SlideShare a Scribd company logo
Network Coding
Department of Computer Engineering
Sharif University of Technology
Winter 2016
Arash Pourdamghani
A Short Introduction
to
Outline
Background
Examples
Theories
Benefits & Challenges
2
Arash PourdamghaniNetwork Coding
Background
3
Arash PourdamghaniNetwork Coding
Networking
Sharing resources
Unify multiple devices
Packet switching
Through multiple layers
4
Arash PourdamghaniNetwork Coding
Routing
Planning trip for packets from source to destination
Model network by (weighted) graphs
0111
1001
5
Arash PourdamghaniNetwork Coding
Routing drawback
Treat information as independent commodities!
6
Arash PourdamghaniNetwork Coding
Examples
7
Arash PourdamghaniNetwork Coding
Butterfly Network
S
A B
C
𝑅1 𝑅2
8
Arash PourdamghaniNetwork Coding
Butterfly Network(cont’d)
S
A B
C
𝑅1 𝑅2
D
S
A B
C
𝑅1 𝑅2
D
S
A B
C
𝑅1 𝑅2
D
9
Arash PourdamghaniNetwork Coding
New Idea
10
Arash PourdamghaniNetwork Coding
Butterfly Network(cont’d)
S
A B
C
𝑅1 𝑅2
D
m1 m2
m1 ⊕ m2
11
Arash PourdamghaniNetwork Coding
Wireless Communication
A and B want to exchange 2 files by helping a
relay node R (e.g. a satellite link)
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
m1
m1
m2
m2
12
Arash PourdamghaniNetwork Coding
Wireless Communication (Cont’d)
Energy efficient
 Less delay
 More wireless bandwidth
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
m1 m2
m1 ⊕ m2 m1 ⊕ m2
13
Arash PourdamghaniNetwork Coding
Content Distribution
Combining collaborative content distribution &
network coding
14
Arash PourdamghaniNetwork Coding
Content Distribution(cont’d)
Capacity increase with increasing the clients
number !
15
Arash PourdamghaniNetwork Coding
Theories
16
Arash PourdamghaniNetwork Coding
Other disciplines
17
Arash PourdamghaniNetwork Coding
Overview
𝑆1, 𝑆2, … 𝑆 𝑘 want to transmit to 𝑅1, 𝑅2, … 𝑅 𝑛
simulatencly
𝑆1
𝑆2
𝑆 𝑘
𝑅1
𝑅2
𝑅 𝑛
18
h
Arash PourdamghaniNetwork Coding
Min-Cut Max-Flow
Acyclic graph G = (V,E) with unit capacity edges,
a source vertex S, and a receiver vertex R.
 If the min-cut between S and R equals h, then
the information can be send from S to R at a
maximum rate of h.
19
Arash PourdamghaniNetwork Coding
Main Theorem
There exists a multicast transmission scheme over a
large enough finite field 𝑭 𝒒, in which intermediate
network nodes linearly combine their incoming
information symbols over 𝐹𝑞, that delivers the
information from the sources simultaneously to each
receiver at a rate equal to h.
20
Arash PourdamghaniNetwork Coding
Multicast Transmission
One-to-many communication with specific
receiver addresses
21
Arash PourdamghaniNetwork Coding
Finite Fields
Abelian Group -> Galois Field -> Extension Fields
 Closure, Associativity, Commutativity
Identity & Inverse element
Closed on ‘+’ and ‘.’
22
+ 0 1
0 0 1
1 1 0
. 0 1
0 0 0
1 0 1
Arash PourdamghaniNetwork Coding
Finite Fields(cont’d)
Prime Fields: 𝐺𝐹(𝑝) where 𝑝 is prime number
Extension fields: 𝐺𝐹(𝑝 𝑚) where 𝑝 is prime
number and 𝑚 > 1
23
+ 0 1 A B
0 0 1 A B
1 1 0 B A
A A B 0 1
B B A 1 0
. 0 1 A B
0 0 0 0 0
1 0 1 A B
A 0 A B 1
B 0 B 1 A
Arash PourdamghaniNetwork Coding
Proof methods
•Algebraic
• There exist values in some large enough finite field 𝐹𝑞 for the
components {𝛼 𝑘} of the local coding vectors, such that all
matrices 𝑨𝒋,1 ≤ j ≤ N, defining the information that the
receivers observe, are full rank .
•Information Theoretic
• For each vertex 𝑣 select |𝑂𝑢𝑡(𝑣)| functions 𝑓𝑖
𝑣
: 2ℎ 𝐼𝑛 𝑣 → 2ℎ
chosen uniformly at random
• Each receiver could decode all source packets if get sufficient input
packets
24
Arash PourdamghaniNetwork Coding
Benefits
&
Challenges
25
Arash PourdamghaniNetwork Coding
Benefits
Throughput increment
In place coding
Efficiency of wireless resources
Using current cables
26
Arash PourdamghaniNetwork Coding 27
Coding Advantage
DIRECTED GRAPHS
Multicast : Ω( 𝑛)
Multiple unicast: Ω(𝑛)
UNDIRECTED GRAPHS
Upper bound is 2
Lower bound is
8
7
27
Arash PourdamghaniNetwork Coding
Challenges
Dynamic changes
Complexity of computations
Security of transmitted data
Integration with existing infrastructure
28
Arash PourdamghaniNetwork Coding
References
J. Kurose, K. Ross, “Computer Networking: Top-
Down Approach”,6th edition, Addison Wesley, 2013
M. Jafari Siavoshani, ”A Very Short Introduction to
Network Coding”, Sharif University of Technology,
Fall 2014
29
Arash PourdamghaniNetwork Coding
References(cont’d)
C. Fragouli, E. Soljanin, “Network coding
fundamentals” Foundations and Trends in
Networking, 2007
A. Sprintson, Theory and application of network
coding, Texas A&M University, 2016
30
Arash PourdamghaniNetwork Coding
Thank You
31

