期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Modulation for Digital Radio Broadcasting Using Amplitude Autocorrelation of Pseudo Random Noise Codes to Carry Information
1
作者 Fabrício de Araújo Carvalho Fernando Walter 《Communications and Network》 2013年第3期57-64,共8页
The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the ... The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency. 展开更多
关键词 Digital Radio Broadcasting Spectral Efficiency Pseudo random codes CDMA SDR
下载PDF
Rate Adaptation for Decoding-and-Forward Relay Channel by Random Projections Codes
2
作者 Min Wang Qin Zou Caihui Liu 《Journal of Computer and Communications》 2016年第4期169-179,共11页
This paper investigates rate adaptation schemes for decoding-and-forward (DF) relay system based on random projections codes (RPC). We consider a classic three node relay system model, where relay node performs on hal... This paper investigates rate adaptation schemes for decoding-and-forward (DF) relay system based on random projections codes (RPC). We consider a classic three node relay system model, where relay node performs on half-duplex mode. Then, we give out receiving diversity relay scheme and coding diversity relay scheme, and present their jointly decoding methods. Furthermore, we discuss the performance of the two schemes with different power allocation coefficients. Simulations show that our relay schemes can achieve different gain with the help of relay node. And, we should allocate power to source node to just guarantee relay node can decode successfully, and allocate remain power to relay node as far as possible. In this way, this DF relay system not only achieves diversity gain, but also achieves higher and smooth spectrum efficiency. 展开更多
关键词 Rate Adaptation Decoding-and-Forward Relay random Projections codes Rateless Code
下载PDF
Improved Adaptive Random Convolutional Network Coding Algorithm 被引量:2
3
作者 Guo Wangmei Cai Ning Wang Xiao 《China Communications》 SCIE CSCD 2012年第11期63-69,共7页
To address the issue of field size in random network coding, we propose an Improved Adaptive Random Convolutional Network Coding (IARCNC) algorithm to considerably reduce the amount of occupied memory. The operation o... To address the issue of field size in random network coding, we propose an Improved Adaptive Random Convolutional Network Coding (IARCNC) algorithm to considerably reduce the amount of occupied memory. The operation of IARCNC is similar to that of Adaptive Random Convolutional Network Coding (ARCNC), with the coefficients of local encoding kernels chosen uniformly at random over a small finite field. The difference is that the length of the local encoding kernels at the nodes used by IARCNC is constrained by the depth; meanwhile, increases until all the related sink nodes can be decoded. This restriction can make the code length distribution more reasonable. Therefore, IARCNC retains the advantages of ARCNC, such as a small decoding delay and partial adaptation to an unknown topology without an early estimation of the field size. In addition, it has its own advantage, that is, a higher reduction in memory use. The simulation and the example show the effectiveness of the proposed algorithm. 展开更多
关键词 convolutional network coding adaptive network coding algorithm random coding
下载PDF
On Latency Reductions in Vehicle-to-Vehicle Networks by Random Linear Network Coding 被引量:1
4
作者 Tiantian Zhu Congduan Li +1 位作者 Yanqun Tang Zhiyong Luo 《China Communications》 SCIE CSCD 2021年第6期24-38,共15页
In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenar... In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenario where the demands of a vehicle are satisfied by cooperative transmissions from those one in front is considered.Since the topology of the vehicle network is dynamic,random linear network coding is applied in such a multisource single-sink vehicle-to-vehicle network,where each vehicle is assumed to broadcast messages to others so that the intermediate vehicles between sources and sink can reduce the latency collaboratively.It is shown that the coding scheme can significantly reduce the time delay compared with the non-coding scheme even in the channels with high packet loss rate.In order to further optimize the coding scheme,one can increase the generation size,where the generation size means the number of raw data packets sent by the source node to the sink node in each round of communication.Under the premise of satisfying the coding validity,we can dynamically select the Galois field size according to the number of intermediate nodes.It is not surprised that the reduction in the Galois field size can further reduce the transmission latency. 展开更多
关键词 random linear network coding Vehicleto-Vehicle Markov process Time-critical
下载PDF
True random coded photon counting Lidar 被引量:5
5
作者 Bo Liu Yang Yu +1 位作者 Zhen Chen Weiqiang Han 《Opto-Electronic Advances》 2020年第2期12-17,共6页
A true random coded photon counting Lidar system is proposed in this paper,in which a single photon detector acts as the true random sequence signal generator instead of the traditional function generator.Compared wit... A true random coded photon counting Lidar system is proposed in this paper,in which a single photon detector acts as the true random sequence signal generator instead of the traditional function generator.Compared with the traditional pseudo-random coded method,the true random coded method not only improves the anti-crosstalk capability of the system,but more importantly,it effectively overcomes the adverse effect of the detector’s dead time on the ranging performance.The experiment results show that the ranging performance of the true random coded method is obviously better than that of the pseudo-random coded method.As a result,a three-dimensional scanning imaging of a model car is completed by the true random coded method. 展开更多
关键词 LIDAR photon counting true random coded pseudo-random coded
下载PDF
Modelling of the behavior of marine oil spills: applications based on random walk techniques 被引量:2
6
作者 Li, Zhi-Wei Mead, Christopher T. Zhang, Shu-Shen 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2000年第1期3-8,共6页
A numerical model has been developed to simulate the transport and fate of oil spilled at sea. The model combines the transport and fate processes of spilled oil with the random walk technique. Oil movement under th... A numerical model has been developed to simulate the transport and fate of oil spilled at sea. The model combines the transport and fate processes of spilled oil with the random walk technique. Oil movement under the influence of tidal currents, wind driven currents, and turbulent eddies is simulated by the PLUME RW dispersion model developed by HR Wallingford. The weathering processes in the model represent physical and chemical changes of soil slicks with time, and comprise mechanical spreading, dispersion, evaporation and emulsification. Shoreline stranding is determined approximately using a capacity method for different shoreline types. This paper presents details of the model, and describe the results of various sensitivity tests. The model is suitable for oil spill contingency planning. 展开更多
关键词 oil spill MODELLING random walk technique CLC number: TQ021 4 Document code: A
下载PDF
Angle-Threshold Random Beamforming Scheme for Multi-Antenna System
7
作者 HU Hao LIU Xiaomin YANG Hongwen 《China Communications》 SCIE CSCD 2015年第1期1-10,共10页
Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedba... Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedback load that the sum feedback rate can be a bottleneck for the communication system,especially when the number of users is large.In this paper,a new scheme using pseudo-random beamforming vectors and angle based threshold in the feedback process is proposed.In the proposed scheme,both the base-station and the users have no need to store a codebook.In each access procedure,the base-station generates a pseudo-random beamforming vector,and each user calculates the angle between the beamforming vectors and its channel state information(CSI) vector.If the angle is less than a predefined angle-threshold,the user feeds back its channel quality indicators(CQI),otherwise it keep silence.Compared with the codebook based scheme,the proposed scheme can largely reduce the sum feedback rate with negligible throughput loss.In particular,when the system has a constraint on the total sum feedback rate in uplink channel,the proposed scheme can increase the system throughput significantly. 展开更多
关键词 BEAMFORMING feedback load system throughput random code anglethreshold.
下载PDF
Algebraic Approach to Random Convolutional Network Coding over Wireless Packet Networks
8
作者 郭网媚 刘斌越 蒋馥蔚 《Transactions of Tianjin University》 EI CAS 2013年第4期307-312,共6页
To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is de... To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is deduced, and the coding condition is also presented. Analyses and simulations show that random convolutional coding is capacity-achieving with probability approaching 1. 展开更多
关键词 wireless network coding random convolutional network coding HYPERGRAPH capacity-achieving
下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
9
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves... We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers. 展开更多
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack.
下载PDF
FM interference suppression for PRC-CW radar based on adaptive STFT and time-varying filtering 被引量:9
10
作者 Zhao Zhao Xiangquan Shi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第2期219-223,共5页
The influence of frequency modulation (FM) interfer- ence on correlation detection performance of the pseudo random code continuous wave (PRC-CW) radar is analyzed. It is found that the correlation output deterior... The influence of frequency modulation (FM) interfer- ence on correlation detection performance of the pseudo random code continuous wave (PRC-CW) radar is analyzed. It is found that the correlation output deteriorates greatly when the FM inter- ference power exceeds the anti-jamming limit of the radar. Accord- ing to the fact that the PRC-CW radar echo is a wideband pseudo random signal occupying the whole TF plane, while the FM in- terference only concentrates in a small portion, a new method is proposed based on adaptive short-time Fourier transform (STFT) and time-varying filtering for FM interference suppression. This method filters the received signal by using a binary mask to excise only the portion of the TF plane corrupted by the interference. Two types of interference, linear FM (LFM) and sinusoidal FM (SFM), under different signal-to-jamming ratio (S JR) are studied. It is shown that the proposed method can effectively suppress the FM interference and improve the performance of target detection. 展开更多
关键词 interference suppression frequency modulation in- terference adaptive short-time Fourier transform (STFT) time- varying filtering pseudo random code continuous wave (PRC-CW) radar.
下载PDF
Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles 被引量:2
11
作者 MA LinHua CHANG YiLin Wang ShengDa 《Science in China(Series F)》 2007年第1期99-104,共6页
The distribution law of the random code structure of randomly constructed irregular low-density parity-check (LDPC) codes is studied, Based on the Progressive Edge-Growth (PEG) algorithm, a new algorithm which can... The distribution law of the random code structure of randomly constructed irregular low-density parity-check (LDPC) codes is studied, Based on the Progressive Edge-Growth (PEG) algorithm, a new algorithm which can both ellminate short cycles and keep the distribution of the random code structure is presented, The experimentsl results show that the performance of the irregular LDPC codes constructed by the new algorithm is superior to that of the PEG algorithm, 展开更多
关键词 Low-density parity.check codes cycles random code structure random distribution characteristics
原文传递
Optimal chunk caching in network coding-based qualitative communication
12
作者 Lijun Dong Richard Li 《Digital Communications and Networks》 SCIE CSCD 2022年第1期44-50,共7页
Network processing in the current Internet is at the entirety of the data packet,which is problematic when encountering network congestion.The newly proposed Internet service named Qualitative Communication changes th... Network processing in the current Internet is at the entirety of the data packet,which is problematic when encountering network congestion.The newly proposed Internet service named Qualitative Communication changes the network processing paradigm to an even finer granularity,namely chunk level,which obsoletes many existing networking policies and schemes,especially the caching algorithms and cache replacement policies that have been extensively explored in Web Caching,Content Delivery Networks(CDN)or Information-Centric Networks(ICN).This paper outlines all the new factors that are brought by random linear network coding-based Qualitative Communication and proves the importance and necessity of considering them.A novel metric is proposed by taking these new factors into consideration.An optimization problem is formulated to maximize the metric value of all retained chunks in the local storage of network nodes under the constraint of storage limit.A cache replacement scheme that obtains the optimal result in a recursive manner is proposed correspondingly.With the help of the introduced intelligent cache replacement algorithm,the performance evaluations show remarkably reduced end-to-end latency compared to the existing schemes in various network scenarios. 展开更多
关键词 Internet Qualitative communication New IP Chunk caching random linear network coding End-to-end latency Cache replacement policy Degree of freedom Distance Packet size
下载PDF
M-IRSA:Multi-Packets Transmitted Irregular Repetition Slotted Aloha
13
作者 SUN Jingyun LIU Zhen WU Yang 《ZTE Communications》 2020年第4期62-68,共7页
The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded rando... The design of random media access control(MAC) protocol has been attracting great attention for satellite communication networks,where the propagation delay is long and the traffic load is varying.Advanced coded random access schemes tend to provide resource allocation strategies for massive uncoordinated devices,where multiple packet replicas from each user are transmitted in random slots of the frame and successive interference cancellation(SIC) iterations are tracked to recover collided packets at the receiver.It is assumed that each active user just has a single information packet to be transmitted.In this paper,an MAC layer random access scheme named Multi-Packets Transmitted Irregular Repetition Slotted Aloha(M-IRSA) is proposed.Different from the existing advanced random access schemes,the M-IRSA scheme supports various number of packet transmission per user by using pre-coding procedure.Joint decoding combined with SIC iterations and local decoding is analyzed.The simulation results show that the proposed scheme is more efficient compared with the IRSA scheme without packet loss rate(PLR) loss. 展开更多
关键词 ALOHA coded random access MAC satellite network successive interference cancellation
下载PDF
Fuzzy and IRLNC-based routing approach to improve data storage and system reliability in IoT
14
作者 U.Indumathi A.R.Arunachalam 《Intelligent and Converged Networks》 EI 2024年第1期68-80,共13页
Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper installation.While performing this entire process,there is a high pos... Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper installation.While performing this entire process,there is a high possibility for data corruption in the mid of transmission.On the other hand,the network performance is also affected due to various attacks.To address these issues,an efficient algorithm that jointly offers improved data storage and reliable routing is proposed.Initially,after the deployment of sensor nodes,the election of the storage node is achieved based on a fuzzy expert system.Improved Random Linear Network Coding(IRLNC)is used to create an encoded packet.This encoded packet from the source and neighboring nodes is transmitted to the storage node.Finally,to transmit the encoded packet from the storage node to the destination shortest path is found using the Destination Sequenced Distance Vector(DSDV)algorithm.Experimental analysis of the proposed work is carried out by evaluating some of the statistical metrics.Average residual energy,packet delivery ratio,compression ratio and storage time achieved for the proposed work are 8.8%,0.92%,0.82%,and 69 s.Based on this analysis,it is revealed that better data storage system and system reliability is attained using this proposed work. 展开更多
关键词 Internet of Things(IoT) data storage management fuzzy system improved random linear network coding energy utilization system reliability
原文传递
Efficient Scheduling with Random Network Coding in Multi-Relay Wireless Network 被引量:1
15
作者 丁良辉 毕琰 +2 位作者 孙大佳 杨峰 钱良 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第1期59-64,共6页
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(... In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost. 展开更多
关键词 random network coding SCHEDULING automatic repeat request (ARQ) multi-relay wireless networks
原文传递
Sequential 3→1 quantum random access code utilizing unsharp measurements
16
作者 Zhiguang Pang Jiang Gao +3 位作者 Tianlei Hou Min Wei Jian Li Qin Wang 《Chinese Optics Letters》 SCIE EI CAS CSCD 2021年第11期133-137,共5页
Quantum random access codes(QRACs) are important communication tasks that are usually implemented in prepare-andmeasure scenarios. The receiver tries to retrieve one arbitrarily chosen bit of the original bit-string f... Quantum random access codes(QRACs) are important communication tasks that are usually implemented in prepare-andmeasure scenarios. The receiver tries to retrieve one arbitrarily chosen bit of the original bit-string from the code qubit sent by the sender. In this Letter, we analyze in detail the sequential version of the 3 → 1 QRAC with two receivers. The average successful probability for the strategy of unsharp measurement is derived. The prepare-and-measure strategy within projective measurement is also discussed. It is found that sequential 3 → 1 QRAC with weak measurement cannot be always superior to the one with projective measurement, as the 2 → 1 version can be. 展开更多
关键词 quantum random access codes unsharp measurement prepare-and-measure scenario
原文传递
Exact Decoding Probability of Random Linear Network Coding for Combinatorial Networks
17
作者 LI Fang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第5期391-396,共6页
Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in ... Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in which one source sends messages to k destinations through m relays using random linear network coding over a Galois field. The formulation at a (all) sink(s) represents the impact of major parameters, i.e., the size of field, the number of relays (and sinks) and provides theoretical groundings to numerical results in the literature. Such condition maps to the receivers' capability to decode the original information and its mathematical characterization is helpful to design the coding. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized. 展开更多
关键词 random linear network coding successful probability combinatorial networks
原文传递
Application of Polar Code-Based Scheme in Cloud Secure Storage
18
作者 Zhe Li Yiliang Han Yu Li 《国际计算机前沿大会会议论文集》 2020年第1期676-689,共14页
In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud st... In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability. 展开更多
关键词 Post-quantum cryptography Polar code random linear code encryption Code-based scheme Cloud storage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部