Results 51 to 60 of about 42,043 (174)

Online fountain code with an improved caching mechanism

open access: yesIET Communications
The original online fountain codes discard a large number of symbols that do not meet the requirements at the decoder. To improve channel utilization, this article proposes a new online fountain code.
Yin Zhang   +7 more
doaj   +1 more source

Linearly-Coupled Fountain Codes

open access: yes, 2014
Network-coded multiple access (NCMA) is a communication scheme for wireless multiple-access networks where physical-layer network coding (PNC) is employed. In NCMA, a user encodes and spreads its message into multiple packets. Time is slotted and multiple users transmit packets (one packet each) simultaneously in each timeslot.
Yang, Shenghao   +3 more
openaire   +2 more sources

Fountain Coded Wireless Transmission Model

open access: yesIndian Journal of Science and Technology, 2016
Background/Objectives: Rateless codes have recently attracted much engrossment in community communication research as the Luby Transform codes and Raptor codes are most renowned. The Fountain codes do not have the requirement of the receiver to inform the transmitter of the identity of the packets that are corrupted resulting in expelling the need of ...
Anmol Singh Brar, Amandeep Singh Sandhu
openaire   +1 more source

Application Layer Systematic Network Coding for Sliced H.264/AVC Video Streaming

open access: yesAdvances in Multimedia, 2012
Application Layer Forward Error Correction (AL-FEC) with rateless codes can be applied to protect the video data over lossy channels. Expanding Window Random Linear Codes (EW RLCs) are a flexible unequal error protection fountain coding scheme which can ...
Sajid Nazir   +3 more
doaj   +1 more source

Energy-Efficient Channel Coding Strategy for Underwater Acoustic Networks

open access: yesSensors, 2017
Underwater acoustic networks (UAN) allow for efficiently exploiting and monitoring the sub-aquatic environment. These networks are characterized by long propagation delays, error-prone channels and half-duplex communication. In this paper, we address the
Grasielli Barreto   +7 more
doaj   +1 more source

Analysis and Design of Rateless Two-way Relay Networks Based on a Multiply-and-Forward Scheme

open access: yesApplied Sciences, 2020
In this paper, we propose a rateless, three-stage, two-way multiply-and-forward (MF) relaying system over the Rayleigh flat fading channel, where two source nodes communicate with each other through a relay node and all nodes work on half-duplex and time-
Wei Han   +3 more
doaj   +1 more source

On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2023
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-sight (LOS ...
Quang Sang Nguyen   +4 more
doaj   +1 more source

Raptor codes for infrastructure-to-vehicular broadcast services [PDF]

open access: yes, 2011
One of the important applications to be available in vehicular ad-hoc networks are value-added or infotainment services. However, vehicular communication suffers from high packet loss due to challenging channel characteristics such as huge Doppler spread
Abdullah, NF, Doufexi, A, Piechocki, RJ
core   +2 more sources

Multilevel Network Steganography in Fountain Codes [PDF]

open access: yesEuropean Interdisciplinary Cybersecurity Conference, 2021
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire   +1 more source

Reliable Storage System With Priority Filter and Load Balance Collection Model for Large Scale Sensor Networks

open access: yesIEEE Access, 2019
Wireless sensor network are widely used in various types of environmental monitoring and there are also many applications in the industrial field, we usually deploy sensor nodes in the corresponding areas to monitor and collect relevant data, waiting for
Wei Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy