Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),

Slides:



Advertisements
Similar presentations
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Advertisements

Degree Distribution of XORed Fountain codes
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Ali Husseinzadeh Kashan Spring 2010
Performance analysis of LT codes with different degree distribution
CS6800 Advanced Theory of Computation
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Experimental Design, Response Surface Analysis, and Optimization
Enhancing Secrecy With Channel Knowledge
CHAPTER 16 MARKOV CHAIN MONTE CARLO
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Threshold Phenomena and Fountain Codes
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
MAE 552 – Heuristic Optimization Lecture 6 February 6, 2002.
Two-Dimensional Channel Coding Scheme for MCTF- Based Scalable Video Coding IEEE TRANSACTIONS ON MULTIMEDIA,VOL. 9,NO. 1,JANUARY Yu Wang, Student.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
Information Theory Eighteenth Meeting. A Communication Model Messages are produced by a source transmitted over a channel to the destination. encoded.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
Genetic Programming.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Genetic Algorithm.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Introduction to Adaptive Digital Filters Algorithms
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Evolution Strategies Evolutionary Programming Genetic Programming Michael J. Watts
© Negnevitsky, Pearson Education, Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Evolution strategies Evolution.
Intro. ANN & Fuzzy Systems Lecture 36 GENETIC ALGORITHM (1)
Zorica Stanimirović Faculty of Mathematics, University of Belgrade
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Introduction to GAs: Genetic Algorithms How to apply GAs to SNA? Thank you for all pictures and information referred.
Neural and Evolutionary Computing - Lecture 6
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Genetic Algorithms Introduction Advanced. Simple Genetic Algorithms: Introduction What is it? In a Nutshell References The Pseudo Code Illustrations Applications.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Estimation of Number of PARAFAC Components
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
Sparse Signals Reconstruction Via Adaptive Iterative Greedy Algorithm Ahmed Aziz, Ahmed Salim, Walid Osamy Presenter : 張庭豪 International Journal of Computer.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Pei-Chuan Tsai Chih-Ming Chen Ying-ping Chen WCCI 2012 IEEE World Congress on Computational Intelligence Sparse Degrees Analysis for LT Codes Optimization.
Nonlinear differential equation model for quantification of transcriptional regulation applied to microarray data of Saccharomyces cerevisiae Vu, T. T.,
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
Genetic Algorithm Dr. Md. Al-amin Bhuiyan Professor, Dept. of CSE Jahangirnagar University.
Artificial Intelligence By Mr. Ejaz CIIT Sahiwal Evolutionary Computation.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Genetic Algorithm. Outline Motivation Genetic algorithms An illustrative example Hypothesis space search.
An improved LT encoding scheme with extended chain lengths
Who cares about implementation and precision?
Rate 7/8 (1344,1176) LDPC code Date: Authors:
Evolutionary Computation,
Stochastic Methods.
Presentation transcript:

Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC), 2010 IEEE Congress on On the Optimization of Degree Distributions in LT Code with Covariance Matrix Adaptation Evolution Strategy

Outline Introduction Optimization method Decision Variables Objectives Experiments and results

Introduction LT codes An appropriate degree distribution : soliton distribution Researchers started to optimize the degree distribution [5] [6] Only focus on the parameters of soliton distribution We directly consider the degree distribution itself as our decision variables [5] E. A. Bodine and M. K. Cheng, “Characterization of luby transform codes with small message size for low-latency decoding,” in IEEE International Conference on Communications (ICC ‘08), 2008, pp [6] E. Hyytia, T. Tirronen, and J. Virtamo, “Optimal degree distribution for LT codes with small message length,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), 2007, pp V2580.

Raptor codes Integrating LT code with a pre-coding layer Requiring a degree distribution, called weakened LT Several instances were given in [9] for certain particular sizes of source symbols. We demonstrate the use of optimization techniques proposed in evolutionary computation for generating degree distributions of different, desired properties. Introduction [9] A. Shokrollahi, ’’Raptor codes, ’’ IEEE Transactions on Information Theory, vol. 52, no. 6, pp , 2006

In this paper Utilizing evolutionary computation techniques to optimize the degree distribution for LT code. Demonstrating the feasibility of customizing degree distributions for different purposes. Particularly, we adopt the covariance matrix adaptation evolution strategy (CMA-ES) [10] To directly optimize degree distributions : Reducing the overhead Lowering the failure rate. The experimental results are remarkably promising

LT code : Soliton distribution After k processing step, the source data can be ideally recovered. The overhead = K/k denotes the performance of LT code k : the number of source symbols K: the number of encoding symbols received by receivers

LT code : Robust soliton distribution Robust soliton distribution can ensure that only encoding symbols are required with a successful probability at least

LT code

Optimization method Evolution strategies (ES) To evolve strategic parameters as well as decision variables Well-known to be quite capable of dealing with continuous optimization problems. Using natural problem-dependent representations, and primarily mutation and selection, as search operators. An iteration of the loop is called a generation. The sequence of generations is continued until a termination criterion is met.

ES Repeated interplay of variation (via mutation and recombination) and selection In each generation (iteration) new individuals (candidate solutions, denoted as x ) are generated by variation And then some individuals are selected for the next generation based on their fitness or objective function value Like this, over the generation sequence, individuals with better and better -values are generated. (1+1)-ES

Covariance Matrix Adaptation Evolution Strategy In an evolution strategy, new candidate solutions are sampled according to a multivariate normal distribution. Pairwise dependencies between the variables in multivariate normal distribution are represented by a covariance matrix. The covariance matrix adaptation (CMA) is a method to update the covariance matrix of this distribution. Fewer assumptions on the nature of the underlying objective function are made. CMA-ES

Decision Variables Using the degree distribution to form a real-number vector In the evaluation phase, a real-number vector of arbitrary values can be interpreted as a probability distribution. We usually do not need a non-zero probability on every single degree We choose some degrees called tags to form the vector v(i) of decision variables

Objectives We try to use two indicators to evaluate degree distributions for LT code The efficiency of the LT code with the optimized degree distribution ε denotes the expected rate of overhead to transmit data. This objective is to obtain some degree distribution for a specific k with the smallest ε. We provide infinite encoding symbols, in the form of a stream of encoding symbols, to simulate the decoding process until all source data are recovered.

Objectives The amount of source symbols that cannot be recovered when a constant ratio of encoding symbols are received. In raptor codes, Low-density-paritycheck (LDPC) [15] is introduced as a second layer pre-coding into LT code. LDPC can fix errors of data Most of source symbols can be recovered with a small overhead is sufficient. We try to minimize the number of un-recovered source symbols given a constant overhead ε.

Experiments and results Tags are encoded as an individual : v(i) Initial values of tags are set as 1/|v| uniformly Applying CMA-ES without any customization or modification One hundred independent runs of simulation for each function evaluation. Two experiments: Minimizing the expected number of encoding symbols for full decoding The average number of source symbols that cannot be recovered for a constant ε = 1.1 is considered

Overhead We minimize the overhead ε for different k sizes

The expected overhead of robust soliton distribution

Failure rate We are concerned with how many source symbols can be recovered in the second set of experiments. The objective value is the average number of source symbols that cannot be recovered with a constant overhead ε.

ε =1.1

Conclusion Algorithmically optimize the degree distribution adopted in LT code Evolutionary computation CMA-ES was indeed capable of finding good degree distributions for different purposes without any guideline or human intervention. Two sets of experiments: To minimize the overhead To reduce the decoding failure rate. The optimized overhead was decreased as least 10% The results of failure rate minimization were also remarkably promising