Results 61 to 70 of about 2,273 (173)

Instantly Decodable Network Coding for Real-Time Scalable Video Broadcast over Wireless Networks

open access: yes, 2015
In this paper, we study a real-time scalable video broadcast over wireless networks in instantly decodable network coded (IDNC) systems. Such real-time scalable video has a hard deadline and imposes a decoding order on the video layers.We first derive ...
Aboutorab, Neda   +3 more
core   +1 more source

On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks [PDF]

open access: yes, 2009
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks.
Barros, Joao   +7 more
core   +3 more sources

Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments

open access: yesDigital Communications and Networks
In mobile computing environments, most IoT devices connected to networks experience variable error rates and possess limited bandwidth. The conventional method of retransmitting lost information during transmission, commonly used in data transmission ...
Raffi Dilanchian   +2 more
doaj   +1 more source

Network Coded Multicast over Multibeam Satellite Systems

open access: yesMathematical Problems in Engineering, Volume 2015, Issue 1, 2015., 2015
We propose a multicast scheme for multibeam satellite systems exploiting both the multiuser and spatial diversity inherent in this type of systems while taking into account realistic physical distributions of User Terminals (UTs) over the coverage. Our proposed scheme makes use of the well‐known Adaptive Coding and Modulation (ACM) feature in Digital ...
R. Alegre-Godoy   +2 more
wiley   +1 more source

A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem [PDF]

open access: yes, 2015
The problem of finding network codes for general connections is inherently difficult in capacity constrained networks. Resource minimization for general connections with network coding is further complicated.
Cui, Ying   +6 more
core   +2 more sources

Augmented LT codes over binary extension fields with increased ratio of full‐degree columns

open access: yesElectronics Letters, Volume 60, Issue 5, March 2024.
An augmented scheme of LT codes is proposed to improve the decoding success rate. The method involves substituting the 1 in full‐degree columns of the generator matrix of conventional LT codes with binary extension field elements and simultaneously increasing the ratio of full‐degree columns in the ideal soliton distribution, which allows for higher ...
Changyue Jiang   +3 more
wiley   +1 more source

Review of Rateless‐Network‐Coding‐Based Packet Protection in Wireless Sensor Networks

open access: yesMobile Information Systems, Volume 2015, Issue 1, 2015., 2015
In recent times, there have been many developments in wireless sensor network (WSN) technologies using coding theory. Fast and efficient protection schemes for data transfer over the WSN are some of the issues in coding theory. This paper reviews the issues related to the application of the joint rateless‐network coding (RNC) within the WSN in the ...
A. S. Abdullah   +3 more
wiley   +1 more source

Decoding and File Transfer Delay Balancing in Network Coding Broadcast

open access: yes, 2016
Network Coding is a packet encoding technique which has recently been shown to improve network performance (by reducing delays and increasing throughput) in broadcast and multicast communications.
Lambadaris, Ioannis, Skevakis, Emmanouil
core   +1 more source

Experimental study of the interplay of channel and network coding in low power sensor applications [PDF]

open access: yes, 2013
In this paper, we evaluate the performance of random linear network coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. We also investigate the results of its synergy with forward error correction (FEC) codes at
Angelopoulos, Georgios   +3 more
core   +2 more sources

A Two‐Dimensional Multiarmed Bandit Approach to Secondary Users with Network Coding in Cognitive Radio Networks

open access: yesMathematical Problems in Engineering, Volume 2015, Issue 1, 2015., 2015
We study how to utilize network coding to improve the throughput of secondary users (SUs) in cognitive radio networks (CRNs) when the channel quality is unavailable at SUs. We use a two‐dimensional multiarmed bandit (MAB) approach to solve the problem of SUs with network coding under unknown channel quality in CRNs.
Yuben Qu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy