The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the ...The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency.展开更多
This paper investigates rate adaptation schemes for decoding-and-forward (DF) relay system based on random projections codes (RPC). We consider a classic three node relay system model, where relay node performs on hal...This paper investigates rate adaptation schemes for decoding-and-forward (DF) relay system based on random projections codes (RPC). We consider a classic three node relay system model, where relay node performs on half-duplex mode. Then, we give out receiving diversity relay scheme and coding diversity relay scheme, and present their jointly decoding methods. Furthermore, we discuss the performance of the two schemes with different power allocation coefficients. Simulations show that our relay schemes can achieve different gain with the help of relay node. And, we should allocate power to source node to just guarantee relay node can decode successfully, and allocate remain power to relay node as far as possible. In this way, this DF relay system not only achieves diversity gain, but also achieves higher and smooth spectrum efficiency.展开更多
To address the issue of field size in random network coding, we propose an Improved Adaptive Random Convolutional Network Coding (IARCNC) algorithm to considerably reduce the amount of occupied memory. The operation o...To address the issue of field size in random network coding, we propose an Improved Adaptive Random Convolutional Network Coding (IARCNC) algorithm to considerably reduce the amount of occupied memory. The operation of IARCNC is similar to that of Adaptive Random Convolutional Network Coding (ARCNC), with the coefficients of local encoding kernels chosen uniformly at random over a small finite field. The difference is that the length of the local encoding kernels at the nodes used by IARCNC is constrained by the depth; meanwhile, increases until all the related sink nodes can be decoded. This restriction can make the code length distribution more reasonable. Therefore, IARCNC retains the advantages of ARCNC, such as a small decoding delay and partial adaptation to an unknown topology without an early estimation of the field size. In addition, it has its own advantage, that is, a higher reduction in memory use. The simulation and the example show the effectiveness of the proposed algorithm.展开更多
In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenar...In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenario where the demands of a vehicle are satisfied by cooperative transmissions from those one in front is considered.Since the topology of the vehicle network is dynamic,random linear network coding is applied in such a multisource single-sink vehicle-to-vehicle network,where each vehicle is assumed to broadcast messages to others so that the intermediate vehicles between sources and sink can reduce the latency collaboratively.It is shown that the coding scheme can significantly reduce the time delay compared with the non-coding scheme even in the channels with high packet loss rate.In order to further optimize the coding scheme,one can increase the generation size,where the generation size means the number of raw data packets sent by the source node to the sink node in each round of communication.Under the premise of satisfying the coding validity,we can dynamically select the Galois field size according to the number of intermediate nodes.It is not surprised that the reduction in the Galois field size can further reduce the transmission latency.展开更多
A true random coded photon counting Lidar system is proposed in this paper,in which a single photon detector acts as the true random sequence signal generator instead of the traditional function generator.Compared wit...A true random coded photon counting Lidar system is proposed in this paper,in which a single photon detector acts as the true random sequence signal generator instead of the traditional function generator.Compared with the traditional pseudo-random coded method,the true random coded method not only improves the anti-crosstalk capability of the system,but more importantly,it effectively overcomes the adverse effect of the detector’s dead time on the ranging performance.The experiment results show that the ranging performance of the true random coded method is obviously better than that of the pseudo-random coded method.As a result,a three-dimensional scanning imaging of a model car is completed by the true random coded method.展开更多
A numerical model has been developed to simulate the transport and fate of oil spilled at sea. The model combines the transport and fate processes of spilled oil with the random walk technique. Oil movement under th...A numerical model has been developed to simulate the transport and fate of oil spilled at sea. The model combines the transport and fate processes of spilled oil with the random walk technique. Oil movement under the influence of tidal currents, wind driven currents, and turbulent eddies is simulated by the PLUME RW dispersion model developed by HR Wallingford. The weathering processes in the model represent physical and chemical changes of soil slicks with time, and comprise mechanical spreading, dispersion, evaporation and emulsification. Shoreline stranding is determined approximately using a capacity method for different shoreline types. This paper presents details of the model, and describe the results of various sensitivity tests. The model is suitable for oil spill contingency planning.展开更多
Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedba...Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedback load that the sum feedback rate can be a bottleneck for the communication system,especially when the number of users is large.In this paper,a new scheme using pseudo-random beamforming vectors and angle based threshold in the feedback process is proposed.In the proposed scheme,both the base-station and the users have no need to store a codebook.In each access procedure,the base-station generates a pseudo-random beamforming vector,and each user calculates the angle between the beamforming vectors and its channel state information(CSI) vector.If the angle is less than a predefined angle-threshold,the user feeds back its channel quality indicators(CQI),otherwise it keep silence.Compared with the codebook based scheme,the proposed scheme can largely reduce the sum feedback rate with negligible throughput loss.In particular,when the system has a constraint on the total sum feedback rate in uplink channel,the proposed scheme can increase the system throughput significantly.展开更多
To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is de...To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is deduced, and the coding condition is also presented. Analyses and simulations show that random convolutional coding is capacity-achieving with probability approaching 1.展开更多
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves...We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.展开更多
The influence of frequency modulation (FM) interfer- ence on correlation detection performance of the pseudo random code continuous wave (PRC-CW) radar is analyzed. It is found that the correlation output deterior...The influence of frequency modulation (FM) interfer- ence on correlation detection performance of the pseudo random code continuous wave (PRC-CW) radar is analyzed. It is found that the correlation output deteriorates greatly when the FM inter- ference power exceeds the anti-jamming limit of the radar. Accord- ing to the fact that the PRC-CW radar echo is a wideband pseudo random signal occupying the whole TF plane, while the FM in- terference only concentrates in a small portion, a new method is proposed based on adaptive short-time Fourier transform (STFT) and time-varying filtering for FM interference suppression. This method filters the received signal by using a binary mask to excise only the portion of the TF plane corrupted by the interference. Two types of interference, linear FM (LFM) and sinusoidal FM (SFM), under different signal-to-jamming ratio (S JR) are studied. It is shown that the proposed method can effectively suppress the FM interference and improve the performance of target detection.展开更多
The distribution law of the random code structure of randomly constructed irregular low-density parity-check (LDPC) codes is studied, Based on the Progressive Edge-Growth (PEG) algorithm, a new algorithm which can...The distribution law of the random code structure of randomly constructed irregular low-density parity-check (LDPC) codes is studied, Based on the Progressive Edge-Growth (PEG) algorithm, a new algorithm which can both ellminate short cycles and keep the distribution of the random code structure is presented, The experimentsl results show that the performance of the irregular LDPC codes constructed by the new algorithm is superior to that of the PEG algorithm,展开更多
Network processing in the current Internet is at the entirety of the data packet,which is problematic when encountering network congestion.The newly proposed Internet service named Qualitative Communication changes th...Network processing in the current Internet is at the entirety of the data packet,which is problematic when encountering network congestion.The newly proposed Internet service named Qualitative Communication changes the network processing paradigm to an even finer granularity,namely chunk level,which obsoletes many existing networking policies and schemes,especially the caching algorithms and cache replacement policies that have been extensively explored in Web Caching,Content Delivery Networks(CDN)or Information-Centric Networks(ICN).This paper outlines all the new factors that are brought by random linear network coding-based Qualitative Communication and proves the importance and necessity of considering them.A novel metric is proposed by taking these new factors into consideration.An optimization problem is formulated to maximize the metric value of all retained chunks in the local storage of network nodes under the constraint of storage limit.A cache replacement scheme that obtains the optimal result in a recursive manner is proposed correspondingly.With the help of the introduced intelligent cache replacement algorithm,the performance evaluations show remarkably reduced end-to-end latency compared to the existing schemes in various network scenarios.展开更多
The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded rando...The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded random access schemes tend to provide resource allocation strategies for massive uncoordinated devices,where multiple packet replicas from each user are transmitted in random slots of the frame and successive interference cancellation(SIC) iterations are tracked to recover collided packets at the receiver.It is assumed that each active user just has a single information packet to be transmitted.In this paper,an MAC layer random access scheme named Multi-Packets Transmitted Irregular Repetition Slotted Aloha(M-IRSA) is proposed.Different from the existing advanced random access schemes,the M-IRSA scheme supports various number of packet transmission per user by using pre-coding procedure.Joint decoding combined with SIC iterations and local decoding is analyzed.The simulation results show that the proposed scheme is more efficient compared with the IRSA scheme without packet loss rate(PLR) loss.展开更多
Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper installation.While performing this entire process,there is a high pos...Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper installation.While performing this entire process,there is a high possibility for data corruption in the mid of transmission.On the other hand,the network performance is also affected due to various attacks.To address these issues,an efficient algorithm that jointly offers improved data storage and reliable routing is proposed.Initially,after the deployment of sensor nodes,the election of the storage node is achieved based on a fuzzy expert system.Improved Random Linear Network Coding(IRLNC)is used to create an encoded packet.This encoded packet from the source and neighboring nodes is transmitted to the storage node.Finally,to transmit the encoded packet from the storage node to the destination shortest path is found using the Destination Sequenced Distance Vector(DSDV)algorithm.Experimental analysis of the proposed work is carried out by evaluating some of the statistical metrics.Average residual energy,packet delivery ratio,compression ratio and storage time achieved for the proposed work are 8.8%,0.92%,0.82%,and 69 s.Based on this analysis,it is revealed that better data storage system and system reliability is attained using this proposed work.展开更多
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(...In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.展开更多
Quantum random access codes(QRACs) are important communication tasks that are usually implemented in prepare-andmeasure scenarios. The receiver tries to retrieve one arbitrarily chosen bit of the original bit-string f...Quantum random access codes(QRACs) are important communication tasks that are usually implemented in prepare-andmeasure scenarios. The receiver tries to retrieve one arbitrarily chosen bit of the original bit-string from the code qubit sent by the sender. In this Letter, we analyze in detail the sequential version of the 3 → 1 QRAC with two receivers. The average successful probability for the strategy of unsharp measurement is derived. The prepare-and-measure strategy within projective measurement is also discussed. It is found that sequential 3 → 1 QRAC with weak measurement cannot be always superior to the one with projective measurement, as the 2 → 1 version can be.展开更多
Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in ...Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in which one source sends messages to k destinations through m relays using random linear network coding over a Galois field. The formulation at a (all) sink(s) represents the impact of major parameters, i.e., the size of field, the number of relays (and sinks) and provides theoretical groundings to numerical results in the literature. Such condition maps to the receivers' capability to decode the original information and its mathematical characterization is helpful to design the coding. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized.展开更多
In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud st...In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability.展开更多
文摘The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency.
文摘This paper investigates rate adaptation schemes for decoding-and-forward (DF) relay system based on random projections codes (RPC). We consider a classic three node relay system model, where relay node performs on half-duplex mode. Then, we give out receiving diversity relay scheme and coding diversity relay scheme, and present their jointly decoding methods. Furthermore, we discuss the performance of the two schemes with different power allocation coefficients. Simulations show that our relay schemes can achieve different gain with the help of relay node. And, we should allocate power to source node to just guarantee relay node can decode successfully, and allocate remain power to relay node as far as possible. In this way, this DF relay system not only achieves diversity gain, but also achieves higher and smooth spectrum efficiency.
基金supported by the National Science Foundation (NSF) under Grants No.60832001,No.61271174 the National State Key Lab oratory of Integrated Service Network (ISN) under Grant No.ISN01080202
文摘To address the issue of field size in random network coding, we propose an Improved Adaptive Random Convolutional Network Coding (IARCNC) algorithm to considerably reduce the amount of occupied memory. The operation of IARCNC is similar to that of Adaptive Random Convolutional Network Coding (ARCNC), with the coefficients of local encoding kernels chosen uniformly at random over a small finite field. The difference is that the length of the local encoding kernels at the nodes used by IARCNC is constrained by the depth; meanwhile, increases until all the related sink nodes can be decoded. This restriction can make the code length distribution more reasonable. Therefore, IARCNC retains the advantages of ARCNC, such as a small decoding delay and partial adaptation to an unknown topology without an early estimation of the field size. In addition, it has its own advantage, that is, a higher reduction in memory use. The simulation and the example show the effectiveness of the proposed algorithm.
基金This work was supported in part by the Guangdong Basic and Applied Basic Research Foundation under Key Project 2019B1515120032in part by the National Science Foundation of China(NSFC)with grant no.61901534+3 种基金in part by the Science,Technology and Innovation Commission of Shenzhen Municipality with grant no.JCYJ20190807155617099in part by the University Basic Research Fund 20lgpy43in part by the Guangdong Natural Science Foundation of Grant No.2019A1515011622the Foundation of Grant No.2019-JCJQ-JJ-411.
