Academic literature on the topic 'Fountain codes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fountain codes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fountain codes"
MacKay, D. J. C. "Fountain codes." IEE Proceedings - Communications 152, no. 6 (2005): 1062. http://dx.doi.org/10.1049/ip-com:20050237.
Full textMirrezaei, Seyed Masoud, Karim Faez, and Shahram Yousefi. "Towards Fountain Codes." Wireless Personal Communications 77, no. 2 (January 9, 2014): 1533–62. http://dx.doi.org/10.1007/s11277-013-1597-7.
Full textAsteris, Megasthenis, and Alexandros G. Dimakis. "Repairable Fountain Codes." IEEE Journal on Selected Areas in Communications 32, no. 5 (May 2014): 1037–47. http://dx.doi.org/10.1109/jsac.2014.140522.
Full textKIRIAN, M. L., G. MEREGILLANO, D. GENNETTE, and J. M. WEINTRAUB. "Multi-jurisdictional investigation of interactive fountain-associated cryptosporidiosis and salmonellosis outbreaks." Epidemiology and Infection 136, no. 11 (January 16, 2008): 1547–51. http://dx.doi.org/10.1017/s0950268807000222.
Full textNOZAKI, Takayuki. "Zigzag Decodable Fountain Codes." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 8 (2017): 1693–704. http://dx.doi.org/10.1587/transfun.e100.a.1693.
Full textNOZAKI, Takayuki. "Zigzag Decodable Fountain Codes." IEICE ESS Fundamentals Review 13, no. 1 (July 1, 2019): 7–19. http://dx.doi.org/10.1587/essfr.13.1_7.
Full textKumar, Siddhartha, Eirik Rosnes, and Alexandre Graell i Amat. "Secure Repairable Fountain Codes." IEEE Communications Letters 20, no. 8 (August 2016): 1491–94. http://dx.doi.org/10.1109/lcomm.2016.2574355.
Full textZhao, Yuli, Yin Zhang, Francis C. M. Lau, Hai Yu, and Zhiliang Zhu. "Improved online fountain codes." IET Communications 12, no. 18 (November 20, 2018): 2297–304. http://dx.doi.org/10.1049/iet-com.2018.5486.
Full textHarb, Ali Bazzi, Hiba, Zahraa Younes, Majd Ghareeb, and Samih Abdulnabi. "Fountain Codes: LT And Raptor Codes Implementation." International Journal of Engineering Research and Applications 07, no. 01 (January 2017): 97–102. http://dx.doi.org/10.9790/9622-07010197102.
Full textPeng, Xiao Feng, Yi Yang, Chuan Yang, and Kai Li Wang. "Research on Data Transmission Technology Based on Raptor Code in Wireless Sensor Networks." Applied Mechanics and Materials 442 (October 2013): 538–43. http://dx.doi.org/10.4028/www.scientific.net/amm.442.538.
Full textDissertations / Theses on the topic "Fountain codes"
Hu, Ketai. "Reduced-complexity decoding of fountain codes." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27254.
Full textPAIBA, FRANKLIN ANTONIO SANCHEZ. "BIDIMENSIONAL FOUNTAIN CODES FOR ERASURE CHANNELS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2008. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=12457@1.
Full textEsta dissertação aborda o estudo de códigos fontanais (códigos LT e códigos Raptor) que são uma classe de códigos criados para a transmissão de dados de maneira confiável e eficiente através de canais os quais podem ser modelados como canais com apagamento. Os códigos LT e códigos Raptor são denominados códigos fontanais, devido a que eles são uma boa aproximação para o conceito de fontanas digitais. Além disso, eles são classificados como códigos de taxa versátil, no sentido que o número de símbolos codificados que podem ser gerados a partir dos dados de entrada é potencialmente ilimitado. Códigos LT são capazes de recuperar, com probabilidade maior do que (1 − delta), um conjunto de k símbolos de entrada a partir de quaisquer k + O((raiz quadrada de k)(ln(2))(k/delta)) símbolos codificados recebidos, com uma média de O(k ln(k/delta)) operações XOR. Os códigos Raptor são uma extensão de códigos LT, na qual o processo de codificação é composto de duas etapas: um código de bloco de comprimento fixo (denominado pré- código) e um código LT com uma distribuição de graus apropriada. Investigou-se o desempenho dos códigos LT usando duas novas distribuições de graus (Sóliton Robusta Melhorada e Sóliton Robusta Truncada) e foi proposto um modelo de códigos LT Bidimensionais, na qual os símbolos de entrada são agrupados em forma de matriz. Neste esquema os blocos correspondentes às linhas da matriz são codificados usando um código LT e, em seguida, a matriz resultante tem suas colunas também codificadas usando um código LT. Ainda que a complexidade do esquema tenha sido dobrada o desempenho alcançado pelos códigos LT Bidimensionais superou o desempenho dos códigos LT convencionais para situações em que a qualidade do canal BEC é elevada.
