DOI QR코드

DOI QR Code

제주 정낭 채널 Code II

Jeju Jong Nang Channel Code II

  • Lee, Moon Ho (Department of Electronic Engineering, Chonbuk National University) ;
  • Khan, Md. Hashem Ali (Department of Electronic Engineering, Chonbuk National University) ;
  • Park, Ju Yong (Department of Internet Information and Communication, Shyngyeong University)
  • 투고 : 2012.06.07
  • 발행 : 2012.12.25

초록

"제주 정낭 Code I"에서는 배경과 역사 그리고 물리적 의미에 대해 알아보았고, 본 논문에서는 디지털 휴먼 이진 코드인 한국의 제주도 전통에서 나무문으로 쓰인 정낭 정보통신의 뿌리를 소개하면서 AWGN 모델과 비슷한 정낭 결정 채널 모델을 조사하고, 채널 용량 분석에 접근하는 결정적 모델을 찾는 것을 목표로 한다. 또한 이 분석은 AWGN 모델의 용량에 대한 이해를 제공한다. 정낭 정보통신은 가족의 행방을 전달 위해 세 구멍으로 두 수직 돌에 3개의 서까래를 놓은 것으로 결정적인 신호이다. 따라서 정낭 채널 코드는 이동통신 기지국간 Backhaul에 사용됨을 보인다.

We had introduced the backgrounds, history and physical meanings of Jong Nang in "Jeju Jong Nang Channel Code I". In this paper, we introduce practical the root of digital human binary coded Jong Nang communications as the wooden gate in Korea Jeju Island custom. We investigate Jong Nang gatemodels as an approximation of the AWGN model. The objective is to find a deterministic model, which is accessible to capacity analysis. Furthermore, this analysis should provide insights on the capacity of the AWGN model. Motivated by backhaul cooperation in cellular networks where cooperation is among base stations, we term the interference channel with conferencing transmitters. Jong Nang communicationsis normal 3 rafters placed on two vertical stones with three holes to convey the family's whereabouts that is deterministic signal, nowadays it is applied to backhaul in mobile base station and traffic signal.

키워드

참고문헌

  1. M. H. Lee, "Jong Nang", EXPO '93 Information & Telecom., Pavilion poster , 1993.
  2. M. H. Lee, The History of Information and Communication, Kimyeong-Sa, Seoul, 1994.
  3. M. H. Lee, "Jong Nang: The symbol of digital communication and Ying and Yang," Telecom, vol. 9, no. 1, 1993.
  4. M. H. Lee, "Jong Nang System," Patent, no. 133285, Korea ,1998.
  5. M. H. Lee, "The History of Jeju Jong Nang Binary Code," IEEE VTS News, vol. 50, no. 1, 2003.
  6. M. H. Lee, X. Jiang, C.H. Choe, S. H. Kim, "Analysis of Jong Nang Multiple Access Channel," ISITA 2006, Seoul, Korea, 2006.
  7. T. M. Cover, J. A. Thomas, Elements of Information Theory, John Wiley & Sons, New York , 1991.
  8. C. E. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, vol. 27, pp. 379-423 and 623-656 , 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
  9. N. Schrammar, "On Deterministic Models for Wireless Networks," Licentiate Thesis in Telecommunications Stockholm, Sweden 2011.
  10. A. Salman, D. Suhas, D. Tse, "A Deterministic Approaches to Wireless Relay Networks", ISIT2007, 2007.
  11. C. Suh, D. Tse, "Symmetric Feedback Capacity of the Gaussian Interference Channel to within One Bit," ISIT 2009, Seoul, Korea, 2009.
  12. I. H. Wang, D. Tse, "Interference Mitigation through Limited Transmitter Cooperation," IEEE Trans. on Information Theory, vol. 57, no. 5, May 2011.
  13. A. El Gamal, Y. H. Kim, Network Information Theory, Cambridge University Press, 2011.
  14. B. Bandemer, A El Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. Information Theory, vol. 57, no. 5, May 2011.
  15. S.A Jafar, "Interference Alignments," Globecom 2012 Tutorial, 7 Dec 2012.
  16. Moon Ho Lee, Jacket Matrices : Constructions and Its Applications for Fast Cooperative Wireless Signal Processing, LAP LAMBERT Academic Publishing, Germany, 1 Dec 2012