Results 1 to 10 of about 490,264 (127)

Shifted LT Code Security Scheme for Partial Information Encryption [PDF]

open access: yesEntropy, 2022
The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information ...
Si Zhang   +3 more
doaj   +2 more sources

Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1

open access: yesApplied Sciences, 2023
Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical ...
Lizheng Wang   +3 more
doaj   +1 more source

Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design

open access: yesIEEE Access, 2023
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang   +3 more
doaj   +1 more source

Triangular code: Near-optimal linear time fountain code

open access: yesDigital Communications and Networks, 2023
In this paper, we propose Triangular Code (TC), a new class of fountain code with near-zero redundancy and linear encoding and decoding computational complexities of O(Lklogk), where k is the packet batch size and L is the packet data length.
Jalaluddin Qureshi, Chuan Heng Foh
doaj   +1 more source

Design and Analysis of LT Codes With a Reverse Coding Framework

open access: yesIEEE Access, 2021
In this paper, an improved LT code with a reverse coding framework is designed to reduce the error floor caused by low-degree information nodes. For the proposed coding scheme, a well-designed threshold is used to mark the information nodes whose degrees
Xin Song   +4 more
doaj   +1 more source

Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets

open access: yesIEEE Access, 2022
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang   +3 more
doaj   +1 more source

NOREC4DNA: using near-optimal rateless erasure codes for DNA storage

open access: yesBMC Bioinformatics, 2021
Background DNA is a promising storage medium for high-density long-term digital data storage. Since DNA synthesis and sequencing are still relatively expensive tasks, the coding methods used to store digital data in DNA should correct errors and avoid ...
Peter Michael Schwarz, Bernd Freisleben
doaj   +1 more source

Research on Degree Distribution Optimization of LT Codes

open access: yesXibei Gongye Daxue Xuebao, 2020
LT code, as a channel coding scheme with good adaptability to the channel, has a stable performance in data transmission of underwater acoustic communication.

doaj   +1 more source

Performance and time improvement of LT code-based cloud storage

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Outsourcing data on cloud storage services has already attracted great attention due to the prospect of rapid data growth and storing efficiencies for customers.
Nastaran Chakani   +2 more
doaj   +1 more source

A Fault-Tolerant Honeycomb Memory [PDF]

open access: yesQuantum, 2021
Recently, Hastings & Haah introduced a quantum memory defined on the honeycomb lattice. Remarkably, this honeycomb code assembles weight-six parity checks using only two-local measurements. The sparse connectivity and two-local measurements are desirable
Craig Gidney   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy