The function of interleavers in turbo codes are analyzed and the disadvantages of some existing interleavers are pointed out. Two novel interleavers, named Block-based S-random Interleaver(BSI) and Pseudo Random-based...
详细信息
Sabotage-proof message dissemination is critical for a successful protest. To successfully propagate the messages to the crowd, it is critical to develop a sabotage-proof protocol to discover the messengers for inform...
详细信息
ISBN:
(纸本)9798350336672
Sabotage-proof message dissemination is critical for a successful protest. To successfully propagate the messages to the crowd, it is critical to develop a sabotage-proof protocol to discover the messengers for information relay. The protocol should be simple, efficient, and sabotage-proof. In this paper, we review the previous protocols and propose a new protocol that exploits the Brownian-motion of the protesters. The proposed distributed protocol is simple, but it is robust against sabotage. In every message propagation, the sender encodes the message with erasure coding into multiple packets, then the sender broadcasts one packet after another while the protesters are in Brownian-motion. The receivers that do not receive all packets but receive enough packets to decode the original message will be the potential messengers. Mathematical analysis and simulation verified the viability of the proposed protocol.
In this work, we propose a flooding-based routing protocol using network coding for underwater communications. Due to the high amount of duplicates that flooding-based protocols flood into the network, the sharing of ...
详细信息
Partially overlapped channels are barely used for concurrent transmission in WiFi networks, since they lead to collisions where the collided packets cannot be decoded successfully. In this paper, we observe that the a...
详细信息
ISBN:
(纸本)9781467372145
Partially overlapped channels are barely used for concurrent transmission in WiFi networks, since they lead to collisions where the collided packets cannot be decoded successfully. In this paper, we observe that the actual corrupted symbols by partial-channel interference in OFDM-based WiFi networks are not as severe as we expected. There remains extra coding redundancy that can be exploited from the corrupted symbols, and utilized for packet recovery. Accordingly, we present a novel paradigm termed Piros, in order to Push the lImits of paRtially cOncurrent tranSmission in WiFi networks. Piros strategically leverages the coding redundancy according to the overlap portion in a distributed manner, and extracts useful decodinginformation from the corrupted symbols to decode the packet with partial-channel interference.
With advances in computer and informationtechnology, high volumes of a wide variety of valuable data are easily collected and generated in the current era of big data from a broad range of data sources of different v...
详细信息
ISBN:
(纸本)9781509043149
With advances in computer and informationtechnology, high volumes of a wide variety of valuable data are easily collected and generated in the current era of big data from a broad range of data sources of different veracities at a high velocity. As such, many traditional data management and analytic approaches may not be suitable for handling the big data due to their well-known 5V's characteristics. Over the past few years, several systems and applications have developed to use cloud, grid and service computing to manage and analyze big data so as to support data science (e.g., knowledge discovery and data mining). In this paper, we present a big data science solution for social computing and social network analytics so as to provide services and support to big data mining of interesting patterns from big social networks that are stored in key-value databases.
Near-capacity Non-coherent Cooperative Network-coding aided Multi-user (NNCNM) systems are designed with the aid of Extrinsic information Transfer (EXIT) charts for the sake of approaching the Differential Discrete-in...
详细信息
Near-capacity Non-coherent Cooperative Network-coding aided Multi-user (NNCNM) systems are designed with the aid of Extrinsic information Transfer (EXIT) charts for the sake of approaching the Differential Discrete-input Continuous-output Memoryless Channel's (D-DCMC) system capacity(1). The upper and lower Frame Error Ratio (FER) performance bounds are derived for aiding our network coding design. The outage capacity of the D-DCMC channel is also calculated and used for computing the best-case performance bounds of both the corresponding single-link scheme and of the proposed NNCNM system. Moreover, a new technique referred to as the Pragmatic Algebraic Linear Equation Method (PALEM) was proposed for determining the exact number of information sources that may be recovered from the composite NNCNM stream, which constitutes a lower-complexity evaluation of the attainable FER performance of the NNCNM systems without resorting to high-complexity Monte-Carlo simulations. The NNCNM systems advocated are capable of operating within 0.3-0.5 dB from the corresponding D-DCMC capacity. A joint treatment of channel and network coding is considered in our system(2). The design principles presented in this contribution may be extended to a vast range of NNCNM based systems using arbitrary channel coding schemes.
The advantage of network coding has recently been used to several diverse problems of broadcast (single and multi-source), network efficiency, algorithmic complexities and in removal of faulty nodes. In our previous w...
详细信息
Applications of multicast technology in space information network are increasing year by year. Due to the inherent characteristics of space information network, the existing multicast protocols are difficult to meet t...
详细信息
ISBN:
(纸本)9781509007295
Applications of multicast technology in space information network are increasing year by year. Due to the inherent characteristics of space information network, the existing multicast protocols are difficult to meet the high-quality service requirements and the need for reliability. A coding-aware and load balancing reliable multicast protocol in space information network is proposed. A coding-aware and load balancing routing metric is designed. This paper defines a load balancing factor to measure load status of the node and the Expected Transmission Time with coding to measure the coding gain. A new route metric ECTTL (Expected Transmission Time with coding and Load balancing) which combines the two factors is designed to select the high throughput path routes. It not only has the potential coding opportunity but is also able to prevent routing node overflows due to overload. In route establishment process, according to different business needs, it is preferable to use ECTTL metric to build multipath multicast tree and network coding method to encode the data for transmission. The coding-aware load balancing and reliable multicast protocol LCRM is simulated and analyzed in NS-2 simulation platform, The results showed that the design of coding-aware load balancing and reliable multicast protocol LCRM had good performance in reducing the end-to-end delay, routing overhead and improving the network throughput.
Cloud computing has been growing rapidly in the world over the past decade. The Studies and development of this system has met the demand of large number of users in the world. In order to share shared resources, most...
详细信息
In this paper, we consider the problem of Multiple-Input-Single-Output (MISO) Free-Space Optical (FSO) communications with intensity-modulation and direct-detection (IM/DD). Unlike the commonly adopted Gaussian-noise ...
详细信息
ISBN:
(纸本)9781538620700
In this paper, we consider the problem of Multiple-Input-Single-Output (MISO) Free-Space Optical (FSO) communications with intensity-modulation and direct-detection (IM/DD). Unlike the commonly adopted Gaussian-noise approximation, we adopt the exact Poisson statistics for the number of photons falling on the receiver. In particular, we compare three popular MISO schemes;namely, repetition coding (RC), optical spatial modulation (OSM) and spatial multiplexing (SMux). For each one of these schemes, we derive the optimal maximum-likelihood (ML) decoder and we contrast the schemes in terms of rate, performance, complexity, channel state information requirements and tolerance to channel estimation errors.
暂无评论