๋น๋์ผ ๋ถํฌ ๋ณ๋ ฌ ์ฑ๋์ ์ํ ํด๋ผ ๋ถํธ ๊ธฐ๋ฒ๊ณผ ์ธ๋ฑ์ค ์ฝ๋๋ฅผ ์ํ ์ฐ๊ณ ํด๋ผ ๋ถํธ ์ค๊ณ ๊ธฐ๋ฒ
ํ์๋
ผ๋ฌธ (๋ฐ์ฌ)-- ์์ธ๋ํ๊ต ๋ํ์ : ์ ๊ธฐยท์ปดํจํฐ๊ณตํ๋ถ, 2015. 8. ์ด์ ์ฐ.๋ณธ ๋
ผ๋ฌธ์ Part I์ ๋น๋ํ ๋์นญ ์ด์ง ์ด์ฐ ๋ฌด๊ธฐ์ต ์ฑ๋์์ ์ฑ๋ ์ฉ๋์ ๋ฌ์ฑ ํ๋ ํด๋ผ ๋ถํธ์ ์ค๊ณ ๊ธฐ๋ฒ ๋ฐ ์ฆ๋ช
๊ณผ Part II์ ๋น๋ํ ์ด์ง ๋
๋ฆฝ ๋ฌด๊ธฐ์ต ์ฑ๋์์ ์ธ๋ฑ์ค ๋ถํธ์ ํด๋ผ ๋ถํธ์ ์ฐ๊ณ๊ธฐ๋ฒ์ ํตํ ์ต์ ์ ์ ์ก๋ฅ ์ ๋ฌ์ฑํ๋ ์ฐ๊ณ ๊ธฐ๋ฒ์ ๋ํ ์ค๊ณ๋ก ๊ตฌ์ฑ๋๋ค.
Part I์์๋ ๋จผ์ ๊ฐ ์ฑ๋์ ํต๊ณ์ ํน์ฑ์ ๋๋ณํ๋ ์ฑ๋ ํ๋ผ๋ฏธํฐ๊ฐ ๊ฒฐ์ ์ ์ธ ํํ๋ก ๋ถํธ๊ธฐ์ ๋ณตํธ๊ธฐ์ ์ฃผ์ด์ง๋ ๊ฒฝ์ฐ๋ ๋ํด ๋ค๋ฃจ๋ฉฐ,
๋๋ฒ์งธ๋ก ์ด ํ๋ผ๋ฏธํฐ๋ค์ด ๊ฒฐ์ ์ ์ด ์๋ ๋๋คํ ๊ฐ์ผ๋ก์จ ์ฃผ์ด์ง๋ ๊ฒฝ์ฐ์ ๋ํ์ฌ ์ ํฉํ ํด๋ผ ๋ถํธ ๊ธฐ๋ฒ์ ๋ํด ๊ธฐ์ ํ๋ค.
ํ์๋ ๋ค์ ๋๊ฐ์ง์ ํ์ ๊ฒฝ์ฐ๋ก ๋๋๋๋ฐ ํ๋๋ ๋ชจ๋ ํ๋ผ๋ฏธํฐ๋ค์ด ๋จ ํ๋์ ํ๋ฅ ๋ถํฌ์ ๋ํ ์คํ๊ฐ์ธ ๊ฒฝ์ฐ์ด๊ณ ,
๋๋ค๋ฅธ ํ๊ฐ์ง๋ ๊ฐ ํ๋ผ๋ฏธํฐ๋ค์ด ๊ฐ๊ฐ์ ์๋ก ๋ค๋ฅธ ํ๋ฅ ๋ถํฌ์ ์คํ๊ฐ์ธ ๊ฒฝ์ฐ์ด๋ค.
