Results 31 to 40 of about 42,043 (174)
Optimal Redundancy Control Strategy for Fountain Code-Based Underwater Acoustic Communication
In this paper, a transmission redundancy optimization strategy for fountain codes that uses an adaptive filtering technique as well as recent results concerning the upper bound of the source packet erasure probability for fountain codes over finite ...
Mingshen Liang +2 more
doaj +1 more source
A Greedy Spreading Serial Decoding of LT Codes
In this paper, we propose new serial decoding of Luby transform (LT) codes over additive white Gaussian noise channels. LT encoder generates a potentially limitless number of encoded packets, and the decoder incrementally collects the packets to ensure ...
Liang He, Jing Lei, Ying Huang
doaj +1 more source
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming [PDF]
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop ...
Dang Hung, Tran Duy, Do Trinh
doaj +1 more source
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang +3 more
doaj +1 more source
Enhancing multi-source content delivery in content-centric networks with fountain coding [PDF]
Fountain coding has been considered as especially suitable for lossy environments, such as wireless networks, as it provides redundancy while reducing coordination overheads between sender(s) and receiver(s). As such it presents beneficial properties for
Chai, Wei Koong +4 more
core +2 more sources
Controlled Flooding of Fountain Codes [PDF]
We consider a multihop network where a source node must reliably deliver a set of data packets to a given destination node. To do so, the source applies a fountain code and floods the encoded packets through the network, until they reach their destination or are lost in the process. We model the probability that the destination can recover the original
Waqas Bin Abbas +2 more
openaire +2 more sources
On a class of optimal rateless codes [PDF]
—In this paper we analyze a class of systematic fountain/rateless codes constructed using Bernoulli(1/2) random variables. Using simple bounds we then show that this class of codes stochastically minimizes the number of coded packets receptions needed to
Douglas J. Leith, Vijay G. Subramanian
core +2 more sources
Performance on Cognitive Broadcasting Networks Employing Fountain Codes and Maximal Ratio Transmission [PDF]
The comprehensive performance of cognitive broadcasting networks employing Fountain codes (FC) and maximal ratio transmission (MRT) is investigated in the present paper.
N.-L. Nguyen +4 more
doaj
Weighted BATS Codes with LDPC Precoding
Batched Sparse (BATS) codes are a type of network coding scheme that use a combination of random linear network coding (RLNC) and fountain coding to enhance the reliability and efficiency of data transmission. In order to achieve unequal error protection
Wenyue Zhang, Min Zhu
doaj +1 more source
Binary Compressive Sensing Via Analog Fountain Coding [PDF]
The paper is accepted to publish in IEEE Transactions on Signal ...
Mahyar Shirvanimoghaddam +4 more
openaire +2 more sources

