The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decentralized coded caching is applicable in scenarios where the server does not have enough knowledge about the entire cache network to perform centralized coordination during prefetching, such as when the server is uninformed of the number of active users and their identities in a wireless or mobile environment. Most of known decentralized strategies use random uncoded prefetching followed by coded...
We consider the {n, k, d, l) secure exact-repair regenerating code problem, which generalizes the {n, k, d) exact-repair regenerating code problem with the additional constraint that the stored file needs to be kept information-theoretically secure against an eavesdropper, who can access the data transmitted to regenerate a total of l different failed nodes. For all known results on this problem,...
We present our recent effort, in the context of the caching systems, in developing a computer-aided approach in the investigation of information systems. Yeung's linear programming (LP) outer bound of the entropy space is our starting point, however our effort goes significantly beyond using it to prove information inequalities. A symmetry-reduced linear program is used to identify the boundary of...
We propose a generic transformation on maximum distance separable (MDS) codes, which can convert any non-binary (k+r, k) MDS code into another (k+r, k) MDS code with the following properties: 1) An arbitrarily chosen r nodes will have the optimal repair bandwidth and the optimal rebuilding access, 2) the repair bandwidth and rebuilding access efficiencies of all other nodes are maintained as in the...
Communication is a bottleneck for many distributed machine learning problems with large data sets. One effective approach is to exchange the set of good classifiers among the learners. The key challenge in such an approach is how to represent the set of good classifiers, which can be viewed as a source coding problem in communication systems. A nonuniform sampling framework is proposed for this source...
Small target detection at sea is an important issue for marine radar. The difficulty derives from the influence of sea clutter and the weak target's echo resulted from its small RCS. In order to solve these two problems, based on solid-state marine radar, the method combining time-frequency decorrelation for clutter and scan-to-scan noncoherent integration for target is proposed. The method firstly...
Based on the temporal-spatial stochastic radiation field, microwave staring correlated imaging (MSCI) can achieve high resolution reconstruction of the target. In MSCI, the traditional processing method has a bad real-time performance, which need to wait for all the echo signals and require matrix inversions. In this paper, we introduce the sequential least squares (SLS) method to improve the real-time...
Microwave staring correlated imaging (MSCI) can achieve super-resolution in real aperture staring radar imagery by employing temporal-spatial stochastic radiation field. To achieve better imaging performance, sparse reconstruction is commonly used based on the assumption that the scatters are positioned at the pre-discretized grids. However, off-grid problem degrades the performance of MSCI significantly...
Information inequalities can be used to bound the fundamental limits of communication systems and data storage systems. Information inequalities, particularly Shannon-type inequalities, and the problem-specific constraints are usually either linear equalities or inequalities of joint entropies, and thus outer bounding the fundamental limit can be viewed and solved as a linear program (LP). However,...
The notion of orbit-entropy cone is introduced. Specifically, orbit-entropy cone equation is the projection of equation induced by G, where equation is the closure of entropy region for n random variables and G is a permutation group over {0; 1;...; n−1}. For symmetric group Sn (with arbitrary n) and cyclic group Cn (with n ≤ 5), the associated orbit-entropy cones are shown to be characterized by...
A cyclically symmetric entropy inequality is of the form hO≥chO′, where hO and hO′ are two cyclic orbit entropy terms. A computational approach is formulated for bounding the extremal value of c̄, which is denoted by c̄O,O′. For two non-empty orbits O and O′ of a cyclic group, it is said that O dominates O′ if c̄O,O′ = 1. Special attention is paid to characterizing such dominance relationship, and...
We propose a new caching scheme where linear combinations of the file segments are cached at the users, for the scenarios where the number of files is no greater than the number of users. When a user requests a certain file in the delivery phase, the other file segments in the cached linear combinations can be viewed as interferences. The proposed scheme combines rank metric codes and maximum distance...
The fundamental limit of coded caching is considered in this work. We started with an investigation of the symmetry structure in the caching problem, which is used to show the existence of optimal symmetric solutions, as well as to motivate the notion of demand types. With a combination of analytical analysis using the symmetry and a computational approach developed earlier for the regenerating code...
In the 55nm technology node and beyond of integrated circuits, tungsten is used in contact layer interconnection. Before tungsten deposition, a contact glue layer consist of titanium and titanium nitride (Ti/TiN) is used to enhance adhesion, reduce resistance and prevent tungsten diffusion into the substrate. The growth condition of contact glue layer(s) determines the characteristic of gap fill tungstenfilm,...
Copper has been recognized as a more suitable interconnects material than aluminum because of its low electrical resistivity and excellent electromigration resistance. Nowadays, inter connect copper is realized by electroplating (ECP), and the ECP process consists of three steps: copper plating, edge bevel removal (EBR) and copper anneal. EBR is a process that using sulfuric acid and hydrogen peroxide...
The problem of multilevel diversity coding with regeneration is considered in this work. Two new outer bounds on the optimal tradeoffs between the normalized storage capacity and repair bandwidth are established, by which the optimality of separate coding at the minimum-bandwidth-regeneration (MBR) point follows immediately. This resolves a question left open in a previous work by Tian and Liu.
Bridges are one of the critical infrastructures which has significant influences on public safety and therefore the structural health of bridges remains a focal point of interest for the civil administration worldwide. In this paper, the design of a bridge health system is presented which integrates the structural monitoring with public safety and emergency management and response (EMR) capabilities...
This paper focuses on the correlation algorithm to realize high-resolution microwave staring correlated imaging (MSCI) in condition of large imaging area. Firstly, the imaging model applied in remote sensing is established, and the reduction of resolution caused by large imaging area is analysed. To solve the problem, we use multigrid (MG) method to solve the imaging equation in different scales,...
In this paper, Fuzzy Neural Network (FNN) is transformed into an equivalent Fully Connected Neuro-Fuzzy Inference System (F-CONFIS). The F-CONFIS is a new type of neural network that differs from traditional neural networks, which there are the dependent and repeated weights. For these special properties, its learning algorithm should be different from that of the conventional neural networks. Therefore,...
In this paper, based on the transformation from the fuzzy inference system into a fully connected neural network, F-CONFIS, the mixed radix systems in Fully Connected Neural Fuzzy Inference Systems are derived. The functional equivalence between a fuzzy system and a neural network has been proved, however, they are non-constructive. F-CONFIS provides constructive steps to build the equivalence between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.