The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A multi-edge framework for unequal error protecting (UEP) LT codes is derived by distinguishing between the edges connected to each protection class. Under the framework introduced, two existing techniques for the design of unequal error protecting LT codes can be evaluated and explained in a unified way. Furthermore, a simple and flexible design technique is proposed for UEP LT codes with good performance.
Serial link interconnection has generated a lot of attention in on-chip bus design due to its advantages over multibit parallel interconnection in terms of crosstalk, skew, and area cost. However, serializing a multi-bit parallel bus tends to increase the bit transition and power dissipation. This paper proposes an embedded transition inversion (ETI) coding scheme that uses the phase difference between...
This paper considers maximum a posteriori (MAP) decoding of the maximum transition run (MTR) codes, over two-head digital magnetic recording system. Decoding is based on Bayesian algorithm and computes a posteriori log-likelihood ratios (LLR) from codewords of the MTR code. In this paper we present simulation results for performance of the joint soft detection-decoding of a concatenation of MTR code...
In this work, we propose a novel algorithm to combat the clipping noise in Interleave-division multiple access (IDMA) which inherits a peak-to-average power ratio (PAPR) problem especially in large number of multiple accesses. Clipping transmission is efficiently applied to reduce the PAPR to cause the clipping noise which is a weak tradeoff [1][2] to its performance. The proposed algorithm consists...
Wireless Mesh Networks (WMNs) have become an important networking infrastructure for providing cost-efficient broadband wireless connectivity. WMNs are showing their applicability in deployment of medical, transport and surveillance applications in urban areas, metropolitan, neighboring communities and municipal area networks. In this paper, we deal with connectivity and coverage problem of WMN. Because...
This paper describes a new relaying scheme to reduce overhead of LT coded networks. The most popular degree distribution of LT codes is robust soliton distribution (RSD) which has low decoding complexity and decoding failure probability. This paper proposes a relaying scheme that makes degree distribution of encoding symbol at the sink equal to RSD, under the assumption that the each source generates...
An improved expanding window fountain code for unequal error protection is proposed in this paper. For expanding window fountain (EWF) codes, the increased performance of more important bits (MIB) is achieved at the cost of decreased performance of less important bits (LIB). On the basis of EWF codes, the proposed method uses the expanding window to cover all the input information symbols and alter...
In seismic acquisition if regular linear scanning signal is used for the vibroseis, seismic response will show large sidelobes and the resolution for the seismic response will be low, if using dualistic pseudorandom code as scanning signal for the vibroseis, the severe noise will be generated in seismic response section and the signal-to-noise ratio will be decreased. In this paper the ternary pseudo...
The digital baseband part is the core of UHF RFID reader, its functions and features make direct impact on the reader's performance. So this paper presents the design and FPGA Verification of digital baseband system for UHF RFID reader based on ISO 18000–6b protocol. The digital baseband system consists of two parts: transmitter and receiver, which including frame header processing module, Manchester...
This paper introduces the theory of genetic algorithm. The specific operation flow of genetic algorithm is described. The application of genetic algorithm in function optimization has been achieved by the using of matlab programming language. The process of programming shows that it is very easy, flexible and efficient to optimize and compute with matlab language, and the effectiveness of genetic...
Energy saving is important for many wireless devices. In a multi-hop wireless network with multiple sessions, XOR network coding can be applied to opposite traffic flows so as to reduce the number of packet transmissions, which in turn reduce transmission energy. Such a change in packet forwarding, however, impacts the design of traffic routing. Traditional routing algorithms, which typically aim...
Network coding has been shown to be able to improve the throughput and power efficiency of wireless networks by mixing packets from different flows into a single packet. However, forcing packets to be coded may induce large delay and packet loss rate which is intolerable to some services such as real-time communications. Considering the diversity of traffic flows and the stochastic nature of the packet...
Network coding and requires multiplications and inversions over finite fields whose implementation complexity quickly increases with the field size. In this paper, the bound of finite field size is considered to reduce complexity by implement the random network coding in small field size. And some improved coding schemes are proposed to increase the decoding success rate in small field size. The simulation...
Pollution attack is a severe security problem in network-coding enabled wireless mesh networks (WMNs). Under such form of attack, malicious nodes can easily create an epidemic spreading of polluted packets to deplete network resources. We address this security problem even when the attackers are "intelligent" in the sense that they may pretend to be legitimate nodes to probabilistically...
Distribution System (DS) reconfiguration for power loss reduction is usually formulated as a nonlinear, multi-objective and multi-constrained optimization problem. Recently an approach to solve this problem that presents a very good performance even for large-scale DSs was proposed. This approach, called MEAN, combines a multi-objective Evolutionary Algorithm (EA) based on subpopulation tables with...
Wireless Mesh Networks (WMNs) have become an important networking infrastructure for providing cost efficient broadband wireless connectivity. WMNs are showing their applicability in deployment of medical, transport and surveillance applications in urban areas, metropolitan, neighboring communities and municipal area networks. In this paper, we deal with connectivity and coverage problem of WMN. Because...
Based on cerebellar model articulation controller (CMAC), this paper attempts to propose a new chromosome representation scheme for representing real number parameters in genetic algorithms (GAs), which is termed CMAC-based GAs. The central idea of CMAC-based GAs is that each memory unit in a CMAC network is regarded as a real-valued gene in GAs. By this way, a chromosome is represented as those memory...
Lagrange multiplier selection that is widely used in mode decision has a significant effect on the quality performance of video encoding. It has been shown in the literature that the Lagrange multiplier is closely related to the quantization factor. However, changing the Lagrange multiplier based on quantization, as it has been the case in several researches, may not be totally accurate. In this paper,...
Golay complementary sequences are a good solution to reduce the high peak-to-average power ratio (PAPR) of multicarrier communication systems. In this paper, we present a simple but novel technique to develop theoretical PAPR bounds of downlink MC-CDMA system using Golay complementary sequences for spreading and coding. The developed PAPR bounds are independent of the spreading factor in uncoded MC-CDMA...
The modification of most traditional steganography algorithms based on motion vector is relatively high. After analyzing these steganography algorithms, we propose a novel steganography algorithm. The information is embedded into the optimal component (horizontal component or vertical component) of the motion vector with large amplitude. The main contributions of this scheme are as follows: First,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.