期刊文献+
共找到3,939篇文章
< 1 2 197 >
每页显示 20 50 100
Recurrent neural network decoding of rotated surface codes based on distributed strategy
1
作者 李帆 李熬庆 +1 位作者 甘启迪 马鸿洋 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期322-330,共9页
Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error corre... Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error correction using neural network-based machine learning methods is a promising approach that is adapted to physical systems without the need to build noise models.In this paper,we use a distributed decoding strategy,which effectively alleviates the problem of exponential growth of the training set required for neural networks as the code distance of quantum error-correcting codes increases.Our decoding algorithm is based on renormalization group decoding and recurrent neural network decoder.The recurrent neural network is trained through the ResNet architecture to improve its decoding accuracy.Then we test the decoding performance of our distributed strategy decoder,recurrent neural network decoder,and the classic minimum weight perfect matching(MWPM)decoder for rotated surface codes with different code distances under the circuit noise model,the thresholds of these three decoders are about 0.0052,0.0051,and 0.0049,respectively.Our results demonstrate that the distributed strategy decoder outperforms the other two decoders,achieving approximately a 5%improvement in decoding efficiency compared to the MWPM decoder and approximately a 2%improvement compared to the recurrent neural network decoder. 展开更多
关键词 quantum error correction rotated surface code recurrent neural network distributed strategy
下载PDF
Downlink network-coded multiple access with diverse power
2
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 network-coded multiple access Physical-layer network coding Multi-user decoder Power allocation Throughput Downlink network
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
3
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Adoption of network and plan-do-check-action in the international classification of disease 10 coding
4
作者 Biao Lian 《World Journal of Clinical Cases》 SCIE 2024年第19期3734-3743,共10页
BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also a... BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding. 展开更多
关键词 Plan-do-check-action cycle management mode Computer network International classification of diseases tenth edition coding Accuracy
下载PDF
Physical Layer Deterministic Network Coding Using PUM Turbo Codes over AWGN Channel, N Nodes through a Base Station Scenario 被引量:2
5
作者 Hani Attar 《Communications and Network》 2016年第4期241-256,共16页
Network Coding (NC) is a recent technique which is used to improve the transmission data rate and the power efficiency. These goals are obtained by combining data together before transmitting them, resulting to less t... Network Coding (NC) is a recent technique which is used to improve the transmission data rate and the power efficiency. These goals are obtained by combining data together before transmitting them, resulting to less transmitted data that carry the same amount of information. NC research work over the physical layer and the upper layers are popular and needed to be more investigated. In this paper, we propose a practical system of large-number of connected multi-source network coding (LMSNC), at the physical layer that exploits the broadcast nature of the wireless channel, using the practical and bandwidth-efficient schemes decode-and-forward (DF) and then compare it with Amplify and Forward (AF). The theoretical analysis and the simulation results show the effect of the noise when it cumulates in AF system and how DF is solving this severe default. Moreover, we consider the MSNC for Small-number of connected sources (SMSNC) and the two-way communication setup where two users exchange their information over an intermediate network node (ideally called Base Station), as two reference cases to compare with. With SMSNC, the number of necessary downlink transmissions from the intermediate node to the users is reduced, and thus the throughput is increased. Simulation results obtained using high-performance non-binary turbo codes, based on Partial Unit Memory (PUM) codes (4, 2, 1, 4) and (8, 4, 3, 8);confirm that combining PUM Turbo Code (PUMTC) and NC in the proposed MSNC setup gives almost the same BER performance as that for SMSNC at the small number of processing steps mainly when PUMTC (8, 4, 3, 8) is performed, which is required to retrieve the received coded messages. In the scenario of AF, combining packets results to cumulate the noise, which justifies the reason we decided to increase the number of transmitted coded messages in the network, i.e., the BER performance improves when sending extra coded messages. Finally, the possibility for a trade-off among BER, data rate and the number of transmitted coded messages is shown for LMSNC through graphics and simulation results. 展开更多
关键词 network coding Cooperative Nodes Forward Error Correction
下载PDF
Homomorphic Error-Control Codes for Linear Network Coding in Packet Networks
6
作者 Xiaodong Han Fei Gao 《China Communications》 SCIE CSCD 2017年第9期178-189,共12页
In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is hom... In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is homomorphic network error-control code in network coding. That is, if the source packets at the source node for a linear network coding are precoded using a linear block code, then every packet flowing in the network regarding to the source satisfies the same constraints as the source. As a consequence, error detection and correction can be performed at every intermediate nodes of multicast flow, rather than only at the destination node in the conventional way, which can help to identify and correct errors timely at the error-corrupted link and save the cost of forwarding error-corrupted data to the destination node when the intermediate nodes are ignorant of the errors. In addition, three examples are demonstrated which show that homomorphic linear code can be combined with homomorphic signature, McEliece public-key cryptosystem and unequal error protection respectively and thus have a great potential of practical utility. 展开更多
关键词 network coding network errorcorrection homomorphic LINEAR CODE multi-cast
下载PDF
Joint Iterative Decoding for Network-Coding-Based Multisource LDPC-Coded Cooperative MIMO
7
作者 张顺外 仰枫帆 唐蕾 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2014年第4期420-430,共11页
A network-coding-based multisource LDPC-coded cooperative MIMO scheme is proposed,where multiple sources transmit their messages to the destination with the assistance from a single relay.The relay cooperates with mul... A network-coding-based multisource LDPC-coded cooperative MIMO scheme is proposed,where multiple sources transmit their messages to the destination with the assistance from a single relay.The relay cooperates with multiple sources simultaneously via network-coding.It avoids the issues of imperfect frequency/timing synchronization and large transmission delay which may be introduced by frequency-division multiple access(FDMA)/code-division multiple access(CDMA)and time-division multiple access(TDMA)manners.The proposed joint″Min-Sum″iterative decoding is effectively carried out in the destination.Such a decoding algorithm agrees with the introduced equivalent joint Tanner graph which can be used to fully characterize LDPC codes employed by the sources and relay.Theoretical analysis and numerical simulation show that the proposed scheme with joint iterative decoding can achieve significant cooperation diversity gain.Furthermore,for the relay,compared with the cascade scheme,the proposed scheme has much lower complexity of LDPC-encoding and is easier to be implemented in the hardware with similar bit error rate(BER)performance. 展开更多
关键词 cooperative MIMO network coding LDPC codes equivalent joint Tanner graph joint iterative decoding
下载PDF
Multi-Source Spinal Coding for Coded Caching Multicast Transmissions in Wireless Networks
8
作者 Aimin Tang Xudong Wang 《China Communications》 SCIE CSCD 2021年第3期91-104,共14页
Recently,coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks.To support high efficient coded caching multicast transmissions,the time-varying heterogeneous chan... Recently,coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks.To support high efficient coded caching multicast transmissions,the time-varying heterogeneous channel conditions need to be considered.In this paper,a practical and novel multi-source spinal coding(MSSC)scheme is developed for coded caching multicast transmissions under heterogeneous channel conditions.By exploring joint design of network coding and spinal coding(SC),MSSC can achieve unequal link rates in multicast transmissions for different users.Moreover,by leveraging the rateless feature of SC in our design,MSSC can well adapt the link rates of all users in multicast transmissions without any feedback of time-varying channel conditions.A maximum likelihood(ML)based decoding process for MSSC is also developed,which can achieve a linear complexity with respect to the user number in the multicast transmission.Simulation results validate the effectiveness of the MSSC scheme.Compared to the existing scheme,the sum rate of MSSC in multicast transmissions is improved by about 20%.When applying MSSC in coded caching systems,the total transmission time can be reduced by up to 48% for time-varying channels. 展开更多
关键词 coded caching spinal code network coding multicast transmission wireless networks
下载PDF
Data Combination over Physical Layer Using Network Coding with PUM Turbo Codes
9
作者 Hani Attar 《Journal of Computer and Communications》 2017年第6期32-44,共13页
The Base Station (BS) or access point is the building block of wireless networks, so, we propose exploiting it together with the Network Coding (NC) principle. NC suffers from the complexity of the decoding processes,... The Base Station (BS) or access point is the building block of wireless networks, so, we propose exploiting it together with the Network Coding (NC) principle. NC suffers from the complexity of the decoding processes, i.e., complicated Jordan Gaussian Elimination (JGE) processes. So, this paper proposes a deterministic NC algorithm to reduce the number of sequential network decoding steps, and hence minimizing the complexity of JGE process resulting to better time delay and processing time. We propose an algorithm that combines higher number of the transmitted packets resulting to better data-rate but worse Bet Error Rate (BER). However, using such strong Forward error correction channel code, which is Partial Unit Memory Turbo Code (PUMTC) results to minimize the losses in the BER to a very acceptable lever, in fact, in Decode-and-Forward (DF) BS, the BER can be regarded as minimum. Simulation results, for both Amplify-and-Forward (AF) and DF BS schemes using PUMTC based on (8, 4, 3, 8) component codes, confirm that using PUMTC mitigates the problem of noise aggregation resulting from applying NC in the proposed schemes. 展开更多
关键词 FORWARD Error CORRECTION network coding Unit Memory TURBO Code
下载PDF
Improved Polar Decoder Utilizing Neural Network in Fast Simplified Successive-Cancellation Decoding
10
作者 Jiaxin Fang Chunwu Liu 《Journal of Computer and Communications》 2020年第7期90-99,共10页
<div style="text-align:justify;"> Polar codes using successive-cancellation decoding always suffer from high latency for its serial nature. Fast simplified successive-cancellation decoding algorithm im... <div style="text-align:justify;"> Polar codes using successive-cancellation decoding always suffer from high latency for its serial nature. Fast simplified successive-cancellation decoding algorithm improves the situation in theoretically but not performs well as expected in practical for the workload of nodes identification and the existence of many short blocks. Meanwhile, Neural network (NN) based decoders have appeared as potential candidates to replace conventional decoders for polar codes. But the exponentially increasing training complexity with information bits is unacceptable which means it is only suitable for short codes. In this paper, we present an improvement that increases decoding efficiency without degrading the error-correction performance. The long polar codes are divided into several sub-blocks, some of which can be decoded adopting fast maximum likelihood decoding method and the remained parts are replaced by several short codes NN decoders. The result shows that time steps the proposed algorithm need only equal to 79.8% of fast simplified successive-cancellation decoders require. Moreover, it has up to 21.2 times faster than successive-cancellation decoding algorithm. More importantly, the proposed algorithm decreases the hardness when applying in some degree. </div> 展开更多
关键词 Polar Codes Decoding Latency Fast Simplified Successive-Cancellation Decoding (Fast-SSC) Neural network (NN)
下载PDF
RETRACTED: <i>Improved Polar Decoder Utilizing Neural Network in Fast Simplified Successive-Cancellation Decoding</i>
11
作者 Jiaxin Fang Chunwu Liu 《Optics and Photonics Journal》 2020年第6期149-158,共12页
<div style="text-align:justify;"> <p style="text-align:justify;background:white;"> <span style="font-size:10.0pt;font-family:" color:black;"="">This artic... <div style="text-align:justify;"> <p style="text-align:justify;background:white;"> <span style="font-size:10.0pt;font-family:" color:black;"="">This article has been retracted to straighten the academic record. In making this decision the Editorial Board follows COPE's </span><span><a href="http://publicationethics.org/files/retraction%20guidelines.pdf"><span style="font-size:10.0pt;font-family:;" "="">Retraction Guidelines</span></a></span><span style="font-size:10.0pt;font-family:" color:black;"="">. The aim is to promote the circulation of scientific research by offering an ideal research publication platform with due consideration of internationally accepted standards on publication ethics. The Editorial Board would like to extend its sincere apologies for any inconvenience this retraction may have caused.</span><span style="font-size:10.0pt;font-family:" color:black;"=""></span> </p> <p style="text-align:justify;background:white;"> <span style="font-size:10.0pt;font-family:" color:black;"="">Please see the </span><span><a href="https://www.scirp.org/journal/paperinformation.aspx?paperid=101825"><span style="font-size:10.0pt;font-family:;" "="">article page</span></a></span><span style="font-size:10.0pt;font-family:" color:black;"=""> for more details. </span><span><a href="https://www.scirp.org/pdf/opj_2020072814494052.pdf"><span style="font-size:10.0pt;font-family:;" "="">The full retraction notice</span></a></span><span style="font-size:10.0pt;font-family:" color:black;"=""> in PDF is preceding the original paper which is marked "RETRACTED". </span> </p> <br /> </div> 展开更多
关键词 Polar Codes Decoding Latency Fast Simplified Successive-Cancellation Decoding (Fast-SSC) Neural network (NN)
下载PDF
LDPC Code’s Decoding Algorithms for Wireless Sensor Network:a Brief Review
12
作者 Weidong Fang Wuxiong Zhang +2 位作者 Lianhai Shan Biruk Assefa Wei Chen 《Journal of New Media》 2019年第1期45-50,共6页
As an effective error correction technology,the Low Density Parity Check Code(LDPC)has been researched and applied by many scholars.Meanwhile,LDPC codes have some prominent performances,which involves close to the Sha... As an effective error correction technology,the Low Density Parity Check Code(LDPC)has been researched and applied by many scholars.Meanwhile,LDPC codes have some prominent performances,which involves close to the Shannon limit,achieving a higher bit rate and a fast decoding.However,whether these excellent characteristics are suitable for the resource-constrained Wireless Sensor Network(WSN),it seems to be seldom concerned.In this article,we review the LDPC code’s structure brief.ly,and them classify and summarize the LDPC codes’construction and decoding algorithms,finally,analyze the applications of LDPC code for WSN.We believe that our contributions will be able to facilitate the application of LDPC code in WSN. 展开更多
关键词 Wireless Sensor network(WSN) Low Density Parity Check Code(LDPC) ANTI-INTERFERENCE soft decision hard decision
下载PDF
Coded WDM-PON Techniques with Complementary Walsh Coding Scheme over Fiber-to-the-home Networks
13
作者 Jenfa Huang Yaotang Chang Dengsheng Wang 《通讯和计算机(中英文版)》 2005年第11期52-58,共7页
下载PDF
Network Coding理论的研究进展 被引量:1
14
作者 赵进 张福炎 《计算机应用与软件》 CSCD 北大核心 2008年第2期196-199,共4页
Network Coding是一种新的信息传输方式。与传统的路由相比,Network Coding可以提高网络的性能。从理论和应用两方面总结了Network Coding研究的进展,同时,分析了将Network Coding应用到实际网络中所面临的一些问题,最后提出了进一步的... Network Coding是一种新的信息传输方式。与传统的路由相比,Network Coding可以提高网络的性能。从理论和应用两方面总结了Network Coding研究的进展,同时,分析了将Network Coding应用到实际网络中所面临的一些问题,最后提出了进一步的研究方向。 展开更多
关键词 network coding 多播 网络流
下载PDF
运用Network Coding改进IPv6网络的邻居发现协议 被引量:1
15
作者 张金刚 权义宁 赵守凯 《武汉工程大学学报》 CAS 2010年第5期94-98,共5页
通过对IPv6网络中,对网络管理、拓扑发现等起着重要作用的以ICMPv6报文为基础的邻居发现协议相关算法的分析,结合Network Coding的基本思想,针对广泛使用多播包容易引发网络拥塞、降低链接带宽利用率这一问题,提出了一种理论上基于Netwo... 通过对IPv6网络中,对网络管理、拓扑发现等起着重要作用的以ICMPv6报文为基础的邻居发现协议相关算法的分析,结合Network Coding的基本思想,针对广泛使用多播包容易引发网络拥塞、降低链接带宽利用率这一问题,提出了一种理论上基于Network Coding传输模式的改进方案,并以一个实例验证其有效性. 展开更多
关键词 network coding 网络编码 IPv6 邻居发现 ICMPV6
下载PDF
利用network coding的多速率多播最大吞吐量问题研究
16
作者 张牧 张顺颐 刘伟彦 《电路与系统学报》 CSCD 北大核心 2007年第3期78-83,共6页
本文研究了利用network coding的多速率多播最大吞吐量问题。与以往研究重点集中在单速率多播中的network coding研究工作不同,本文考虑了链路的异构性问题并采用多速率多播来解决该问题。首先文中形式化地描述了多速率多播最大可得吞... 本文研究了利用network coding的多速率多播最大吞吐量问题。与以往研究重点集中在单速率多播中的network coding研究工作不同,本文考虑了链路的异构性问题并采用多速率多播来解决该问题。首先文中形式化地描述了多速率多播最大可得吞吐量问题,并证明了在分层独立和层速率固定条件下,利用network coding的多速率多播最大吞吐量问题是NP-hard类问题,同时给出了最大吞吐量的上界。此外本文同时也研究了分层相关和层速率可变情况下的最大吞吐量问题。 展开更多
关键词 多播 吞吐量 network coding
下载PDF
Deadline-aware network coding for video on demand service over P2P networks 被引量:13
17
作者 CHI Hui-cheng ZHANG Qian 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期755-763,共9页
We are interested in providing Video-on-Demand (VoD) streaming service to a large population of clients using peer-to-peer (P2P) approach. Given the asynchronous demands from multiple clients, continuously changing of... We are interested in providing Video-on-Demand (VoD) streaming service to a large population of clients using peer-to-peer (P2P) approach. Given the asynchronous demands from multiple clients, continuously changing of the buffered contents, and the continuous video display requirement, how to collaborate with potential partners to get expected data for future content delivery are very important and challenging. In this paper, we develop a novel scheduling algorithm based on deadline- aware network coding (DNC) to fully exploit the network resource for efficient VoD service. DNC generalizes the existing net- work coding (NC) paradigm, an elegant solution for ubiquitous data distribution. Yet, with deadline awareness, DNC improves the network throughput and meanwhile avoid missing the play deadline in high probability, which is a major deficiency of the con- ventional NC. Extensive simulation results demonstrated that DNC achieves high streaming continuity even in tight network conditions. 展开更多
关键词 Video on Demand (VoD) Peer-to-Peer (P2P) network coding (NC) Deadline-aware network coding (DNC)
下载PDF
Reliable Braided Multipath Routing with Network Coding for Underwater Sensor Networks 被引量:5
18
作者 杨余旺 古力 +3 位作者 鞠玉涛 郑亚 孙亚民 杨静宇 《China Ocean Engineering》 SCIE EI 2010年第3期565-574,共10页
Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effect... Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effective coding technique for throughput and robustness of networks. In this paper, we propose a Reliable Braided Multipath Routing with Network Coding for underwater sensor networks (RBMR-NC). Disjoint multi-path algorithm is used to build independent actual paths, as called main paths. Some braided paths on each main path are built according to the braided multi-path algorithm, which are called logic paths. When a data packet is transmitted by these nodes, the nodes can employ network coding to encode packets coming from the same group in order to further reduce relativity among these packets, and enhance the probability of successful decoding at the sink node. Braided multi-path can make the main paths to be multiplexed to reduce the probability of long paths. This paper mainly employs successful delivery rate to evaluate RBMR-NC model with theoretical analysis and simulation methods. The results indicate that the proposed RBMR-NC protocol is valuable to enhance network reliability and to reduce system redundancy. 展开更多
关键词 network coding multi-path routing underwater sensor networks network reliability
下载PDF
Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding 被引量:9
19
作者 LIU Guangjun LIU Binyue +2 位作者 LIU Ximeng LI Fang GUO Wangmei 《China Communications》 SCIE CSCD 2015年第6期116-125,共10页
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions... Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively. 展开更多
关键词 network coding security wiretap-ping attacks algebraic coding ENCRYPTION
下载PDF
Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network 被引量:5
20
作者 陈晶 李彤 +2 位作者 杜瑞颖 傅建明 刘建伟 《China Communications》 SCIE CSCD 2011年第4期125-131,共7页
Although the wireless network is widely used in many fields,its characteristics such as high bit error rate and broadcast links may block its development.Network coding is an artistic way to exploit its intrinsic char... Although the wireless network is widely used in many fields,its characteristics such as high bit error rate and broadcast links may block its development.Network coding is an artistic way to exploit its intrinsic characteristics to increase the network reliability.Some people research network coding schemes for inter-flow or intra-flow,each type with its own advantages and disadvantages.In this paper,we propose a new mechanism,called MM-NCOPE,which integrates the idea of inter-flow and intra-flow coding.On the one hand,MM-NCOPE utilizes random liner coding to encode the NCOPE packets while NCOPE is a sub-protocol for optimizing the COPE algorithm by iteration.In NCOPE,packets are automatically matched by size to be coded.As a result,it improves the coding gain in some level.On the other hand,we adopt the partial Acknowledgement retransmission scheme to achieve high compactness and robustness.ACK is an independent packet with the highest priority rather than a part of the data packets.Compared with existing works on opportunistic network coding,our approach ensures the reliability of wireless links and improves the coding gain. 展开更多
关键词 network coding RELIABILITY hybrid flow
下载PDF
上一页 1 2 197 下一页 到第
使用帮助 返回顶部