SlideShare a Scribd company logo
1 of 21
Download to read offline
CJK Rules For The Root Zone
Kenny Huang, Ph.D. 黃勝雄博士
Member, CDNC / CGP
Co-author, RFC3743 IETF
Member, Executive Council, APNIC
Member, Board of Directors, TWNIC
huangksh@gmail.com
2014.Jun
Problem : CJK Is Complicated
2
PuttingCJKlabels in the root zone
is evenmore complicated
Institutionalized Problem Solving : Structure
3
Constraints for CJK LGR
4
Independent Tasks
Each CJK Panel creates an LGR
Each LGR includes a repertoire
and variants
Define labels permission
Define variants labels
Assign dispositions
•Allocatable
•Block
Coordination Tasks
If an LGR includes Han
characters:
The variant *mappings*
must agree for all the
panels
The variant *types* may be
different
The repertoires may be
different
*Presented by Lee Han Chuan & IP, Shanghai 2014 May 29
Overlap Case Illustration
5
壹
U58F9
弌
U5F0C
壱
U58F1
一
U4E00
allocate block block
Variant
Unicode
Disposition
一
U4E00
Variant
Unicode
Disposition
Chinese
LGR
Japanese
LGR
1 2 3
Integrate ?
Integrated Root Zone Label
Generation Rules
Rejected
Generation
Panel
F
T
High Level Conflict Strategies
6
ID Strategy Pros Cons Rank
1 Adopt X
Abandon Rcjk
Permit X No label rule
2 Adopt X
Intersection ∩ (Rcjk)
Permit X
Permit ∩(variants/disp)
Rules changed
3 Adopt X
Union ∪(Rcjk)
Permit X
Permit ∪(variants/disp)
Rules changed
4 Abandon X and Rcjk No conflict Label not available
5 Adopt rules based on
frequency of use
Fair & scientific
approach
Rules changed; fairness
doesn’t mean appropriate
CJK overlap
C: rule Rc
J : rule Rj
K: rule Rk
Unified CJK LGR Illustration
7
壹
U58F9
弌
U5F0C
壱
U58F1
一
U4E00
allocate block block
Variant
Unicode
Disposition
Chinese
LGR
1 2 3
一
U4E00
Variant
Unicode
Disposition
Japanese
LGR
壹
U58F9
弌
U5F0C
壱
U58F1
一
U4E00
allocate block block
Variant
Unicode
Disposition
Integrated
LGR
1 2 3
一
U4E00
Variant
Unicode
Disposition
Integrated
LGR
Union
Intersection
CJK Integration Methodology
Divide & Conquer (D&C)
Unified CJK Rules
Variant
Dispositions
Minimal Viable
Solution
CJK Rules
Root Zone Admin
Strategic Direction
Plan and Define
CJK Overlap
Resources
JK Overlap
CJ Usage Pattern
CJ Overlap
CK Usage Pattern
CK Overlap
Services
LGR
Constrains
Evaluation
Method
Diversified CJK DemandsRequires
C Demands
J Demands
8
Requires
Split
Merge
Splitting Non-overlapping Code Points From
Repertories
9
C/J
Overlap:
6181
C-Han : 19520 (CNNIC/TWNIC)
J-Han : 6356 (JPRS) K-Han : 0 (KRNIC)
Develop Conflict Strategy No conflict
Rc
Rk
Rj
13339
175
1
unified code points
13339
175
13514
+
CJK Han-overlap in IANA IDN Repository
Problem Domain (Unsolved Overlap) : 6181
Rc
Rj
Rk
Chinese LGR
Japanese LGR
Korean LGR
Engineering Design
10
2
TC : Apple News
SC : Sina News
JP : Mainichi News
Computation for Word Usage and Frequency
C/J overlap
code points
Matching
usage
frequency of
use
Split unused code points Split code points of
low frequency of use
Sample size is statistical significant
