JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Jeju Jong-Nang Channel Code III
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Jeju Jong-Nang Channel Code III
Park, Ju-Yong; Kim, Jeong-Su; Lee, Moon-Ho;
  PDF(new window)
 Abstract
This paper presents "The 3-User NOR switching channel based on interference decoding with receiver cooperation" in succession to "Jeju Jong Nang channel code I, II". The Jeju Jong Nang code is considered as one of the earliest human binary coded communication (HBCC) in the world with a definite "1" or "0" binary symbolic analysis of switching circuits. In this paper, we introduce a practical example of interference decoding with receiver cooperation based on the three user Jong Nang NOR switching channel. The proposed system models are the three user Jong Nang (TUJN) NOR logic switching on-off, three-user injective deterministic NOR switching channel and Gaussian interference channel (GIC) with receiver cooperation. Therefore, this model is well matched to Shannon binary symmetric and erasure channel capacity. We show the applications of three-user Gaussian interference decoding to obtain deterministic channels which means each receiver cooperation helps to adjacent others in order to increase degree of freedom. Thus, the optimal sum rate of interference mitigation through adjacent receiver cooperation achieves 7 bits.
 Keywords
HBCC;3-User NOR Switching;TUJN;Interference Decoding;Genie Coding;
 Language
Korean
 Cited by
 References
1.
C. E. Shannon, "A Symbolic Analysis of Relayed Switching Circuits," Trans. AIEE, vol. 57, pp. 713-723, 1938.

2.
C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948. crossref(new window)

3.
R. G. Gallager, Information Theory and Reliable Communication, John Wiley & Sons, Inc. 1968.

4.
A. E. Gamal and M. Costa, "The Capacity Region of a Class of Deterministic Interference Channels," IEEE Trans. Inf. Theory, vol. 2, March 1982.

5.
M. H. M. Costa, "On the Gaussian Interference Channel," IEEE Trans. on Inf. Theory, vol. 31, no. 5, September 1985.

6.
T. M. Cover, J. a. Thomas, Elements of Information Theory, Wiley & Sons, Inc., Publication, 1991.

7.
T. S. Han and K. Kobayashi, "A New Achievable Rate Region for the Interference Channel," IEEE Trans. Inf. Theory, vol. IT-27, pp. 49-60, Jan. 1981.

8.
R. G. Gallager, "C. E. Shannon: A Retrospective on His Life, Work, and Impact," IEEE Trans. on Inf. Theory, vol. 47, no. 7, Nov., 2001.

9.
M. H. Lee, "The History of Jeju Jong Nang Binary Code," IEEE Vehicular Technology Society (VTS) News, vol. 50, no. 1, 2003.

10.
D. Tse, P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005.

11.
M. H. Lee, X. Jiang, C.H. Choe, S. H. Kim, "Analysis of Jong Nang Multiple Access Channel," International Symposium on Information Theory and its Applications (ISITA), Seoul, Korea, 2006.

12.
A. Salman, D. Suhas, D. Tse, "A Deterministic Approaches to Wireless Relay Networks," International Symposium on Inf. Theory, Nice, France, June 24-27, 2007.

13.
G. Bresler, A. Parekh, and D. Tse, "The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels," Allerton Conf. on Communi., Control, and Computing, Monticello, IL, September 2007.

14.
G. Bresler and D.N.C. Tse, "The Two-User Gaussian Interference Channel: A Deterministic View," European Trans. on Telecommuni, June 2008.

15.
D. Tse and R. Yates, "Fading Broadcast Channels with State Information at the Receivers," Allerton Conference on Computing and Control, Sep. 2008.

16.
S. Sridharan, A. Jafarian, S. Vishwanath, S. A. Jafar, S. Shamai, "A Layered Lattice Coding Scheme for a Class of Three User Gaussian Interference Channels," Forty-Sixth Annual Allerton Conference, UIUC, Illinois, USA, Sept. 23-26, 2008.

17.
R. Etkin, D. N. C. Tse, and H. Wang, "Gaussian Interference Channel Capacity to within One Bit," IEEE Trans. Inf. Theory, vol. 54, pp. 5534-5562, Dec. 2008. crossref(new window)

18.
Ke-Lin Du, M. N. S. Swamy, Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies, Cambridge University Press, 2010.

19.
S. Avestimehr, S. Diggavi, and D. N. C. Tse, "Wireless Network Information Flow: A Deterministic Approach," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1872-1905, 2011. crossref(new window)

20.
N. Schrammar, "On Deterministic Models for Wireless Networks," Licentiate Thesis in Telecommunications Stockholm, Sweden 2011, June 8, 2014 19 DRAFT

21.
I-Hsiang Wang, David N.C Tse, "Interference Mitigation Through Limited Receiver Cooperation," IEEE Trans. on Inf. Theory, vol. 57, pp. 2931-2940, May, 2011.

22.
B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Inf. Theory, vol. 57, No. 5, May 2011.

23.
A. E. Gamal, Y. H. Kim, Network Information Theory, Cambridge University Press 2011.

24.
E. Metsala, J. Salmelin, Mobile Backhaul, Wiley, 2012.

25.
M. H. Lee, M. H. A. Khan, D. Park, "Analysis of a Deterministic Jong Nang Gate with Transmitter Cooperation," Int. J. of Wireless & Mobile Networks (IJWMN), vol. 4, no. 4, August 2012.

26.
A. Lozano, R. W. Heath, J. G. Andrews, "Fundamental Limits of Cooperation," IEEE Trans. on Inf. Theory, vol. 59, no. 9, pp. 5213- 5226, Sept. 2013. crossref(new window)

27.
B. Bandemer, A. E. Gamal, "Interference Decoding for Deterministic Channels," IEEE Trans. on Info. Theory, vol. 57, no. 5, May 2011.

28.
Moon Ho Lee, "Jeju Jong Nang Channel Code I," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.27-35, December 2012.

29.
Moon Ho Lee, Md. Hashem Ali Khan and Ju Yong Park, "Jeju Jong Nang Channel Code II," Journal of The Institute of Electronics Engineers of Korea, vol. 49, no. 12, pp.36-44, December 2012.

30.
Y. S. Im, E. Y. Kang, "MPEG-2 Video Watermarking in Quantized DCT Domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 11, No. 1, pp. 81-86, 2011.

31.
I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.