ํด๋ผ ๋ถํธ๋ฅผ ์ด์ฉํ์ฌ ๊ฒฐ์ ์ ์ธ ๊ฒฝ์ฐ์ ๋๋คํ ์คํ๊ฐ์ผ๋ก ์ฃผ์ด์ง๋ ๋ชจ๋ ๊ฒฝ์ฐ์ ๋ํ์ฌ ํ๊ท ์ฑ๋ ์ฉ๋์ ๋ฌ์ฑ ํ ์์์์ ์ฆ๋ช
ํ๋ค.
์ด์ ๋ํด ๊ฒฐ์ ์ ์ฑ๋ ํ๋ผ๋ฏธํฐ๊ฐ ๊ฐ์ ๋ ์์คํ
์์ ์ฑ๋ ์
๋ ฅ์ผ๋ก ์ฌ์ฉ๋๋ ์ ๋ณด ๋ฒกํฐ์ ์นํ ์ฐ์ฐ์ ์ค์์ฑ์ ๋ํ์ฌ ๋
ผํ๋ค.
์ ์ ํ ์นํ ์ฐ์ฐ์ ์ด๋ก ์ ์ํ๊ฐ์ธ ์ฑ๋์ฉ๋์ ๋ํ ์๋ ด์๋๋ฅผ ํฅ์ ์ํฌ์ ์์์ ์์๋ฅผ ํตํด ๋ณด์ด๊ณ ํด๋ฆฌ์คํฑ ์นํ ์๊ณ ๋ฆฌ์ฆ์ ๊ฐ๋ฐํ์ฌ
๋ฌ์ฑ ์ ์ก๋ฅ ๋๋ ์์คํ
์ ๋ขฐ๋๋ฅผ ํฅ์ ์ํฌ์ ์์์ ๋ณด์ธ๋ค.
Part II์์๋ ํด๋ผ ๋ถํธ์ ์ธ๋ฑ์ค ๋ถํธ๋ฅผ ์ ํฉ์์ผ ์ผ์ข
์ ์ฐ๊ณ๋ ์์ค-์ฑ๋ ๋ถํธ ์ค๊ณ ๊ธฐ๋ฒ์ ๊ฐ๋ฐํ๊ณ ์ ์๋ ๊ธฐ๋ฒ์ด ์ต์ ์ ์ ์ก๋ฅ ์ ๋ฌ์ฑํจ์ ๋ณด์ธ๋ค.
๋จผ์ ์ธ๋ฑ์ค ๋ถํธ์์ ์์ ๋
ธ๋์์ ์ก์ ๋
ธ๋๋ก ์ ๋ฌ๋๋ ๋ถ๊ฐ์ ๋ณด๋ฅผ ํตํด ๊ทธ๋ ค์ง๋ ๊ทธ๋ํ๊ฐ ์์ ๊ทธ๋ํ์ผ๋ ํญ์ ์ต์ ์ ๋ฌ์ฑ ๊ธฐ๋ฒ์ด ์กด์ฌํจ์ ๋ณด์ด๊ณ ,
์ด๋ฅผ ์์์ ๋ถ๊ฐ์ ๋ณด ํจํด์ด ์ฃผ์ด์ง๋ ๊ฒฝ์ฐ๋ก ํ์ฅํ๋ค.
์์ ๊ทธ๋ํ๊ฐ ๊ทธ๋ ค์ง๋ ๊ฒฝ์ฐ์ ๋ฌ๋ฆฌ ์์์ ํจํด์ผ๋ก ์ฃผ์ด์ง๋ ๊ฒฝ์ฐ๋ ๋ถ๊ฐ์ ๋ณด๋ค์ด ํน์ ์กฐ๊ฑด์ ๋ง์กฑํ๋ ๊ฒฝ์ฐ์ ํํ์ฌ ์ต์ ์ ์ก๋ฅ ์ ๋ฌ์ฑํ๊ฒ๋จ์ ๋ณด์ด๊ณ ์ด๋ฅผ ๋ง์กฑํ๋ ์ธ๋ฑ์ค-ํด๋ผ ๋ถํธ ์ค๊ณ ๊ธฐ๋ฒ์ ์ ์ํ๋ค.
๋ง์ง๋ง์ผ๋ก ๋ถ๊ฐ์ ๋ณด๊ฐ ๊ฒฐ์ ์ ์ผ๋ก ์ฃผ์ด์ง์ง ์๊ณ ์กด์ฌ์ฑ์ ํํํ๋ ํ๋ฅ ๋ก์จ ์ฃผ์ด์ง๋ ๊ฒฝ์ฐ ์ ์๋ ์ฐ๊ณ๊ธฐ๋ฒ์ ์ด์ฉํ ํ๊ท ์ ์ก๋ฅ ์ ๋ํ์ฌ ๋
ผํ๋ค.Abstract i
Contents iv
List of Figures viii
List of Tables xii
I Polar codes for Non i.i.d. Parallel channels 1
Chapter 1 Introduction
1.1 Backgrounds
1.2 Scope and Organization
Chapter 2 Polar codes with deterministic non-identically distributed channels
2.1 Non-identical channels with deterministic CP
2.1.1 The evolution of Symmetric Capacities
2.1.2 Achievable Scheme based on the symmetric capacity
2.1.3 The evolution of Bhattacharayya Parameters
2.1.4 Supermartingale Zn
2.1.5 Convergence of Zn
2.2 Channel mapping via the Interleaver Q
2.2.1 Exhaustive Search Method with Grouping
2.2.2 Heuristic method
2.3 Link failures: Puncturing operation
2.4 Polarizations on non-independent channels
2.5 Summary
Chapter 3 Non-identical Binary Erasure Channels with random Erasure
probabilities with Single distribution
3.1 Non-identical Binary Erasure Channels with random Erasure probabilities
with Single distribution
3.1.1 Proof of Theorem 2
3.1.2 The Achievable Polar coding scheme
3.2 Random Erasure probabilities with non-identical distributions
3.2.1 Case1: Variable coding structure
3.2.2 Case2: Fixed coding structure
3.3 Summary
II Polar codes schemes for Index Coded Systems
Chapter 4 Nested Polar codes structures for Index codes
4.1 Introduction to Index codes
4.2 Nested structures for NC and Polar codes
4.3 ICPC for fully connected SI
4.3.1 General channel setting
4.3.2 Degraded channel setting
4.3.3 IC gain analysis
4.4 ICPC for Arbitrary SI
4.4.1 Proof of the Lemma 6
4.4.2 Proof of the Theorem 5
4.4.3 Achievable ICPC scheme for degraded structures
4.4.4 Proof of the Corollary 2
4.4.5 The ICPC scheme
4.4.6 Example: Partially Perfect Graph
4.5 ICPC for Probabilistic Side Information
4.5.1 Random ICPC for non-identical B-DMCs
4.5.2 Expected rate maximization
4.5.3 Expected achievable rate via Random graph
4.6 Summary
Chapter 5 Conclusions 121
Appendix A
A.1 Proof of (2.25)
A.2 Proof of (2.36)
A.3 Proof of (2.37)
A.4 Proof of the number of equivalent channel combinations
Bibliography
Abstract in Korean 138Docto
Automatic Extraction and Assessment of Entities from the Web
The search for information about entities, such as people or movies, plays an increasingly important role on the Web. This information is still scattered across many Web pages, making it more time consuming for a user to ๏ฌnd all relevant information about an entity. This thesis describes techniques to extract entities and information about these entities from the Web, such as facts, opinions, questions and answers, interactive multimedia objects, and events. The ๏ฌndings of this thesis are that it is possible to create a large knowledge base automatically using a manually-crafted ontology. The precision of the extracted information was found to be between 75โ90 % (facts and entities respectively) after using assessment algorithms. The algorithms from this thesis can be used to create such a knowledge base, which can be used in various research ๏ฌelds, such as question answering, named entity recognition, and information retrieval