Results 1 to 10 of about 490,264 (127)
Shifted LT Code Security Scheme for Partial Information Encryption [PDF]
The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information ...
Si Zhang +3 more
doaj +2 more sources
Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical ...
Lizheng Wang +3 more
doaj +1 more source
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang +3 more
doaj +1 more source
Triangular code: Near-optimal linear time fountain code
In this paper, we propose Triangular Code (TC), a new class of fountain code with near-zero redundancy and linear encoding and decoding computational complexities of O(Lklogk), where k is the packet batch size and L is the packet data length.
Jalaluddin Qureshi, Chuan Heng Foh
doaj +1 more source
Design and Analysis of LT Codes With a Reverse Coding Framework
In this paper, an improved LT code with a reverse coding framework is designed to reduce the error floor caused by low-degree information nodes. For the proposed coding scheme, a well-designed threshold is used to mark the information nodes whose degrees
Xin Song +4 more
doaj +1 more source
Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang +3 more
doaj +1 more source
NOREC4DNA: using near-optimal rateless erasure codes for DNA storage
Background DNA is a promising storage medium for high-density long-term digital data storage. Since DNA synthesis and sequencing are still relatively expensive tasks, the coding methods used to store digital data in DNA should correct errors and avoid ...
Peter Michael Schwarz, Bernd Freisleben
doaj +1 more source
Research on Degree Distribution Optimization of LT Codes
LT code, as a channel coding scheme with good adaptability to the channel, has a stable performance in data transmission of underwater acoustic communication.
doaj +1 more source
Performance and time improvement of LT code-based cloud storage
Outsourcing data on cloud storage services has already attracted great attention due to the prospect of rapid data growth and storing efficiencies for customers.
Nastaran Chakani +2 more
doaj +1 more source
A Fault-Tolerant Honeycomb Memory [PDF]
Recently, Hastings & Haah introduced a quantum memory defined on the honeycomb lattice. Remarkably, this honeycomb code assembles weight-six parity checks using only two-local measurements. The sparse connectivity and two-local measurements are desirable
Craig Gidney +3 more
doaj +1 more source