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
IJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
E42032732
E42032732E42032732
E42032732
IJERA Editor
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
ijitjournal
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd Iaetsd
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
Devanshi Piprottar
 
A03530107
A03530107A03530107
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
José Francisco Chávez Carreón
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
Bhagwat Singh Rathore
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
IRJET Journal
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
zaidinvisible
 
Text encryption
Text encryptionText encryption
Text encryption
tayseer Karam alshekly
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
IJERA Editor
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
Kavi
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
Bhagwat Singh Rathore
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
IISRT
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
IJERA Editor
 

What's hot (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
E42032732
E42032732E42032732
E42032732
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
A03530107
A03530107A03530107
A03530107
 
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Text encryption
Text encryptionText encryption
Text encryption
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
 
Mid term
Mid termMid term
Mid term
 

Similar to A short introduction to Network coding

ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
Toyotaro Suzumura
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
Giritharan Ravichandran
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
ssuser50f4fd1
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clusteringLiang Xie, PhD
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
Kshitij Singh
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET Journal
 
ECAD lab manual
ECAD lab manualECAD lab manual
ECAD lab manual
Dr. Swaminathan Kathirvel
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_compandingAkshay Sharma
 
Nand or gates ver_student
Nand or gates ver_studentNand or gates ver_student
Nand or gates ver_student
WanNurdiana
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
ijwmn
 
Ldpc based error correction
Ldpc based error correctionLdpc based error correction
Ldpc based error correction
Vijay Balaji
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
MuneebZahid10
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionSean McQuay
 
Vlsi projects
Vlsi projectsVlsi projects
Vlsi projects
shahu2212
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
Peter Waher
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Old Dominion University
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
Subhash Kumar Singh
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
ijmsr
 
Kailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptxKailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptx
KailashChandMeena6
 
Design of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS TechnologyDesign of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS Technology
IJMER
 

Similar to A short introduction to Network coding (20)

ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clustering
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
 
ECAD lab manual
ECAD lab manualECAD lab manual
ECAD lab manual
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_companding
 
Nand or gates ver_student
Nand or gates ver_studentNand or gates ver_student
Nand or gates ver_student
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
 
Ldpc based error correction
Ldpc based error correctionLdpc based error correction
Ldpc based error correction
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless Transmission
 
Vlsi projects
Vlsi projectsVlsi projects
Vlsi projects
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Kailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptxKailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptx
 
Design of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS TechnologyDesign of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS Technology
 

More from Arash Pourdamghani

ابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانیابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانی
Arash Pourdamghani
 
Behavioral Decision Making
Behavioral Decision MakingBehavioral Decision Making
Behavioral Decision Making
Arash Pourdamghani
 
Regret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated GamesRegret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated Games
Arash Pourdamghani
 
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
 برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
Arash Pourdamghani
 
On the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment ProblemOn the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment Problem
Arash Pourdamghani
 
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Arash Pourdamghani
 
کاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسانکاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسان
Arash Pourdamghani
 
Load balancing in OSPF
Load balancing  in OSPFLoad balancing  in OSPF
Load balancing in OSPF
Arash Pourdamghani
 
State of LTE
State of LTEState of LTE
State of LTE
Arash Pourdamghani
 
واقعیت افزوده
واقعیت افزودهواقعیت افزوده
واقعیت افزوده
Arash Pourdamghani
 
تکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآنتکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآن
Arash Pourdamghani
 
ربات های رمان‌ نویس
ربات های رمان‌ نویسربات های رمان‌ نویس
ربات های رمان‌ نویس
Arash Pourdamghani
 
آشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوترآشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوتر
Arash Pourdamghani
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
Arash Pourdamghani
 

More from Arash Pourdamghani (14)

ابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانیابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانی
 
Behavioral Decision Making
Behavioral Decision MakingBehavioral Decision Making
Behavioral Decision Making
 
Regret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated GamesRegret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated Games
 
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
 برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
 
On the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment ProblemOn the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment Problem
 
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
 
کاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسانکاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسان
 
Load balancing in OSPF
Load balancing  in OSPFLoad balancing  in OSPF
Load balancing in OSPF
 
State of LTE
State of LTEState of LTE
State of LTE
 
واقعیت افزوده
واقعیت افزودهواقعیت افزوده
واقعیت افزوده
 
تکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآنتکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآن
 
ربات های رمان‌ نویس
ربات های رمان‌ نویسربات های رمان‌ نویس
ربات های رمان‌ نویس
 
آشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوترآشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوتر
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

A short introduction to Network coding

Editor's Notes

  1. Prime = mod gerftan Asso = (a+b)+c = c+(a+b) Commutativity = a+b = b+a inverse = a+b = 0
  2. قطر باید ۰ باشه و این که جمع یه چیزی با یک نمی تونه ۰ و ۱ و اون یکی باشه