scholarly journals Overlapped LT codes over the binary erasure channel: analysis and design

2019 ◽  
Vol 13 (16) ◽  
pp. 2567-2572
Author(s):  
Khaled F. Hayajneh ◽  
Shahram Yousefi
2021 ◽  
Author(s):  
Xianyu Wang ◽  
Cong Li ◽  
Jinlin Tan ◽  
Rui Zhang ◽  
Zhifeng Liang ◽  
...  

Abstract In this paper, the Binary Erasure Channel (BEC) is researched by Distributed Arithmetic Coding (DAC) based on Slepian-Wolf coding framework. The source and side information are modelled as a virtual BEC. The DAC decoder uses maximum a posteriori (MAP) as the criterion to recover the source. A deep residual network is used to boost the DAC decoding process. The experimental results show that our algorithm nearly achieves the same performance with LT codes under different erasure probabilities.


2005 ◽  
Vol 9 (6) ◽  
pp. 546-548 ◽  
Author(s):  
M. Rashidpour ◽  
A. Shokrollahi ◽  
S.H. Jamali

2017 ◽  
Vol 63 (7) ◽  
pp. 4357-4378 ◽  
Author(s):  
Christian Hager ◽  
Henry D. Pfister ◽  
Alexandre Graell i Amat ◽  
Fredrik Brannstrom

2016 ◽  
Vol 12 (12) ◽  
pp. 155014771668360
Author(s):  
Zhenhua Yuan ◽  
Chen Chen ◽  
Ye Jin

In this article, we study secure multipath routing with energy efficiency for a wireless sensor network in the presence of eavesdroppers. We consider two objectives: (1) the multipath routing scheme for maximising the energy efficiency with security constraints and (2) the multipath routing scheme for maximising the secrecy capacity. The binary erasure channel model is adopted to describe the wireless channel states among neighbouring nodes. Based on the binary erasure channel model, the problem of multipath routing degrades to a problem of bit allocation for each path. We formulate the problems and find that the problems are both quasi-convex. For the first one, it is a linear fractional optimisation problem. The optimal solution is obtained by the Charnes–Cooper transformation. For the second one, we propose an iterative algorithm to obtain the [Formula: see text]-optimal solution. The performance analysis shows that the probability of the secure bit allocation increases along with the number of multipaths and decreases along with the number of hops per path and eavesdroppers. Simulation results are presented to illustrate the proposed algorithms.


Author(s):  
Luis Salamanca ◽  
Pablo M. Olmos ◽  
Juan Jose Murillo-Fuentes ◽  
Fernando Perez-Cruz

Sign in / Sign up

Export Citation Format

Share Document