期刊文献+

LT码的性能分析及仿真 被引量:7

Analysis and Simulation Performance of LT Codes
原文传递
导出
摘要 LT码(Luby Transform Codes)属于喷泉码的其中一种,它是一类基于图的线性纠删码,其应用的信道环境是删除信道(BEC,Binary Erasure Channel)。这里主要介绍在二元删除信道模型下,LT码的4种度分布设计方法及,分析了短码长和长码长情况下的LT码在不同信道删除概率情况下的性能及比较。研究结果表明:在删除概率非常大的情况下,只要译码端接收到足够多的包都能以高概率译出原始数据包,只是产生的冗余度大,这里的结果将为系统选择不同参数的LT码提供参考。 LT codes(Luby Transform Codes) as one of the Fountain codes and a kind of graph-based linear erasure codes,and can be applicated under Binary Erasure Channel(BEC).This paper gives the binary erasure channel model and describes the four design methods for LT codes degree distribution.The performance of LT code with short code length and long code length under the different channel deletion probabilities is analyzed and compared.The experimental results show that in the case of large deletion probability,so long as the decoder receives sufficient number of packets,the original data packet could be recovered with high probability.The research results given in this paper could serve as a reference for system to choose different LT code parameters.
出处 《通信技术》 2012年第5期1-3,共3页 Communications Technology
基金 东南大学移动通信国家重点实验室开放研究基金(No.2010D05) 国家自然科学基金(批准号:61032003 61071100) 成都市科技项目(No.11DXYB081JH)
关键词 喷泉码 LT码 度分布 fountain codes LT codes degree distribution
  • 相关文献

参考文献11

二级参考文献45

  • 1Byers J W, Luby M. A Digital Fountain Approach to Reliable Distribution of Bulk Data[C]. In:ACM SIGCOMM' 98, USA:[s.n.], 1998:792-801.
  • 2Mackay D J. Fountain Codes[J].Proceedings IEEE, 2005,152(6): 1062-1068.
  • 3Shokrollahi A. Raptor Codes[J]. IEEE Transaction on Information Theory, 2003,15(2): 1-37.
  • 4Di C, Proietti D. Finite-length Anaiysis of Low-density Parity-check Codes on the Binary Erasure Channel[J]. IEEE Transaction on Information Theory, 2002, 48(6): 1570-1579.
  • 5Luby M. LT-codes[C].In:IEEE Transaction on Information Theory, USA: [s.n.],2002: 271-280.
  • 6丹尼斯罗迪.卫星通信[M].北京:人民邮电出版社,2002:200-202.
  • 7Cain J B, cGregor D N. A recommended error control architecture for ATMnetworks with wireless links[J]. IEEE J. Select. Areas Comm, 1997, 15(1):16-28.
  • 8TIA/EIA/IS-787: Interim Standard, Common ATM Satellite Interface Interoperability Specification (CASI) [J]. 1999, (7):
  • 9Li Y, Cimini L J. Bounds on the interchannel interference of OFDM intime-varying impairments[J]. IEEE Trans. Commun., 2001(49):401-404 .
  • 10Ungerboeck G. Channel Coding with Multilevel Phase Signals[J]. IEEE Trans. Info. Theory, 1982(IT-28):55-67.

共引文献18

同被引文献42

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2汪小帆,李翔,陈关荣.复杂网络理论及其应用[M].北京:清华大学出版社,2005.
  • 3GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 4YD/T1699-2007,移动终端信息安全技术要求[S].
  • 5YD/T1700-2007,移动终端信息安全测试方法[S].
  • 6JANSEN Wayne, SCARFONE Karen. Guidelines on Cell Phone and PDA Security[R]. Gaithersburg: NIST Special Publication, 2010.
  • 7SONGTAO Z, DEAN T, KNIGHT S. A Lightweight Approach to State Based Security Testing[C]//Proc. of IBM Centre for Advanced Studies Conference. NJ, United States: IBM Corp. Riverton, 2010: 28.
  • 8MALLOULI W, ORSET J-M, CAVALLI A. A Formal Approach for Testing Security Rules[C]//Pr. of SACMAT'07. NY, United States: ACM New York, 2009: 127-132.
  • 9GARY M, BRUCE P. Software Security Testing[J]. IEEE Security andPrivacy, 2008, 2(5): 81-85..
  • 10YDT1700-2007,移动终端信息安全测试方法[S].

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部