Skip to main content

Showing 1–5 of 5 results for author: No, J

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.13413  [pdf, other

    cs.IT cs.LG eess.SP

    Boosted Neural Decoders: Achieving Extreme Reliability of LDPC Codes for 6G Networks

    Authors: Hee-Youl Kwak, Dae-Young Yun, Yongjune Kim, Sang-Hyo Kim, Jong-Seon No

    Abstract: Ensuring extremely high reliability is essential for channel coding in 6G networks. The next-generation of ultra-reliable and low-latency communications (xURLLC) scenario within 6G networks requires a frame error rate (FER) below 10-9. However, low-density parity-check (LDPC) codes, the standard in 5G new radio (NR), encounter a challenge known as the error floor phenomenon, which hinders to achie… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: 12 pages, 11 figures

  2. arXiv:2105.08114  [pdf, ps, other

    cs.IT eess.SP

    Weakly Private Information Retrieval Under Rényi Divergence

    Authors: Jun-Woo Tak, Sang-Hyo Kim, Yongjune Kim, Jong-Seon No

    Abstract: Private information retrieval (PIR) is a protocol that guarantees the privacy of a user who is in communication with databases. The user wants to download one of the messages stored in the databases while hiding the identity of the desired message. Recently, the benefits that can be obtained by weakening the privacy requirement have been studied, but the definition of weak privacy needs to be elab… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  3. Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm

    Authors: Seong-Joon Park, Yongwoo Lee, Jong-Seon No

    Abstract: In this paper, we propose a novel iterative encoding algorithm for DNA storage to satisfy both the GC balance and run-length constraints using a greedy algorithm. DNA strands with run-length more than three and the GC balance ratio far from 50\% are known to be prone to errors. The proposed encoding algorithm stores data at high information density with high flexibility of run-length at most $m$ a… ▽ More

    Submitted 1 August, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 19 pages

    Journal ref: J. Commun. Netw., vol. 24, issue 3, Jun. 2022

  4. arXiv:1810.04325  [pdf, other

    eess.SP

    Analysis of Maximal Topologies Achieving Optimal DoF and DoF $\frac{1}{n}$ in Topological Interference Management

    Authors: Jong-Yoon Yoon, Jong-Seon No

    Abstract: Topological interference management (TIM) can obtain degrees of freedom (DoF) gains with no channel state information at the transmitters (CSIT) except topological information of network in the interference channel. It was shown that TIM achieves the optimal symmetric DoF when internal conflict does not exist among messages. However, it is difficult to assure whether a specific topology can achiev… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

  5. arXiv:1810.02506  [pdf, other

    eess.SP

    Uplink Time Scheduling with Power Level Modulation in Wireless Powered Communication Networks

    Authors: Yeongwoo Ko, Sang-Hyo Kim, Jong-Seon No

    Abstract: In this paper, we propose downlink signal design and optimal uplink scheduling for the wireless powered communication networks (WPCNs). Prior works give attention to resource allocation in a static channel because users are equipped with only energy receiver and users cannot update varying uplink schedulling. For uplink scheduling, we propose a downlink signal design scheme, called a power level m… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.