DOI QR코드

DOI QR Code

Jeju Jong-Nang Channel Code III

제주 정낭(錠木) 채널 Code III

  • 박주용 (신경대학교 인터넷정보통신학과) ;
  • 김정수 (숭실사이버대학교 컴퓨터정보통신학과) ;
  • 이문호 (전북대학교 전자정보공학부)
  • Received : 2015.07.22
  • Accepted : 2015.10.09
  • Published : 2015.10.31

Abstract

This paper presents "The 3-User NOR switching channel based on interference decoding with receiver cooperation" in succession to "Jeju Jong Nang channel code I, II". The Jeju Jong Nang code is considered as one of the earliest human binary coded communication (HBCC) in the world with a definite "1" or "0" binary symbolic analysis of switching circuits. In this paper, we introduce a practical example of interference decoding with receiver cooperation based on the three user Jong Nang NOR switching channel. The proposed system models are the three user Jong Nang (TUJN) NOR logic switching on-off, three-user injective deterministic NOR switching channel and Gaussian interference channel (GIC) with receiver cooperation. Therefore, this model is well matched to Shannon binary symmetric and erasure channel capacity. We show the applications of three-user Gaussian interference decoding to obtain deterministic channels which means each receiver cooperation helps to adjacent others in order to increase degree of freedom. Thus, the optimal sum rate of interference mitigation through adjacent receiver cooperation achieves 7 bits.

본 논문은 제주 정낭 채널 code I, II에 이은 "수신기 협력을 이용한 간섭 디코딩 기반 3-user NOR 스위칭 채널"을 다루고 있다. 제주 정낭 코드 (Jeju Jong Nang code) 는 스위칭 회로를 "1" 또는 "0" 의 이진 심볼로 해석하는 인류 최초의 HBCC (human binary coded communication)로 여겨진다. 본 논문에서는 3-user 정낭 NOR 스위칭 채널 기반 수신기 협력 간섭 디코딩의 실제적인 예를 소개한다. 제안한 시스템 모델은 TUJN (three user Jong Nang) NOR 스위칭 on-off 로직과 3-user 결정적 (deterministic) NOR 스위칭 채널 및 수신기 협력 GIC (Gaussian interference channel)로 구성되어 있다. 따라서 이 모델은 Shannon의 이진 시스템과 erasure 채널 용량에도 잘 맞는다. 또한 자유도를 증가시키기 위해 각 협력 수신기가 이웃 수신기들을 도울 수 있다는 의미의 결정적 채널을 얻기 위한 3-user Gaussian 간섭 디코딩의 응용 예를 제시하고, 이웃 수신기 협력을 통한 최적 간섭 완화 sum rate이 7 bits에 달한다.

Keywords

References

  1. C. E. Shannon, "A Symbolic Analysis of Relayed Switching Circuits," Trans. AIEE, vol. 57, pp. 713-723, 1938.
  2. C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
  3. R. G. Gallager, Information Theory and Reliable Communication, John Wiley & Sons, Inc. 1968.
  4. A. E. Gamal and M. Costa, "The Capacity Region of a Class of Deterministic Interference Channels," IEEE Trans. Inf. Theory, vol. 2, March 1982.
  5. M. H. M. Costa, "On the Gaussian Interference Channel," IEEE Trans. on Inf. Theory, vol. 31, no. 5, September 1985.
  6. T. M. Cover, J. a. Thomas, Elements of Information Theory, Wiley & Sons, Inc., Publication, 1991.
  7. T. S. Han and K. Kobayashi, "A New Achievable Rate Region for the Interference Channel," IEEE Trans. Inf. Theory, vol. IT-27, pp. 49-60, Jan. 1981.
  8. R. G. Gallager, "C. E. Shannon: A Retrospective on His Life, Work, and Impact," IEEE Trans. on Inf. Theory, vol. 47, no. 7, Nov., 2001.
  9. M. H. Lee, "The History of Jeju Jong Nang Binary Code," IEEE Vehicular Technology Society (VTS) News, vol. 50, no. 1, 2003.
  10. D. Tse, P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005.
  11. M. H. Lee, X. Jiang, C.H. Choe, S. H. Kim, "Analysis of Jong Nang Multiple Access Channel," International Symposium on Information Theory and its Applications (ISITA), Seoul, Korea, 2006.
  12. A. Salman, D. Suhas, D. Tse, "A Deterministic Approaches to Wireless Relay Networks," International Symposium on Inf. Theory, Nice, France, June 24-27, 2007.
  13. G. Bresler, A. Parekh, and D. Tse, "The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels," Allerton Conf. on Communi., Control, and Computing, Monticello, IL, September 2007.
  14. G. Bresler and D.N.C. Tse, "The Two-User Gaussian Interference Channel: A Deterministic View," European Trans. on Telecommuni, June 2008.
  15. D. Tse and R. Yates, "Fading Broadcast Channels with State Information at the Receivers," Allerton Conference on Computing and Control, Sep. 2008.
  16. S. Sridharan, A. Jafarian, S. Vishwanath, S. A. Jafar, S. Shamai, "A Layered Lattice Coding Scheme for a Class of Three User Gaussian Interference Channels," Forty-Sixth Annual Allerton Conference, UIUC, Illinois, USA, Sept. 23-26, 2008.
  17. R. Etkin, D. N. C. Tse, and H. Wang, "Gaussian Interference Channel Capacity to within One Bit," IEEE Trans. Inf. Theory, vol. 54, pp. 5534-5562, Dec. 2008. https://doi.org/10.1109/TIT.2008.2006447
  18. Ke-Lin Du, M. N. S. Swamy, Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies, Cambridge University Press, 2010.
  19. S. Avestimehr, S. Diggavi, and D. N. C. Tse, "Wireless Network Information Flow: A Deterministic Approach," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1872-1905, 2011. https://doi.org/10.1109/TIT.2011.2110110
  20. N. Schrammar, "On Deterministic Models for Wireless Networks," Licentiate Thesis in Telecommunications Stockholm, Sweden 2011, June 8, 2014 19 DRAFT
  21. I-Hsiang Wang, David N.C Tse, "Interference Mitigation Through Limited Receiver Cooperation," IEEE Trans. on Inf. Theory, vol. 57, pp. 2931-2940, May, 2011.
  22. B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Inf. Theory, vol. 57, No. 5, May 2011.
  23. A. E. Gamal, Y. H. Kim, Network Information Theory, Cambridge University Press 2011.
  24. E. Metsala, J. Salmelin, Mobile Backhaul, Wiley, 2012.
  25. M. H. Lee, M. H. A. Khan, D. Park, "Analysis of a Deterministic Jong Nang Gate with Transmitter Cooperation," Int. J. of Wireless & Mobile Networks (IJWMN), vol. 4, no. 4, August 2012.
  26. A. Lozano, R. W. Heath, J. G. Andrews, "Fundamental Limits of Cooperation," IEEE Trans. on Inf. Theory, vol. 59, no. 9, pp. 5213- 5226, Sept. 2013. https://doi.org/10.1109/TIT.2013.2253153
  27. B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Info. Theory, vol. 57, no. 5, May 2011.
  28. Moon Ho Lee, "Jeju Jong Nang Channel Code I," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.27-35, December 2012.
  29. Moon Ho Lee, Md. Hashem Ali Khan and Ju Yong Park, "Jeju Jong Nang Channel Code II," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.36-44, December 2012.
  30. Y. S. Im, E. Y. Kang, "MPEG-2 Video Watermarking in Quantized DCT Domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 11, No. 1, pp. 81-86, 2011.
  31. I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.