文摘In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenario where the demands of a vehicle are satisfied by cooperative transmissions from those one in front is considered.Since the topology of the vehicle network is dynamic,random linear network coding is applied in such a multisource single-sink vehicle-to-vehicle network,where each vehicle is assumed to broadcast messages to others so that the intermediate vehicles between sources and sink can reduce the latency collaboratively.It is shown that the coding scheme can significantly reduce the time delay compared with the non-coding scheme even in the channels with high packet loss rate.In order to further optimize the coding scheme,one can increase the generation size,where the generation size means the number of raw data packets sent by the source node to the sink node in each round of communication.Under the premise of satisfying the coding validity,we can dynamically select the Galois field size according to the number of intermediate nodes.It is not surprised that the reduction in the Galois field size can further reduce the transmission latency.
基金This work was supported by the National Natural Science Foundation of China(NSFC)(61805249)the Youth Innovation Promotion Association CAS(2019369).
文摘A true random coded photon counting Lidar system is proposed in this paper,in which a single photon detector acts as the true random sequence signal generator instead of the traditional function generator.Compared with the traditional pseudo-random coded method,the true random coded method not only improves the anti-crosstalk capability of the system,but more importantly,it effectively overcomes the adverse effect of the detector’s dead time on the ranging performance.The experiment results show that the ranging performance of the true random coded method is obviously better than that of the pseudo-random coded method.As a result,a three-dimensional scanning imaging of a model car is completed by the true random coded method.
文摘A numerical model has been developed to simulate the transport and fate of oil spilled at sea. The model combines the transport and fate processes of spilled oil with the random walk technique. Oil movement under the influence of tidal currents, wind driven currents, and turbulent eddies is simulated by the PLUME RW dispersion model developed by HR Wallingford. The weathering processes in the model represent physical and chemical changes of soil slicks with time, and comprise mechanical spreading, dispersion, evaporation and emulsification. Shoreline stranding is determined approximately using a capacity method for different shoreline types. This paper presents details of the model, and describe the results of various sensitivity tests. The model is suitable for oil spill contingency planning.
文摘Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedback load that the sum feedback rate can be a bottleneck for the communication system,especially when the number of users is large.In this paper,a new scheme using pseudo-random beamforming vectors and angle based threshold in the feedback process is proposed.In the proposed scheme,both the base-station and the users have no need to store a codebook.In each access procedure,the base-station generates a pseudo-random beamforming vector,and each user calculates the angle between the beamforming vectors and its channel state information(CSI) vector.If the angle is less than a predefined angle-threshold,the user feeds back its channel quality indicators(CQI),otherwise it keep silence.Compared with the codebook based scheme,the proposed scheme can largely reduce the sum feedback rate with negligible throughput loss.In particular,when the system has a constraint on the total sum feedback rate in uplink channel,the proposed scheme can increase the system throughput significantly.
基金Supported by National Natural Science Foundation of China (No.61271174)Young Teachers' Innovation Foundation of Xidian University(K5051303137)
文摘To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is deduced, and the coding condition is also presented. Analyses and simulations show that random convolutional coding is capacity-achieving with probability approaching 1.
文摘We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.
文摘The influence of frequency modulation (FM) interfer- ence on correlation detection performance of the pseudo random code continuous wave (PRC-CW) radar is analyzed. It is found that the correlation output deteriorates greatly when the FM inter- ference power exceeds the anti-jamming limit of the radar. Accord- ing to the fact that the PRC-CW radar echo is a wideband pseudo random signal occupying the whole TF plane, while the FM in- terference only concentrates in a small portion, a new method is proposed based on adaptive short-time Fourier transform (STFT) and time-varying filtering for FM interference suppression. This method filters the received signal by using a binary mask to excise only the portion of the TF plane corrupted by the interference. Two types of interference, linear FM (LFM) and sinusoidal FM (SFM), under different signal-to-jamming ratio (S JR) are studied. It is shown that the proposed method can effectively suppress the FM interference and improve the performance of target detection.
基金Supported by the National Natural Science Foundation of China (Grant No. 60172030)Huawei Science FoundationXidian ISN National Key Laboratory
文摘The distribution law of the random code structure of randomly constructed irregular low-density parity-check (LDPC) codes is studied, Based on the Progressive Edge-Growth (PEG) algorithm, a new algorithm which can both ellminate short cycles and keep the distribution of the random code structure is presented, The experimentsl results show that the performance of the irregular LDPC codes constructed by the new algorithm is superior to that of the PEG algorithm,
文摘Network processing in the current Internet is at the entirety of the data packet,which is problematic when encountering network congestion.The newly proposed Internet service named Qualitative Communication changes the network processing paradigm to an even finer granularity,namely chunk level,which obsoletes many existing networking policies and schemes,especially the caching algorithms and cache replacement policies that have been extensively explored in Web Caching,Content Delivery Networks(CDN)or Information-Centric Networks(ICN).This paper outlines all the new factors that are brought by random linear network coding-based Qualitative Communication and proves the importance and necessity of considering them.A novel metric is proposed by taking these new factors into consideration.An optimization problem is formulated to maximize the metric value of all retained chunks in the local storage of network nodes under the constraint of storage limit.A cache replacement scheme that obtains the optimal result in a recursive manner is proposed correspondingly.With the help of the introduced intelligent cache replacement algorithm,the performance evaluations show remarkably reduced end-to-end latency compared to the existing schemes in various network scenarios.
文摘The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded random access schemes tend to provide resource allocation strategies for massive uncoordinated devices,where multiple packet replicas from each user are transmitted in random slots of the frame and successive interference cancellation(SIC) iterations are tracked to recover collided packets at the receiver.It is assumed that each active user just has a single information packet to be transmitted.In this paper,an MAC layer random access scheme named Multi-Packets Transmitted Irregular Repetition Slotted Aloha(M-IRSA) is proposed.Different from the existing advanced random access schemes,the M-IRSA scheme supports various number of packet transmission per user by using pre-coding procedure.Joint decoding combined with SIC iterations and local decoding is analyzed.The simulation results show that the proposed scheme is more efficient compared with the IRSA scheme without packet loss rate(PLR) loss.
文摘Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper installation.While performing this entire process,there is a high possibility for data corruption in the mid of transmission.On the other hand,the network performance is also affected due to various attacks.To address these issues,an efficient algorithm that jointly offers improved data storage and reliable routing is proposed.Initially,after the deployment of sensor nodes,the election of the storage node is achieved based on a fuzzy expert system.Improved Random Linear Network Coding(IRLNC)is used to create an encoded packet.This encoded packet from the source and neighboring nodes is transmitted to the storage node.Finally,to transmit the encoded packet from the storage node to the destination shortest path is found using the Destination Sequenced Distance Vector(DSDV)algorithm.Experimental analysis of the proposed work is carried out by evaluating some of the statistical metrics.Average residual energy,packet delivery ratio,compression ratio and storage time achieved for the proposed work are 8.8%,0.92%,0.82%,and 69 s.Based on this analysis,it is revealed that better data storage system and system reliability is attained using this proposed work.
基金the National Natural Science Foundation of China(Nos.61102051,61221001 and 61301117)the National High Technology Research and Development Program(863)of China(Nos.2012AA011701 and 2012AA121601)+1 种基金the Shanghai Jiao Tong University Science and Technology Innovation Foundation(No.AF0300021)the Shanghai Key Laboratory Funding(No.12DZ2272600)
文摘In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.
基金This work was supported by the National Key Research and Development Program of China(Nos.2018YFA0306400 and 2017YFA0304100)the National Natural Science Foundation of China(Nos.12074194,11774180,and U19A2075)the Leading-Edge Technology Program of Jiangsu Natural Science Foundation(No.BK20192001)。
文摘Quantum random access codes(QRACs) are important communication tasks that are usually implemented in prepare-andmeasure scenarios. The receiver tries to retrieve one arbitrarily chosen bit of the original bit-string from the code qubit sent by the sender. In this Letter, we analyze in detail the sequential version of the 3 → 1 QRAC with two receivers. The average successful probability for the strategy of unsharp measurement is derived. The prepare-and-measure strategy within projective measurement is also discussed. It is found that sequential 3 → 1 QRAC with weak measurement cannot be always superior to the one with projective measurement, as the 2 → 1 version can be.
基金Supported by the National Natural Science Foundation of China(61271174,61301178)the Science and Technology Innovation Foundation of Xi’an(CXY1352WL28)
文摘Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in which one source sends messages to k destinations through m relays using random linear network coding over a Galois field. The formulation at a (all) sink(s) represents the impact of major parameters, i.e., the size of field, the number of relays (and sinks) and provides theoretical groundings to numerical results in the literature. Such condition maps to the receivers' capability to decode the original information and its mathematical characterization is helpful to design the coding. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized.
基金the National Natural Science Foundation of China(No.61572521)The Scientific Foundation of the Scientific Research and Innovation Team of Engineering University of PAP(No.KYTD201805).
文摘In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability.