The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reliability has become one of the most vital requirements in wireless sensor networks (WSNs). One efficient way to increase the reliability is by using erasure coding techniques such as Reed-Solomon/Cauchy Reed-Solomon. The problem is the time required for encoding and decoding the data words, especially when large amount of data need to be sent like in complex WSN applications. In this paper, we...
The increasing expansion of data scale leads to the widespread deployment of storage systems with larger capacity and further induces the climbing probability of data loss or damage. The Maximum Distance Separable (MDS) code in RAID-6, which tolerates the concurrent failures of any two disks with minimal storage requirement, is one of the best candidates to enhance the data reliability. However, most...
There is an increasing demand for broadcasting information of common interest to a large number of users. The unreliable nature of wireless links and the difficulty of acknowledging the correct reception of every broadcast packet by every user when the number of users becomes large are two major challenges for wireless network broadcasting. In this paper we investigate the problem that a base station...
A K-user repeat-accumulate interleave-division (RAID) system is considered for a Gaussian multiple access channel (GMAC) with binary inputs, equal-power, and symbol synchronization. In this system, a regular repeat accumulate (RA) code serially concatenated with spreading, where the rate of RA code and spreading length both can be changed, is employed for each user. K users are divided into M groups...
Wireless broadcast has been widely utilized to deliver information of common interest to a large number of users. A major challenge for wireless broadcast is that wireless links are often unreliable. Further, it is not feasible for every receiver to acknowledge the correct reception of broadcasted packets. In this paper we investigate the use of wireless broadcast to deliver a given number of packets...
The traditional framework under which error-correcting codes can enable secrecy involves the use of nested codes. While this structure provide us with means to achieve weak secrecy, it is not clear how these codes can be applied to varying wiretap channels. In the spirit of rate-compatible codes, we propose a new framework for coding for the wiretap channel. The proposed scheme is based on random-puncturing,...
Noncoherent pulse-position modulation (PPM) with simple channel codes has the potential to realize ultra-low power (ULP) wireless design. In this paper, we develop a Wagnerlike decoding rule for single-parity-check and high-rate Reed-Solomon (RS) coded PPM schemes by simply ‘flipping’ the most unreliable received PPM symbol(s) to obtain a good balance between performance and coding complexity. The...
Channels with adversarial errors have been widely considered in recent years. In this paper we propose a new type of adversarial channel that is defined by two parameters ρr and ρw, specifying the read and write power of the adversary: for a codeword of length n, adversary can read ρrn components and add an error vector of weight up to ρwn to the codeword. We give our motivations, define performance...
Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, we consider a novel retransmission approach based on the importance of the bits (symbols). We study the problem of maximizing the total gain in the case of partial data delivery in error-prone wireless...
One of the most powerful ways to achieve transmission reliability over wireless links is to employ efficient coding techniques. This paper investigates the performance of a transmission over a relay channel where information is protected by two layers of coding. In the first layer, transmission reliability is ensured by fountain coding at the source. The second layer incorporates network coding at...
Correlated component failures (CCF) degrade system reliability, and hence, these failures must be explicitly incorporated into the reliability analysis process. Several contemporary efforts consider CCF, however, most of these approaches introduce an exponential number of parameters and are computationally intensive because they require a complete characterization of the joint distribution of the...
Generalized Reed Solomon (GRS) codes are widely used for reliability applications in computer systems like data storage and communications and thus, efficiency in encoding and decoding of GRS codes is very important for system performance. Though GRS codes provide enormous flexibility, they are computationally expensive since calculations happen in Galois fields. In this paper, we present an algorithm...
Recent studies show hard disk drives fail much more often in real systems than specified in their data-sheets, and RAID-5 may not be able to provide necessary reliability for practical systems. It is desirable to have disk arrays and clustered storage systems with higher data redundancy, such as RAID-6. Meanwhile, latest research also indicates that sector failures become a threat to data reliability...
Network coding (NC) and erasure coding (EC) share a common principle of encoding incoming data packets at network intermediate nodes so that destination nodes can reconstruct the original data packets using a sufficient number of encoded data packets collected at the destinations. While NC in general reduces the number of packets sent through the network, EC introduces redundancy into the packet streams...
We consider transmission over a binary erasure wiretap channel using the code construction method introduced by Rathi et al. based on two edge type Low-Density Parity-Check (LDPC) codes and the coset encoding scheme. By generalizing the method of computing conditional entropy for standard LDPC ensembles introduced by Méasson, Montanari, and Urbanke to two edge type LDPC ensembles, we show how the...
Distributed storage systems are mainly justified due to the limited amount of storage capacity and improving the reliability through distributing data over multiple storage nodes. However, it may happen the data is stored in unreliable nodes, while it is desirable the end user to have a reliable access to the stored data. So, in an event that a node is damaged, to prevent the system reliability to...
This paper has three objectives. The discussion of reliability and Chaos in the general context of reliability theory, including the reliability of Wireless Sensors Network (WSN, e.g., a prognostics sensors network in a PHM system), constitutes the first objective of this paper. The second objective discusses the WSN reliability and survivability inspired by the analogical similarity between insect...
Networks on chips (NoCs) provide a mechanism for handling complex communications in the next generation of integrated circuits. At the same time, lower yield in nano-technology, makes self repair communication channels a necessity in design of digital systems. This paper proposes a reliable NoC architecture based on specific application mapped onto an NoC. This architecture is capable of recovering...
In this paper, we present a new technique to improve the reliability of H-tree SRAM memories. This technique deals with the SRAM power-bus monitoring by using built-in current sensor (BICS) circuits that detect abnormal current dissipation in the memory power-bus. This abnormal current is the result of a single-event upset (SEU) in the memory and it is generated during the inversion of the state of...
We study the potential benefits of stream codes for delay-constrained transmission of random arrivals of data. Stream codes operate in a continuous manner by allowing new data to be encoded and decoded at any time. We develop a random-coding formulation for streaming that generalizes the traditional block-coding model, and obtain exponentially tight expressions for optimal decoding error as a function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.