Splitting Unused Code Points from The Overlap
11
J only : 203
C only : 1927Rc
Rj
total unused : 2739
3
C / J Overlap Data Set : 6181
unified code points
2739
203
1927
4869
+
C / J usage
overlap : 1312
total used : 3442
Problem Domain (Unsolved Overlap) : 1312
Computing Frequency of Use of Code Points
12
4
Initial Data Set : 1312
Top 10 Most Popular Words
13
的, 2774
人, 1005
在, 975
一, 964
是, 960
不, 951
中, 896
有, 883
大, 776
台, 718
TC
日, 20942
月, 20315
人, 4430
国, 3754
中, 3521
被, 2791
称, 2340
地, 2226
南, 2152
生, 2027
SC
日, 822
年, 496
国, 393
会, 345
月, 325
人, 325
大, 319
市, 253
本, 251
中, 250
JP
14
4.063
4.1884
1.7338
0.6 0.6094
0.886
0.55820.59440.5518
0.468
0.7042
0.4304
0.6026
0.4488
0.36 0.35620.4026 0.385
0.7508
0.325
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
C-Freq
J-Freq
Top 20 : Chinese Frequency of Use > Japanese Frequency of Use
Generated Data Set : 939
FrequencyofUse%
15
0.1988
0.2788
0.5512
0.1956
0.3834
0.1644
0.2366
0.1056
0.1212
0.1088
0.1688
0.1422
0.1344
0.1622
0.0856
0.2812
0.1588
0.0912
0.1134
0.1288
0
0.1
0.2
0.3
0.4
0.5
0.6
C-Freq
J-Freq
Top 20 : Chinese Frequency of Use < Japanese Frequency of Use
Generated Data Set : 363
FrequencyofUse%
16
0.0222
0.0144
0.0112
0.0056 0.0056
0.0022
0.0012 0.0012 0.0012 0.0012
0
0.005
0.01
0.015
0.02
0.025
8FCE 7D20 675F 541B 846C 79E9 82BD 96C0 5857 5353
C-Freq
J-Freq
FrequencyofUse% Chinese Frequency of Use = Japanese Frequency of Use
Generated Data Set : 10
Frequency of Use Reassembly
17
unified code points
363
939
1302
+
Problem Domain (Unsolved Overlap) : 10
C / J Usage Overlap Data Set : 1312
Freq C > J : 939
Freq J > C : 363
J = C
10
Rc
Rj
Data Processing & Computation Recap
18
>20K Han Code Points
6181 CJK Overlap
1312 Usage Overlap
Splitting Non-overlapping
Frequency of Use
Computation
Filtering Process
Filtering Process
LOGICDesign
Splitting Unused
Methodology
Review
CJK
Coordination
Re-Sampling &
Computation
Statistical
Justification
10 Code Points
Problem domain was effectively reduced
Future Work
19
1578152323
3433
69
122
289
501
80
26
1455321
0
100
200
300
400
500
600
%
numberofXwithinthesamerange
Chinese Frequency of Use Minus Japanese Frequency of Use
Overlap range redefine
Expand (?) Std Dev.
Require intensive
CKJ coordination &
deliberation
RcRj
Mean= 0.034465
S.D.=0.158477
Re-consider Language Tag
20
K
tag
J
tag
TLD
registries
IANA/Verisign
provisioning
root server
operators
publication
Internet query
Policy
C
tag
Language tag support
•RFC 2860 : The name space of language tags is administered by IANA
•ISO Standard 639 :
•when a language has both an IANA-registered tag and a tag
derived from an ISO registered code, one MUST use the ISO tag.
•Maintenance Agency : International Information Centre for
Terminology (Austria)
Sources of Language Tag
distribution
masters
root
servers
DNS
resolvers
21
PerfectionSyndrome
“Engineering isn't about perfect solutions; it's about doing the best
you can with limited resources.” Randy Pausch

More Related Content

Viewers also liked

318 Action Network Engineering Plan
318 Action Network Engineering Plan318 Action Network Engineering Plan
318 Action Network Engineering PlanKenny Huang Ph.D.
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models ReviewKenny Huang Ph.D.
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差Kenny Huang Ph.D.
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and OpportunitiesKenny Huang Ph.D.
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析Kenny Huang Ph.D.
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Seven Domains of Attractive Opportunities by John Mullins
Seven Domains of Attractive Opportunities by John Mullins Seven Domains of Attractive Opportunities by John Mullins
Seven Domains of Attractive Opportunities by John Mullins London Business School
 

Viewers also liked (9)

318 Action Network Engineering Plan
318 Action Network Engineering Plan318 Action Network Engineering Plan
318 Action Network Engineering Plan
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Seven Domains of Attractive Opportunities by John Mullins
Seven Domains of Attractive Opportunities by John Mullins Seven Domains of Attractive Opportunities by John Mullins
Seven Domains of Attractive Opportunities by John Mullins
 
7 domain's framework
7 domain's framework7 domain's framework
7 domain's framework
 

Similar to Ruling the root : CJK Rules for The Root Zone

electronics and communication
electronics and communicationelectronics and communication
electronics and communicationRobozz Lab
 
Chapter_01 Course Introduction.pdf
Chapter_01 Course Introduction.pdfChapter_01 Course Introduction.pdf
Chapter_01 Course Introduction.pdfVoThanhPhong3
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project reportBharat Biyani
 
Grasp the Critical Issues for a Functioning JESD204B Interface
Grasp the Critical Issues for a Functioning JESD204B InterfaceGrasp the Critical Issues for a Functioning JESD204B Interface
Grasp the Critical Issues for a Functioning JESD204B InterfaceAnalog Devices, Inc.
 
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...Hsien-Hsin Sean Lee, Ph.D.
 
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...IRJET Journal
 
Kakarla Sriram K _resume_sep_2016
Kakarla Sriram K _resume_sep_2016Kakarla Sriram K _resume_sep_2016
Kakarla Sriram K _resume_sep_2016srkkakarla
 
24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdfFrangoCamila
 
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization Studio
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization StudioRecent MIP Performance Improvements in IBM ILOG CPLEX Optimization Studio
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization StudioIBM Decision Optimization
 
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...Spark Summit
 
Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5
 Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5 Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5
Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5Roberto Innocenti
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewAlexander Grudanov
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
ACER-ASE2017-slides
ACER-ASE2017-slidesACER-ASE2017-slides
ACER-ASE2017-slidesMasud Rahman
 

Similar to Ruling the root : CJK Rules for The Root Zone (20)

electronics and communication
electronics and communicationelectronics and communication
electronics and communication
 
UIC Thesis Candiloro
UIC Thesis CandiloroUIC Thesis Candiloro
UIC Thesis Candiloro
 
Chapter_01 Course Introduction.pdf
Chapter_01 Course Introduction.pdfChapter_01 Course Introduction.pdf
Chapter_01 Course Introduction.pdf
 
Bharat gargi final project report
Bharat gargi final project reportBharat gargi final project report
Bharat gargi final project report
 
Grasp the Critical Issues for a Functioning JESD204B Interface
Grasp the Critical Issues for a Functioning JESD204B InterfaceGrasp the Critical Issues for a Functioning JESD204B Interface
Grasp the Critical Issues for a Functioning JESD204B Interface
 
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
 
Analog to Digital Converter
Analog to Digital ConverterAnalog to Digital Converter
Analog to Digital Converter
 
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...
Design of an Efficient Reconfigurable Fir Filter for Multi Standard Digital u...
 
On using BS to improve the
On using BS to improve theOn using BS to improve the
On using BS to improve the
 
Kakarla Sriram K _resume_sep_2016
Kakarla Sriram K _resume_sep_2016Kakarla Sriram K _resume_sep_2016
Kakarla Sriram K _resume_sep_2016
 
24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf
 
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization Studio
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization StudioRecent MIP Performance Improvements in IBM ILOG CPLEX Optimization Studio
Recent MIP Performance Improvements in IBM ILOG CPLEX Optimization Studio
 
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...
Taming GC Pauses for Humongous Java Heaps in Spark Graph Computing-(Eric Kacz...
 
Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5
 Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5 Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5
Electrical Schematic Open Hardware PowerPC Notebook motherboard v. 0.5
 
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
 
Coding
CodingCoding
Coding
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overview
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Callgraph analysis
Callgraph analysisCallgraph analysis
Callgraph analysis
 
ACER-ASE2017-slides
ACER-ASE2017-slidesACER-ASE2017-slides
ACER-ASE2017-slides
 

More from Kenny Huang Ph.D.

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in TaiwanKenny Huang Ph.D.
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例Kenny Huang Ph.D.
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AIKenny Huang Ph.D.
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案Kenny Huang Ph.D.
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討Kenny Huang Ph.D.
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningKenny Huang Ph.D.
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment AnalysisKenny Huang Ph.D.
 
Taiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationTaiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationKenny Huang Ph.D.
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
CJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewCJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewKenny Huang Ph.D.
 
Generation Panels for CJK Community - A Collaborative Model Proposal
Generation Panels for CJK Community - A Collaborative Model ProposalGeneration Panels for CJK Community - A Collaborative Model Proposal
Generation Panels for CJK Community - A Collaborative Model ProposalKenny Huang Ph.D.
 

More from Kenny Huang Ph.D. (16)

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
 
APNIC44 Briefing
APNIC44 BriefingAPNIC44 Briefing
APNIC44 Briefing
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment Analysis
 
Taiwan gTLD Policy and Regulation
Taiwan gTLD Policy and RegulationTaiwan gTLD Policy and Regulation
Taiwan gTLD Policy and Regulation
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
CJK Generation Panels Coordination Review
CJK Generation Panels Coordination ReviewCJK Generation Panels Coordination Review
CJK Generation Panels Coordination Review
 
Generation Panels for CJK Community - A Collaborative Model Proposal
Generation Panels for CJK Community - A Collaborative Model ProposalGeneration Panels for CJK Community - A Collaborative Model Proposal
Generation Panels for CJK Community - A Collaborative Model Proposal
 

Recently uploaded

SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 

Recently uploaded (17)

SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 

Ruling the root : CJK Rules for The Root Zone

  • 1. CJK Rules For The Root Zone Kenny Huang, Ph.D. 黃勝雄博士 Member, CDNC / CGP Co-author, RFC3743 IETF Member, Executive Council, APNIC Member, Board of Directors, TWNIC huangksh@gmail.com 2014.Jun
  • 2. Problem : CJK Is Complicated 2 PuttingCJKlabels in the root zone is evenmore complicated
  • 4. Constraints for CJK LGR 4 Independent Tasks Each CJK Panel creates an LGR Each LGR includes a repertoire and variants Define labels permission Define variants labels Assign dispositions •Allocatable •Block Coordination Tasks If an LGR includes Han characters: The variant *mappings* must agree for all the panels The variant *types* may be different The repertoires may be different *Presented by Lee Han Chuan & IP, Shanghai 2014 May 29
  • 5. Overlap Case Illustration 5 壹 U58F9 弌 U5F0C 壱 U58F1 一 U4E00 allocate block block Variant Unicode Disposition 一 U4E00 Variant Unicode Disposition Chinese LGR Japanese LGR 1 2 3 Integrate ? Integrated Root Zone Label Generation Rules Rejected Generation Panel F T
  • 6. High Level Conflict Strategies 6 ID Strategy Pros Cons Rank 1 Adopt X Abandon Rcjk Permit X No label rule 2 Adopt X Intersection ∩ (Rcjk) Permit X Permit ∩(variants/disp) Rules changed 3 Adopt X Union ∪(Rcjk) Permit X Permit ∪(variants/disp) Rules changed 4 Abandon X and Rcjk No conflict Label not available 5 Adopt rules based on frequency of use Fair & scientific approach Rules changed; fairness doesn’t mean appropriate CJK overlap C: rule Rc J : rule Rj K: rule Rk
  • 7. Unified CJK LGR Illustration 7 壹 U58F9 弌 U5F0C 壱 U58F1 一 U4E00 allocate block block Variant Unicode Disposition Chinese LGR 1 2 3 一 U4E00 Variant Unicode Disposition Japanese LGR 壹 U58F9 弌 U5F0C 壱 U58F1 一 U4E00 allocate block block Variant Unicode Disposition Integrated LGR 1 2 3 一 U4E00 Variant Unicode Disposition Integrated LGR Union Intersection
  • 8. CJK Integration Methodology Divide & Conquer (D&C) Unified CJK Rules Variant Dispositions Minimal Viable Solution CJK Rules Root Zone Admin Strategic Direction Plan and Define CJK Overlap Resources JK Overlap CJ Usage Pattern CJ Overlap CK Usage Pattern CK Overlap Services LGR Constrains Evaluation Method Diversified CJK DemandsRequires C Demands J Demands 8 Requires Split Merge
  • 9. Splitting Non-overlapping Code Points From Repertories 9 C/J Overlap: 6181 C-Han : 19520 (CNNIC/TWNIC) J-Han : 6356 (JPRS) K-Han : 0 (KRNIC) Develop Conflict Strategy No conflict Rc Rk Rj 13339 175 1 unified code points 13339 175 13514 + CJK Han-overlap in IANA IDN Repository Problem Domain (Unsolved Overlap) : 6181 Rc Rj Rk Chinese LGR Japanese LGR Korean LGR
  • 10. Engineering Design 10 2 TC : Apple News SC : Sina News JP : Mainichi News Computation for Word Usage and Frequency C/J overlap code points Matching usage frequency of use Split unused code points Split code points of low frequency of use Sample size is statistical significant
  • 11. Splitting Unused Code Points from The Overlap 11 J only : 203 C only : 1927Rc Rj total unused : 2739 3 C / J Overlap Data Set : 6181 unified code points 2739 203 1927 4869 + C / J usage overlap : 1312 total used : 3442 Problem Domain (Unsolved Overlap) : 1312
  • 12. Computing Frequency of Use of Code Points 12 4 Initial Data Set : 1312
  • 13. Top 10 Most Popular Words 13 的, 2774 人, 1005 在, 975 一, 964 是, 960 不, 951 中, 896 有, 883 大, 776 台, 718 TC 日, 20942 月, 20315 人, 4430 国, 3754 中, 3521 被, 2791 称, 2340 地, 2226 南, 2152 生, 2027 SC 日, 822 年, 496 国, 393 会, 345 月, 325 人, 325 大, 319 市, 253 本, 251 中, 250 JP
  • 14. 14 4.063 4.1884 1.7338 0.6 0.6094 0.886 0.55820.59440.5518 0.468 0.7042 0.4304 0.6026 0.4488 0.36 0.35620.4026 0.385 0.7508 0.325 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 C-Freq J-Freq Top 20 : Chinese Frequency of Use > Japanese Frequency of Use Generated Data Set : 939 FrequencyofUse%
  • 16. 16 0.0222 0.0144 0.0112 0.0056 0.0056 0.0022 0.0012 0.0012 0.0012 0.0012 0 0.005 0.01 0.015 0.02 0.025 8FCE 7D20 675F 541B 846C 79E9 82BD 96C0 5857 5353 C-Freq J-Freq FrequencyofUse% Chinese Frequency of Use = Japanese Frequency of Use Generated Data Set : 10
  • 17. Frequency of Use Reassembly 17 unified code points 363 939 1302 + Problem Domain (Unsolved Overlap) : 10 C / J Usage Overlap Data Set : 1312 Freq C > J : 939 Freq J > C : 363 J = C 10 Rc Rj
  • 18. Data Processing & Computation Recap 18 >20K Han Code Points 6181 CJK Overlap 1312 Usage Overlap Splitting Non-overlapping Frequency of Use Computation Filtering Process Filtering Process LOGICDesign Splitting Unused Methodology Review CJK Coordination Re-Sampling & Computation Statistical Justification 10 Code Points Problem domain was effectively reduced
  • 19. Future Work 19 1578152323 3433 69 122 289 501 80 26 1455321 0 100 200 300 400 500 600 % numberofXwithinthesamerange Chinese Frequency of Use Minus Japanese Frequency of Use Overlap range redefine Expand (?) Std Dev. Require intensive CKJ coordination & deliberation RcRj Mean= 0.034465 S.D.=0.158477
  • 20. Re-consider Language Tag 20 K tag J tag TLD registries IANA/Verisign provisioning root server operators publication Internet query Policy C tag Language tag support •RFC 2860 : The name space of language tags is administered by IANA •ISO Standard 639 : •when a language has both an IANA-registered tag and a tag derived from an ISO registered code, one MUST use the ISO tag. •Maintenance Agency : International Information Centre for Terminology (Austria) Sources of Language Tag distribution masters root servers DNS resolvers
  • 21. 21 PerfectionSyndrome “Engineering isn't about perfect solutions; it's about doing the best you can with limited resources.” Randy Pausch