In the traditional wireless sensor network (WSN), the multicast router uses the store-and-forward mode to transmit data, which limits the throughput of the wireless sensor network. In 2000, the network coding is propo...
详细信息
ISBN:
(纸本)9781538678619
In the traditional wireless sensor network (WSN), the multicast router uses the store-and-forward mode to transmit data, which limits the throughput of the wireless sensor network. In 2000, the network coding is proposed by Rudolf Ahlswede, Li Shuoyan et al. Therefore, the wireless sensor network can reach the theoretical maximum throughput, save energy and improve the security of data transmission. However, network coding operations involve complex data operations. Excessive coding consumes a large amount of computer CPU and memory resources. Therefore, how to reduce the number of network coding to reduce the computational cost is a prerequisite academic problem on the premise of reaching rate of multicast. An extremely important academic research issue is called network coding Resource Minimization (NCRM). Aiming at the NCRM problem in static wireless sensor networks, this paper proposes an improved path-relinking optimization algorithm based on genetic algorithm, which can locate the initialization parameters to the feasible solution region and adopt local search method to search optimal solution. The strategy further enhances the search ability of chromosomes in optimization algorithm. Experiments show that this algorithm spends less coding times and calculation time than the traditional simple genetic algorithm when achieving the same network throughput.
We propose a delayed parity generation technique for maximum distance separable (MDS) storage codes, for two possible applications: the first is to improve the write-speed during data intake where only a subset of the...
详细信息
ISBN:
(纸本)9781538647813
We propose a delayed parity generation technique for maximum distance separable (MDS) storage codes, for two possible applications: the first is to improve the write-speed during data intake where only a subset of the parities are initially produced and stored into the system, and the rest can be produced from the stored data during a later time of lower system load;the second is to provide better adaptivity, where a lower number of parities can be chosen initially in a storage system, and more parities can be produced when the existing ones are not sufficient to guarantee the needed reliability or performance. In both applications, it is important to reduce the data access as much as possible during the delayed parity generation procedure. For this purpose, we first identify the fundamental limit for delayed parity generation through a connection to the well-known multicast network coding problem, then provide an explicit and low-complexity code transformation that is applicable on any MDS codes to obtain optimal codes. The problem we consider is closely related to the regenerating code problem, however the proposed codes are much simpler and have a much smaller subpacketization factor than regenerating codes, and thus our result in fact shows that blindly adopting regenerating codes in these two settings is unnecessary and wasteful.
This paper studies a K x M multiple-input multiple-output (MIMO) wireless caching that consists of a library, K base stations (BSs), and M users, where each BS and user are equipped with N-T and N-R antennas respectiv...
详细信息
ISBN:
(纸本)9781538643280
This paper studies a K x M multiple-input multiple-output (MIMO) wireless caching that consists of a library, K base stations (BSs), and M users, where each BS and user are equipped with N-T and N-R antennas respectively. Consider that each BS has a local cache that can prefetch some popular data requested by users from the library. We propose a linear network coding (NC) assisted wireless caching, considering the finite cache size and the variability of the user requests. In the cache placement phase, we design a joint NC caching function at K BSs to store linear combinations of messages from the library. In the content delivery phase, each user can successfully decode its requested messages by the receiver shaping and reverse NC operation. Our analytical results verify that, without any shared caching messages at different BSs, the proposed caching scheme is compatible with distinct user requests. In particular, for a 2 x 2 MIMO wireless caching network, the proposed caching scheme can achieve a higher total degree of freedom (DoF) of min(2N(T), 2N(R)) - 1 while consuming a smaller cache size, compared with the existing caching scheme.
—Medical image segmentation is an important step in medical image analysis. With the rapid development of convolutional neural network in image processing, deep learning has been used for medical image segmentation, ...
详细信息
Trajectory-based routing is a common data forwarding protocol while collecting sensor data during a disaster or in a battlefield for situation-awareness. However, wireless sensor networks (WSNs) have limitations in av...
详细信息
ISBN:
(数字)9781728142227
ISBN:
(纸本)9781728142234
Trajectory-based routing is a common data forwarding protocol while collecting sensor data during a disaster or in a battlefield for situation-awareness. However, wireless sensor networks (WSNs) have limitations in available bandwidth and energy. The trajectory-based routing protocols could reduce redundant broadcasting to save energy and bandwidth significantly. In this demo, we will demonstrate the working of a DV-Hop (Distance Vector Hop) based trajectory encoding algorithm using virtual coordinates rather than using GPS data. Using the proposed trajectory based routing protocol, we achieve energy savings, reduced latency, reliability, better coverage, while routing data from a source node to a mobile sink.
We improve on the lower bound of the maximum number of planes in PG(8, q) ∼= F9q pairwise intersecting in at most a point. In terms of constant dimension codes this leads to Aq(9, 4;3) ≥ q12 +2q8 + 2q7 + q6 + 2q5 + ...
详细信息
Communication networks formed by Autonomous Un- derwater Vehicles (AUVs) have recently been employed for a variety of applications in oceanographic exploration and environmental protection, and military uses. The prom...
详细信息
Communication networks formed by Autonomous Un- derwater Vehicles (AUVs) have recently been employed for a variety of applications in oceanographic exploration and environmental protection, and military uses. The promise of such networks is very high, but their performance is limited by the low reliability of communications over the underwater acoustic channel. In order to increase the end-to-end throughput in multi-hop network configurations, chains of relay nodes can be employed. Unfortunately, the usual techniques utilized to address channel errors and packet erasures in multi-hop terrestrial networks such as Automatic Repeat Request (ARQ) and Forward Error Correction (FEC) coding are ineffective in the underwater channel due to adverse multipath propagation and long delays. Solutions based on network coding have, therefore, been investigated in the literature. We propose and evaluate utilization of Batched Sparse (BATS) coding, which is a combination of fountain coding and network coding, in order to improve the resilience of multi-hop underwater acoustic communication networks (UWACNets) consisting of multiple underwater transceiver nodes. BATS coding allows to overcome the limitations of channel coding in terms of robustness and those of network coding in terms of computational complexity, while noticeably improving throughput performance.
The abundance of open-source code, coupled with the success of recent advances in deep learning for natural language processing, has given rise to a promising new application of machine learning to source code. In thi...
详细信息
To address the inability of the standard TCP proto-col to distinguish between losses due to congestion and random packet losses on the noisy channel, this paper proposes an algorithm to dynamically adjust the redundan...
详细信息
We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbo...
详细信息
暂无评论