The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Erasure codes with different parameters provide a wide range tradeoff between the reliability and spatial redundancy to the distributed storage. This paper proposes a technique to auto-configure the parameters of the erasure codes based on the users' requirements and the current status of the distributed storage system. The basic principle behind this technique is to incorporate the requirements of...
Multi-homed wireless devices equipped with multiple network interfaces that support the Concurrent Multipath Transfer (CMT) of data are an inevitable part of future wireless networks. The Stream Control Transmission Protocol (SCTP) is a multi-homed transport layer protocol that can support CMT. However, the receiver buffer blocking issue causes throughput degradation and prevents CMT from realizing...
With network virtualization more and more popular, how to protect the virtual networks (VNs) from a single substrate link failure is increasingly important. Existing protection schemes like dedicated backup and shared backup, suffer from high resource cost and delayed recovery, respectively. To offer instantaneous recovery with less redundant resource, in this paper, we propose a coding-aware VN mapping...
There is an increasing demand for broadcasting information of common interest to a large number of users. The unreliable nature of wireless links and the difficulty of acknowledging the correct reception of every broadcast packet by every user when the number of users becomes large are two major challenges for wireless network broadcasting. In this paper we investigate the problem that a base station...
A K-user repeat-accumulate interleave-division (RAID) system is considered for a Gaussian multiple access channel (GMAC) with binary inputs, equal-power, and symbol synchronization. In this system, a regular repeat accumulate (RA) code serially concatenated with spreading, where the rate of RA code and spreading length both can be changed, is employed for each user. K users are divided into M groups...
This work considers message coding on a transport layer of data network using error correcting codes. Initially transport coding was presented with constant coding rate [1]. This work suggests usage of variable coding rate by recoding messages on some intermediate nodes of data network. The work contains analysis of recoding efficiency based on analytical model and simulation of Kleinrock network...
We consider a problem of computation of the random coding bound exponent for the finite-state channel model. The mismatched decoding function in the form of the product of the subblock a posteriori probabilities is studied. A numerical example for an intersymbol interference channel is given.
RaptorQ is the most advanced fountain code proposed so far. Its properties make it attractive for forward error correction (FEC), offering high reliability at low overheads (i.e., for a small amount of repair information) and efficient encoding and decoding operations. Since RaptorQ's emergence, it has already been standardized by the IETF, and there is the expectation that it will be adopted by several...
Solving a multiple-valued problem means to assign values to a given set of multiple-valued variables such that certain conditions are satisfied. The solution of a multiplevalued problem is a subset of vk v-valued tuples of the length k, where k is the number of variables and v is the number of their possible values. This paper compares several approaches which solve such problems. These approaches...
In this paper, the cloud services optimization problem considering energy consumption cost is discussed. The queue model is presented for customer request service on data center. Since the server energy utility is based on the CPU core frequency, the novel trade-off optimization model between services revenue and energy loss cost is proposed in the paper, including allocating the dynamic CPU frequency...
This paper investigates the vehicle routing problem (VRP) under multi-objective constraints. More specifically, we consider the distance, fixed cost, time, together with risk simultaneously. To get a quicker and more accurate solution, several improvements are proposed in applying GA for optimization search. Practical test confirms the effectiveness of the proposed method.
The performance of Polar codes has been proved to achieve the Shannon capacity when N, the block length, tends to infinity. However, finite block length performance of Polar codes is rather poor compared to other capacity approaching codes such as LDPC (Low-Density Parity-Check) codes. In this paper, we propose a concatenated scheme with a polar code as an inner code and a Reed-Solomon code as an...
Random Linear Network Coding (RLNC) provides a theoretically efficient method for coding. The drawbacks associated with it are the complexity of the decoding and the overhead resulting from the coding vector. This adds to the overall energy consumption and is problematic for computational limited and battery driven platforms. In this work we present an approach to RLNC where the code is sparse and...
Wireless broadcast has been widely utilized to deliver information of common interest to a large number of users. A major challenge for wireless broadcast is that wireless links are often unreliable. Further, it is not feasible for every receiver to acknowledge the correct reception of broadcasted packets. In this paper we investigate the use of wireless broadcast to deliver a given number of packets...
Optical technologies are the foundations supporting the current telecommunication network backbones due to the high speed transmissions achieved in fiber optical networks. Traditional optical networks consist of a fixed 50 GHz grid, resulting in a low optical spectrum (OS) utilization, specifically with transmission rates above 100 Gbps. This issue is magnified when network resilience capabilities...
During the transition to professional universities, it is normal that students bring preconceptions with them from many domains of knowledge as well as misconceptions and numerous other idiosyncrasies based on their previous learning experiences. Knowing how our students think will help us to understand their mathematical thinking skills, to make sense of their errors and to improve our instruction...
Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, Reed-Solomon code based regenerating codes were developed. The RS code based minimum storage regeneration code (RS-MSR) and the RS code based minimum bandwidth regeneration code (RS-MBR) can achieve the theoretical...
An OFDM based WiMAX physical layer combining with Continuously Variable Slope Delta (CVSD) speech coding strategy has been implemented utilizing GNU Radio and USRP N210. CVSD vocoder is a non linear sampled data feedback framework which recognizes a band limited analog signal and converts it into binary form for transmission through a digital channel. The binary signal is decoded into a nearby estimate...
A video signal is made of up ‘n’ number of frames. Frames per second gives the number of frames per second, hence 32 fps means there are 32 frames in one second. In video processing we have to process each frame one by one, but processing each frame would consume a lot of resources and time. Key frame is a frame in which there is a major change as compared to the previous frame. Hence instead of processing...
This paper deals with the application of Spatial and Temporal DWT (Discrete Wavelet transform) on the videos. Here we will discuss about three mechanisms and their performance on videos at increased DWT level. In any video processing algorithm, memory is the major criteria. In these three mechanisms dynamic (automatic) DWT level selection and manual level selection is implemented. Here we will also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.