Applications of multicast technology in space information network are increasing year by year. Due to the inherent characteristics of space information network, the existing multicast protocols are difficult to meet t...
详细信息
ISBN:
(纸本)9781509007295
Applications of multicast technology in space information network are increasing year by year. Due to the inherent characteristics of space information network, the existing multicast protocols are difficult to meet the high-quality service requirements and the need for reliability. A coding-aware and load balancing reliable multicast protocol in space information network is proposed. A coding-aware and load balancing routing metric is designed. This paper defines a load balancing factor to measure load status of the node and the Expected Transmission Time with coding to measure the coding gain. A new route metric ECTTL (Expected Transmission Time with coding and Load balancing) which combines the two factors is designed to select the high throughput path routes. It not only has the potential coding opportunity but is also able to prevent routing node overflows due to overload. In route establishment process, according to different business needs, it is preferable to use ECTTL metric to build multipath multicast tree and network coding method to encode the data for transmission. The coding-aware load balancing and reliable multicast protocol LCRM is simulated and analyzed in NS-2 simulation platform, The results showed that the design of coding-aware load balancing and reliable multicast protocol LCRM had good performance in reducing the end-to-end delay, routing overhead and improving the network throughput.
Proving or disproving an information inequality is a crucial step in establishing the converse results in the coding theorems of communication networks. However, next generation networks are very large-scale, typicall...
详细信息
ISBN:
(纸本)9781479958320
Proving or disproving an information inequality is a crucial step in establishing the converse results in the coding theorems of communication networks. However, next generation networks are very large-scale, typically involving multiple users and many transceivers and relays. This means that an information inequality involving many random variables can be difficult to be proved or disproved manually. In HI, Yeung developed a framework that uses linear programming for verifying linear information inequalities, and it was recently shown in 121 that this framework can be used to explicitly construct an analytic proof of an information inequality or an analytic counterexample to disprove it if the inequality is not true in general. In this paper, we consider the construction of the smallest counterexample, and also give sufficient conditions for that the inequality can be manipulated to become true. We also describe the software development of automating this analytical framework enabled by cloud computing to analytically verify information inequalities in large-scale problem setting.
In this paper we consider the issue of Distributed Video coding (DVC) over practical channel which involves Gaussian noisy channel. Since the research on DVC over practical channel with respect to modulation is still ...
详细信息
In this paper, we report on a study that was carried out to investigate students' opinions on learning and accepting coding standards in programming courses. We used a questionnaire survey to gather data. We also ...
详细信息
Sabotage-proof message dissemination is critical for a successful protest. To successfully propagate the messages to the crowd, it is critical to develop a sabotage-proof protocol to discover the messengers for inform...
详细信息
ISBN:
(纸本)9798350336672
Sabotage-proof message dissemination is critical for a successful protest. To successfully propagate the messages to the crowd, it is critical to develop a sabotage-proof protocol to discover the messengers for information relay. The protocol should be simple, efficient, and sabotage-proof. In this paper, we review the previous protocols and propose a new protocol that exploits the Brownian-motion of the protesters. The proposed distributed protocol is simple, but it is robust against sabotage. In every message propagation, the sender encodes the message with erasure coding into multiple packets, then the sender broadcasts one packet after another while the protesters are in Brownian-motion. The receivers that do not receive all packets but receive enough packets to decode the original message will be the potential messengers. Mathematical analysis and simulation verified the viability of the proposed protocol.
In this paper, we consider the problem of Multiple-Input-Single-Output (MISO) Free-Space Optical (FSO) communications with intensity-modulation and direct-detection (IM/DD). Unlike the commonly adopted Gaussian-noise ...
详细信息
ISBN:
(纸本)9781538620700
In this paper, we consider the problem of Multiple-Input-Single-Output (MISO) Free-Space Optical (FSO) communications with intensity-modulation and direct-detection (IM/DD). Unlike the commonly adopted Gaussian-noise approximation, we adopt the exact Poisson statistics for the number of photons falling on the receiver. In particular, we compare three popular MISO schemes;namely, repetition coding (RC), optical spatial modulation (OSM) and spatial multiplexing (SMux). For each one of these schemes, we derive the optimal maximum-likelihood (ML) decoder and we contrast the schemes in terms of rate, performance, complexity, channel state information requirements and tolerance to channel estimation errors.
In this work, we propose a flooding-based routing protocol using network coding for underwater communications. Due to the high amount of duplicates that flooding-based protocols flood into the network, the sharing of ...
详细信息
In this paper, we provide a tight estimation of the security gap for the wiretap channel with fast Rayleigh fading. The error rate has already been used as a practical physical layer security metric, and the security ...
详细信息
ISBN:
(纸本)9781467324809
In this paper, we provide a tight estimation of the security gap for the wiretap channel with fast Rayleigh fading. The error rate has already been used as a practical physical layer security metric, and the security gap has been defined to exploit such a metric over the wiretap channel with additive white Gaussian noise. We study two different approaches for estimating the security gap also over a fast fading wiretap channel. The first approach is quite conservative, and tends to overestimate the security gap. The second approach instead allows to perform a more realistic evaluation, and to highlight the gain achievable through information scrambling and coding, even when both the legitimate receiver and the eavesdropper channels are known only in statistical terms.
In order to overcome the security and integrity problems of the traditional university file information resource sharing model, the paper proposes a new cloud computing-based university file information resource shari...
详细信息
ISBN:
(纸本)9781665438926
In order to overcome the security and integrity problems of the traditional university file information resource sharing model, the paper proposes a new cloud computing-based university file information resource sharing model. Supported by the cloud computing system architecture, the use of cloud computing search algorithms to fully excavate university archives information resources to realize the comprehensive sharing of university information archives, and calculate the utility parameters of university archives information resource sharing based on the mining results of cloud computing , and build a communication consumption matrix for the sharing of archives information resources in colleges and universities, and complete the construction of the sharing model of archives information resources in colleges. The comparative experiment results show that compared with the traditional sharing model, the intrusion rate and sharing transmission loss of the constructed sharing model are significantly reduced, indicating that the constructed model can effectively realize the sharing of archive information resources in universities and ensure the integrity and safety of archives.
Image compression is a key technique in the fields of communications and multimedia, and it has very broad application prospects. On the basis of the image compression technologies reviewing, this paper mainly discuss...
详细信息
ISBN:
(纸本)9783642254369;9783642254376
Image compression is a key technique in the fields of communications and multimedia, and it has very broad application prospects. On the basis of the image compression technologies reviewing, this paper mainly discussed methods of three novel image compression coding these includes wavelet transform based, fractal based and model based, and summarized their advantage and disadvantage. Pointed out that integrated multi-coding algorithm will be the direction of new generation image coding.
暂无评论