Results 51 to 60 of about 2,319 (194)

Design of Improved BP Decoders and Corresponding LT Code Degree Distribution for AWGN Channels

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
This paper presents the performance of a hard decision belief propagation (HDBP) decoder used for Luby transform (LT) codes over additive white Gaussian noise channels; subsequently, three improved HDBP decoders are proposed. We first analyze the performance improvement of the sorted ripple and delayed decoding process in a HDBP decoder; subsequently ...
Lei Zhang, Li Su, Chaoyun Song
wiley   +1 more source

Raptor codes for infrastructure-to-vehicular broadcast services [PDF]

open access: yes, 2011
One of the important applications to be available in vehicular ad-hoc networks are value-added or infotainment services. However, vehicular communication suffers from high packet loss due to challenging channel characteristics such as huge Doppler spread
Abdullah, NF, Doufexi, A, Piechocki, RJ
core   +2 more sources

QoE Optimization of Video Multicast with Heterogeneous Channels and Playback Requirements [PDF]

open access: yes, 2015
We propose an application-layer forward error correction (AL-FEC) code rate allocation scheme to maximize the quality of experience (QoE) of a video multicast. The allocation dynamically assigns multicast clients to the quality layers of a scalable video
Bakhshali, Ali   +3 more
core   +2 more sources

Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets

open access: yesIEEE Access, 2022
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang   +3 more
doaj   +1 more source

Fountain Codes with Nonuniform Selection Distributions through Feedback

open access: yes, 2015
One key requirement for fountain (rateless) coding schemes is to achieve a high intermediate symbol recovery rate. Recent coding schemes have incorporated the use of a feedback channel to improve intermediate performance of traditional rateless codes ...
Cassuto, Yuval   +2 more
core   +1 more source

Rateless resilient network coding against byzantine adversaries [PDF]

open access: yes2013 Proceedings IEEE INFOCOM, 2013
This paper considers rateless network error correction codes for reliable multicast in the presence of adversarial errors. Most existing network error correction codes are designed for a given network capacity and maximum number of errors known a priori to the encoder and decoder.
Huang, Wentao   +3 more
openaire   +3 more sources

Application Layer Systematic Network Coding for Sliced H.264/AVC Video Streaming

open access: yesAdvances in Multimedia, 2012
Application Layer Forward Error Correction (AL-FEC) with rateless codes can be applied to protect the video data over lossy channels. Expanding Window Random Linear Codes (EW RLCs) are a flexible unequal error protection fountain coding scheme which can ...
Sajid Nazir   +3 more
doaj   +1 more source

Evaluation Framework for User Experience in 5G Systems: On Systematic Rateless-Coded Transmissions

open access: yesIEEE Access, 2016
This paper investigates the system performance evaluation framework of systematic rateless-coded (SRCed) transmissions for user experience in future 5G systems.
Ke Xiong   +3 more
doaj   +1 more source

Analysis and Design of Rateless Two-way Relay Networks Based on a Multiply-and-Forward Scheme

open access: yesApplied Sciences, 2020
In this paper, we propose a rateless, three-stage, two-way multiply-and-forward (MF) relaying system over the Rayleigh flat fading channel, where two source nodes communicate with each other through a relay node and all nodes work on half-duplex and time-
Wei Han   +3 more
doaj   +1 more source

Private and rateless adaptive coded matrix-vector multiplication

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Edge computing is emerging as a new paradigm to allow processing data near the edge of the network, where the data is typically generated and collected.
Rawad Bitar   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy