Results 31 to 40 of about 42,043 (174)

Optimal Redundancy Control Strategy for Fountain Code-Based Underwater Acoustic Communication

open access: yesIEEE Access, 2018
In this paper, a transmission redundancy optimization strategy for fountain codes that uses an adaptive filtering technique as well as recent results concerning the upper bound of the source packet erasure probability for fountain codes over finite ...
Mingshen Liang   +2 more
doaj   +1 more source

A Greedy Spreading Serial Decoding of LT Codes

open access: yesIEEE Access, 2019
In this paper, we propose new serial decoding of Luby transform (LT) codes over additive white Gaussian noise channels. LT encoder generates a potentially limitless number of encoded packets, and the decoder incrementally collects the packets to ensure ...
Liang He, Jing Lei, Ying Huang
doaj   +1 more source

Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2019
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop ...
Dang Hung, Tran Duy, Do Trinh
doaj   +1 more source

Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design

open access: yesIEEE Access, 2023
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang   +3 more
doaj   +1 more source

Enhancing multi-source content delivery in content-centric networks with fountain coding [PDF]

open access: yes, 2015
Fountain coding has been considered as especially suitable for lossy environments, such as wireless networks, as it provides redundancy while reducing coordination overheads between sender(s) and receiver(s). As such it presents beneficial properties for
Chai, Wei Koong   +4 more
core   +2 more sources

Controlled Flooding of Fountain Codes [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2017
We consider a multihop network where a source node must reliably deliver a set of data packets to a given destination node. To do so, the source applies a fountain code and floods the encoded packets through the network, until they reach their destination or are lost in the process. We model the probability that the destination can recover the original
Waqas Bin Abbas   +2 more
openaire   +2 more sources

On a class of optimal rateless codes [PDF]

open access: yes, 2008
—In this paper we analyze a class of systematic fountain/rateless codes constructed using Bernoulli(1/2) random variables. Using simple bounds we then show that this class of codes stochastically minimizes the number of coded packets receptions needed to
Douglas J. Leith, Vijay G. Subramanian
core   +2 more sources

Performance on Cognitive Broadcasting Networks Employing Fountain Codes and Maximal Ratio Transmission [PDF]

open access: yesRadioengineering, 2023
The comprehensive performance of cognitive broadcasting networks employing Fountain codes (FC) and maximal ratio transmission (MRT) is investigated in the present paper.
N.-L. Nguyen   +4 more
doaj  

Weighted BATS Codes with LDPC Precoding

open access: yesEntropy, 2023
Batched Sparse (BATS) codes are a type of network coding scheme that use a combination of random linear network coding (RLNC) and fountain coding to enhance the reliability and efficiency of data transmission. In order to achieve unequal error protection
Wenyue Zhang, Min Zhu
doaj   +1 more source

Binary Compressive Sensing Via Analog Fountain Coding [PDF]

open access: yesIEEE Transactions on Signal Processing, 2015
The paper is accepted to publish in IEEE Transactions on Signal ...
Mahyar Shirvanimoghaddam   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy