Results 31 to 40 of about 2,273 (173)
Abstract The authors present a strategy that improves the reliability of data transmission from multiple sources towards a destination D via multiple relays over wireless channels. After the broadcast phase, the destination selects the best cooperative direct link sources with the highest instantaneous signal‐to‐noise ratio , then generates and sends ...
E. Benamira, F. Merazka, G. K. Kurt
wiley +1 more source
An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC [PDF]
This letter proposes an efficient null space-based homomorphic message authentication code scheme providing resistance against tag pollution attacks in random linear network coding, where these attacks constitute a severe security threat. In contrast to data pollution attacks, where an adversary injects into the network corrupted packets, in tag ...
Alireza Esfahani +2 more
openalex +4 more sources
Versatile Network Codes: Energy Consumption in Heterogeneous IoT Devices
In an Internet of Things (IoT), the number of interconnected devices is huge and has been increasing drastically. Their generated data requires powerful aggregated computing resources and consumes enormous energy for processing and transmission.
Vu Nguyen +4 more
doaj +1 more source
Efficient Coded‐Block Delivery and Caching in Information‐Centric Networking
Information‐centric networking (ICN) provides request aggregation and caching strategies that can improve network performance by reducing content server loads and network traffic. Incorporating network coding into ICN can offer several benefits, but a consumer may receive the same coded block from multiple content routers since the coded block may be ...
Yan Liu +6 more
wiley +1 more source
Vehicular Ad hoc NETworks (VANETs) are becoming an important part of people’s daily life, as they support a wild range of applications and have great potential in critical fields such as accident warning, traffic control and management, infotainment, and value‐added services.
Shujuan Wang +3 more
wiley +1 more source
Transmission Rate Sampling and Selection for Reliable Wireless Multicast
The multicast communication concept offers a scalable and efficient method for many classes of applications; however, its potential remains largely unexploited when it comes to link‐layer multicasting in wireless local area networks. The fundamental lacking feature for this is a transmission rate control mechanism that offers higher transmission ...
Thomas Geithner +2 more
wiley +1 more source
FSW: Fulcrum Sliding Window Coding for Low-Latency Communication
Fulcrum Random Linear Network Coding (RLNC) combines outer coding in a large Galois Field, e.g., $GF(2^{8})$ , with inner coding in $GF(2)$ to flexibly trade off the strong protection (low probability of linear dependent coding coefficients) of $GF(2^
Elif Tasdemir +4 more
doaj +1 more source
Dynamic Rate Adaptation for Improved Throughput and Delay in Wireless Network Coded Broadcast [PDF]
In this paper we provide theoretical and simulation-based study of the delivery delay performance of a number of existing throughput optimal coding schemes and use the results to design a new dynamic rate adaptation scheme that achieves improved overall ...
Fu, Amy +2 more
core +4 more sources
HST-NNC: A Novel Hybrid Satellite-Terrestrial Communication With NOMA and Network Coding Systems
Hybrid satellite-terrestrial networks (HSTNs) are considered to be a promising solution in dealing with coverage and mobility challenges encountered in $5^{\mathrm{ th}}$ generation (5G) networks that employ novel multiple access and connectivity ...
Michail Karavolos +3 more
doaj +1 more source
Macrocyclic Dual‐Locked “Turn‐On” Drug for Selective and Traceless Release in Cancer Cells
A dual‐locked approach to embed a small‐molecule drug in a cyclic structure to control bioactivity is described, with the possibility to introduce cell‐targeting entities. Selective and traceless release of the active drug occurs under intracellular conditions found in cancer cells owing to the dual lock and targeting entities. Abstract Drug safety and
Dominik Schauenburg +8 more
wiley +2 more sources

