9 research outputs found

    Expander Chunked Codes

    Full text link
    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks, and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance,where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 percent of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.Comment: 26 pages, 3 figures, submitted for journal publicatio

    Batched Sparse Codes

    Full text link
    Network coding can significantly improve the transmission rate of communication networks with packet loss compared with routing. However, using network coding usually incurs high computational and storage costs in the network devices and terminals. For example, some network coding schemes require the computational and/or storage capacities of an intermediate network node to increase linearly with the number of packets for transmission, making such schemes difficult to be implemented in a router-like device that has only constant computational and storage capacities. In this paper, we introduce BATched Sparse code (BATS code), which enables a digital fountain approach to resolve the above issue. BATS code is a coding scheme that consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code. It works with the inner code that comprises random linear coding at the intermediate network nodes. BATS codes preserve such desirable properties of fountain codes as ratelessness and low encoding/decoding complexity. The computational and storage capacities of the intermediate network nodes required for applying BATS codes are independent of the number of packets for transmission. Almost capacity-achieving BATS code schemes are devised for unicast networks, two-way relay networks, tree networks, a class of three-layer networks, and the butterfly network. For general networks, under different optimization criteria, guaranteed decoding rates for the receiving nodes can be obtained.Comment: 51 pages, 12 figures, submitted to IEEE Transactions on Information Theor

    ๋น„๋™์ผ ๋ถ„ํฌ ๋ณ‘๋ ฌ ์ฑ„๋„์„ ์œ„ํ•œ ํด๋ผ ๋ถ€ํ˜ธ ๊ธฐ๋ฒ•๊ณผ ์ธ๋ฑ์Šค ์ฝ”๋“œ๋ฅผ ์œ„ํ•œ ์—ฐ๊ณ„ ํด๋ผ ๋ถ€ํ˜ธ ์„ค๊ณ„ ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2015. 8. ์ด์ •์šฐ.๋ณธ ๋…ผ๋ฌธ์€ Part I์˜ ๋น„๋™ํ˜• ๋Œ€์นญ ์ด์ง„ ์ด์‚ฐ ๋ฌด๊ธฐ์–ต ์ฑ„๋„์—์„œ ์ฑ„๋„ ์šฉ๋Ÿ‰์„ ๋‹ฌ์„ฑ ํ•˜๋Š” ํด๋ผ ๋ถ€ํ˜ธ์˜ ์„ค๊ณ„ ๊ธฐ๋ฒ• ๋ฐ ์ฆ๋ช…๊ณผ Part II์˜ ๋น„๋™ํ˜• ์ด์ง„ ๋…๋ฆฝ ๋ฌด๊ธฐ์–ต ์ฑ„๋„์—์„œ ์ธ๋ฑ์Šค ๋ถ€ํ˜ธ์™€ ํด๋ผ ๋ถ€ํ˜ธ์˜ ์—ฐ๊ณ„๊ธฐ๋ฒ•์„ ํ†ตํ•œ ์ตœ์ ์˜ ์ „์†ก๋ฅ ์„ ๋‹ฌ์„ฑํ•˜๋Š” ์—ฐ๊ณ„ ๊ธฐ๋ฒ•์— ๋Œ€ํ•œ ์„ค๊ณ„๋กœ ๊ตฌ์„ฑ๋œ๋‹ค. Part I์—์„œ๋Š” ๋จผ์ € ๊ฐ ์ฑ„๋„์˜ ํ†ต๊ณ„์  ํŠน์„ฑ์„ ๋Œ€๋ณ€ํ•˜๋Š” ์ฑ„๋„ ํŒŒ๋ผ๋ฏธํ„ฐ๊ฐ€ ๊ฒฐ์ •์ ์ธ ํ˜•ํƒœ๋กœ ๋ถ€ํ˜ธ๊ธฐ์™€ ๋ณตํ˜ธ๊ธฐ์— ์ฃผ์–ด์ง€๋Š” ๊ฒฝ์šฐ๋Œ€ ๋Œ€ํ•ด ๋‹ค๋ฃจ๋ฉฐ, ๋‘๋ฒˆ์งธ๋กœ ์ด ํŒŒ๋ผ๋ฏธํ„ฐ๋“ค์ด ๊ฒฐ์ •์ ์ด ์•„๋‹Œ ๋žœ๋คํ•œ ๊ฐ’์œผ๋กœ์จ ์ฃผ์–ด์ง€๋Š” ๊ฒฝ์šฐ์— ๋Œ€ํ•˜์—ฌ ์ ํ•ฉํ•œ ํด๋ผ ๋ถ€ํ˜ธ ๊ธฐ๋ฒ•์— ๋Œ€ํ•ด ๊ธฐ์ˆ ํ•œ๋‹ค. ํ›„์ž๋Š” ๋‹ค์‹œ ๋‘๊ฐ€์ง€์˜ ํ•˜์œ„ ๊ฒฝ์šฐ๋กœ ๋‚˜๋‰˜๋Š”๋ฐ ํ•˜๋‚˜๋Š” ๋ชจ๋“  ํŒŒ๋ผ๋ฏธํ„ฐ๋“ค์ด ๋‹จ ํ•˜๋‚˜์˜ ํ™•๋ฅ  ๋ถ„ํฌ์— ๋Œ€ํ•œ ์‹คํ˜„๊ฐ’์ธ ๊ฒฝ์šฐ์ด๊ณ , ๋˜๋‹ค๋ฅธ ํ•œ๊ฐ€์ง€๋Š” ๊ฐ ํŒŒ๋ผ๋ฏธํ„ฐ๋“ค์ด ๊ฐ๊ฐ์˜ ์„œ๋กœ ๋‹ค๋ฅธ ํ™•๋ฅ  ๋ถ„ํฌ์˜ ์‹คํ˜„๊ฐ’์ธ ๊ฒฝ์šฐ์ด๋‹ค. ํด๋ผ ๋ถ€ํ˜ธ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฒฐ์ •์ ์ธ ๊ฒฝ์šฐ์™€ ๋žœ๋คํ•œ ์‹คํ˜„๊ฐ’์œผ๋กœ ์ฃผ์ด์ง€๋Š” ๋ชจ๋“  ๊ฒฝ์šฐ์— ๋Œ€ํ•˜์—ฌ ํ‰๊ท  ์ฑ„๋„ ์šฉ๋Ÿ‰์„ ๋‹ฌ์„ฑ ํ• ์ˆ˜์žˆ์Œ์„ ์ฆ๋ช…ํ•œ๋‹ค. ์ด์— ๋”ํ•ด ๊ฒฐ์ •์  ์ฑ„๋„ ํŒŒ๋ผ๋ฏธํ„ฐ๊ฐ€ ๊ฐ€์ •๋œ ์‹œ์Šคํ…œ์—์„œ ์ฑ„๋„ ์ž…๋ ฅ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” ์ •๋ณด ๋ฒกํ„ฐ์˜ ์น˜ํ™˜ ์—ฐ์‚ฐ์˜ ์ค‘์š”์„ฑ์— ๋Œ€ํ•˜์—ฌ ๋…ผํ•œ๋‹ค. ์ ์ ˆํ•œ ์น˜ํ™˜ ์—ฐ์‚ฐ์„ ์ด๋ก ์  ์ƒํ•œ๊ฐ’์ธ ์ฑ„๋„์šฉ๋Ÿ‰์— ๋Œ€ํ•œ ์ˆ˜๋ ด์†๋„๋ฅผ ํ–ฅ์ƒ ์‹œํ‚ฌ์ˆ˜ ์žˆ์Œ์„ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๋ณด์ด๊ณ  ํœด๋ฆฌ์Šคํ‹ฑ ์น˜ํ™˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๊ฐœ๋ฐœํ•˜์—ฌ ๋‹ฌ์„ฑ ์ „์†ก๋ฅ  ๋˜๋Š” ์‹œ์Šคํ…œ ์‹ ๋ขฐ๋„๋ฅผ ํ–ฅ์ƒ ์‹œํ‚ฌ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ธ๋‹ค. Part II์—์„œ๋Š” ํด๋ผ ๋ถ€ํ˜ธ์™€ ์ธ๋ฑ์Šค ๋ถ€ํ˜ธ๋ฅผ ์ ‘ํ•ฉ์‹œ์ผœ ์ผ์ข…์˜ ์—ฐ๊ณ„๋œ ์†Œ์Šค-์ฑ„๋„ ๋ถ€ํ˜ธ ์„ค๊ณ„ ๊ธฐ๋ฒ•์„ ๊ฐœ๋ฐœํ•˜๊ณ  ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์ด ์ตœ์ ์˜ ์ „์†ก๋ฅ ์„ ๋‹ฌ์„ฑํ•จ์„ ๋ณด์ธ๋‹ค. ๋จผ์ € ์ธ๋ฑ์Šค ๋ถ€ํ˜ธ์—์„œ ์ˆ˜์‹ ๋…ธ๋“œ์—์„œ ์†ก์‹ ๋…ธ๋“œ๋กœ ์ „๋‹ฌ๋˜๋Š” ๋ถ€๊ฐ€์ •๋ณด๋ฅผ ํ†ตํ•ด ๊ทธ๋ ค์ง€๋Š” ๊ทธ๋ž˜ํ”„๊ฐ€ ์™„์ „๊ทธ๋ž˜ํ”„์ผ๋•Œ ํ•ญ์ƒ ์ตœ์ ์˜ ๋‹ฌ์„ฑ ๊ธฐ๋ฒ•์ด ์กด์žฌํ•จ์„ ๋ณด์ด๊ณ , ์ด๋ฅผ ์ž„์˜์˜ ๋ถ€๊ฐ€์ •๋ณด ํŒจํ„ด์ด ์ฃผ์–ด์ง€๋Š” ๊ฒฝ์šฐ๋กœ ํ™•์žฅํ•œ๋‹ค. ์™„์ „ ๊ทธ๋ž˜ํ”„๊ฐ€ ๊ทธ๋ ค์ง€๋Š” ๊ฒฝ์šฐ์™€ ๋‹ฌ๋ฆฌ ์ž„์˜์˜ ํŒจํ„ด์œผ๋กœ ์ฃผ์–ด์ง€๋Š” ๊ฒฝ์šฐ๋Š” ๋ถ€๊ฐ€์ •๋ณด๋“ค์ด ํŠน์ • ์กฐ๊ฑด์„ ๋งŒ์กฑํ•˜๋Š” ๊ฒฝ์šฐ์— ํ•œํ•˜์—ฌ ์ตœ์  ์ „์†ก๋ฅ ์„ ๋‹ฌ์„ฑํ•˜๊ฒŒ๋จ์„ ๋ณด์ด๊ณ  ์ด๋ฅผ ๋งŒ์กฑํ•˜๋Š” ์ธ๋ฑ์Šค-ํด๋ผ ๋ถ€ํ˜ธ ์„ค๊ณ„ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ๋ถ€๊ฐ€์ •๋ณด๊ฐ€ ๊ฒฐ์ •์ ์œผ๋กœ ์ฃผ์–ด์ง€์ง€ ์•Š๊ณ  ์กด์žฌ์„ฑ์„ ํ‘œํ˜„ํ•˜๋Š” ํ™•๋ฅ ๋กœ์จ ์ฃผ์–ด์ง€๋Š” ๊ฒฝ์šฐ ์ œ์•ˆ๋œ ์—ฐ๊ณ„๊ธฐ๋ฒ•์„ ์ด์šฉํ•œ ํ‰๊ท  ์ „์†ก๋ฅ ์— ๋Œ€ํ•˜์—ฌ ๋…ผํ•œ๋‹ค.Abstract i Contents iv List of Figures viii List of Tables xii I Polar codes for Non i.i.d. Parallel channels 1 Chapter 1 Introduction 1.1 Backgrounds 1.2 Scope and Organization Chapter 2 Polar codes with deterministic non-identically distributed channels 2.1 Non-identical channels with deterministic CP 2.1.1 The evolution of Symmetric Capacities 2.1.2 Achievable Scheme based on the symmetric capacity 2.1.3 The evolution of Bhattacharayya Parameters 2.1.4 Supermartingale Zn 2.1.5 Convergence of Zn 2.2 Channel mapping via the Interleaver Q 2.2.1 Exhaustive Search Method with Grouping 2.2.2 Heuristic method 2.3 Link failures: Puncturing operation 2.4 Polarizations on non-independent channels 2.5 Summary Chapter 3 Non-identical Binary Erasure Channels with random Erasure probabilities with Single distribution 3.1 Non-identical Binary Erasure Channels with random Erasure probabilities with Single distribution 3.1.1 Proof of Theorem 2 3.1.2 The Achievable Polar coding scheme 3.2 Random Erasure probabilities with non-identical distributions 3.2.1 Case1: Variable coding structure 3.2.2 Case2: Fixed coding structure 3.3 Summary II Polar codes schemes for Index Coded Systems Chapter 4 Nested Polar codes structures for Index codes 4.1 Introduction to Index codes 4.2 Nested structures for NC and Polar codes 4.3 ICPC for fully connected SI 4.3.1 General channel setting 4.3.2 Degraded channel setting 4.3.3 IC gain analysis 4.4 ICPC for Arbitrary SI 4.4.1 Proof of the Lemma 6 4.4.2 Proof of the Theorem 5 4.4.3 Achievable ICPC scheme for degraded structures 4.4.4 Proof of the Corollary 2 4.4.5 The ICPC scheme 4.4.6 Example: Partially Perfect Graph 4.5 ICPC for Probabilistic Side Information 4.5.1 Random ICPC for non-identical B-DMCs 4.5.2 Expected rate maximization 4.5.3 Expected achievable rate via Random graph 4.6 Summary Chapter 5 Conclusions 121 Appendix A A.1 Proof of (2.25) A.2 Proof of (2.36) A.3 Proof of (2.37) A.4 Proof of the number of equivalent channel combinations Bibliography Abstract in Korean 138Docto

    Automatic Extraction and Assessment of Entities from the Web

    Get PDF
    The search for information about entities, such as people or movies, plays an increasingly important role on the Web. This information is still scattered across many Web pages, making it more time consuming for a user to ๏ฌnd all relevant information about an entity. This thesis describes techniques to extract entities and information about these entities from the Web, such as facts, opinions, questions and answers, interactive multimedia objects, and events. The ๏ฌndings of this thesis are that it is possible to create a large knowledge base automatically using a manually-crafted ontology. The precision of the extracted information was found to be between 75โ€“90 % (facts and entities respectively) after using assessment algorithms. The algorithms from this thesis can be used to create such a knowledge base, which can be used in various research ๏ฌelds, such as question answering, named entity recognition, and information retrieval
    corecore