Fountain Codes (LT Codes and Raptor Codes) are a class of codes proposed to efficient and reliably transmit data through Erasure Channels. LT Codes and Raptor Codes are a good approximation to the concept of digital fountain and as such are named as fountain codes. They are said to be rateless codes in the sense that the number of symbols produced by the encoder could grow, potentially, to infinite. With probability of success larger than (1−delta), a decoder of an LT code based scheme can recover the k transmitted symbols from any received block of k + O((square root k)(ln(2))(k/delta)) correct symbols with an average of O(k ln(k/delta)) XOR operations. Raptor codes are an extension of the LT codes idea, with a tandem scheme where a fixed length block code (namely a pre- code) is followed by an LT code that uses a properly chosen degree distribution. In this dissertation the performance of LT codes with two recently proposed degree distributions, the Improved Robust Soliton and the Truncated Soliton Robust Distribution were investigated. A new scheme called Bidimensional LT Codes, has been proposed. In this scheme the input symbols are structured in a matrix form and afterwards the blocks corresponding to the lines of the matrix are encoded with an LT code. The columns of the new matrix so obtained are next encoded with a similar LT code. The complexity of the new scheme is doubled and yet its performance only just surpasses that of the conventional LT scheme for high quality BEC.
Nguyen, Dang Thanh. "Fountain codes for the wireless Internet." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/64484/.
Full textLázaro, Blasco Francisco [Verfasser]. "Fountain Codes under Maximum Likelihood Decoding / Francisco Lázaro Blasco." München : Verlag Dr. Hut, 2017. http://d-nb.info/1137023546/34.
Full textGrobler, Trienko Lups. "Fountain codes and their typical application in wireless standards like edge." Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/25381.
Full text- The Tornado graph structure is unsuitable for noisy decoding since the code structure protects the first layer of parity instead of the original message bits (a Tornado graph consists of more than one layer).
- The successful decoding of systematic LT codes were verified.
- A systematic Raptor code was introduced and successfully decoded. The simulation results show that the Raptor graph structure can improve on its constituent codes (a Raptor code consists of more than one code).
Dissertation (MEng)--University of Pretoria, 2008.
Electrical, Electronic and Computer Engineering
MEng
unrestricted
Shirvanimoghaddam, Mahyar. "From binary to analog fountain codes: design, theory, and applications." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12584.
Full textLim, Wen Jun. "Analysis and design of analog fountain codes for short packet communications." Thesis, The University of Sydney, 2022. https://hdl.handle.net/2123/29277.
Full textDu, Toit F. J. "A fountain code forward error correction strategy for SensLAB applications." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86399.
Full textENGLISH ABSTRACT: The discovery of sparse graph codes, used in forward error correction strate- gies, has had an unrivaled impact on Information theory over the past decade. A recent advancement in this field, called Fountain codes, have gained much attention due to its intelligent rate adaptivity, and lend itself to applications such as multicasting and broadcasting networks. These particular properties can be considered valuable in a wireless sensor network setting as it is capable of providing forward error correction, and the added conceptual network protocol related extensions. A wireless sensor network testbed in France, called SensLAB, provides an experimental facility for researchers to develop and evaluate sensor network protocols, aside from a simulation environment. Tremendous value can be added to the SensLAB community if an appropriate forward error correction design, such as Fountain codes, is deemed feasible for use on such a platform. This thesis investigates the use of Fountain codes, in a binary erasure channel environment, as a forward error correction strategy for the distribution of reliable data content over the SensLAB platform. A short message length LT code using two different decoding mechanisms were developed and evaluated for possible implementation. Furthermore, a short message length Raptor code was developed by using supplementary theory and optimisation techniques that permit scalability in terms of the message size. The results favoured the Raptor code design as it performs close to near optimal while still satisfying the rateless- and universality property, at low computational complexity.
AFRIKAANSE OPSOMMING: Die ontdekking van yl-grafiekkodes, van toepassing op foutkorreksie strategieë, het onlangs 'n ongeewenaarde impak op Informasieteorie gehad. In 'n onlangse vooruitgang in hierdie veld, genoem Fonteinkodes, word daar meer fokus geplaas op die intelligente tempo aanpassingsvermoë van hierdie kodes, wat nuttige toepassing kan inhou in multi-saai- en uitsaai netwerke. Hierdie eienskappe kan moontlik as waardevol beskou word in draadlose sensor netwerke weens die fout regstellingsvermoë en die bykomende konseptuele netwerk protokol verwante uitbreidings. 'n Draadlose sensor netwerk toetsplatvorm in Frankryk, genoem die SensLAB, bied navorsers die geleentheid om eksperimentele sensor netwerk protokolle te ontwikkel en te toets buite 'n tipiese simulasie-omgewing. Groot waarde kan bygevoeg word aan die SensLAB gemeenskap indien 'n geskikte foutkorreksie strategie ontwikkel word, soos Fonteinkodes, en as geskik beskou kan word vir hierdie platvorm. In hierdie tesis word Fonteinkodes saam met die SensLAB platvorm ondersoek, binne die raamwerk van 'n binêre verlieskanaal, om vir foutkorreksie oor die verspreiding van betroubare data in SensLAB op te tree. 'n Kort boodskap LT kode word voorgestel deur van twee verskillende dekoderings meganismes gebruik te maak. 'n Alternatief, genaamd Raptorkode, was ook ondersoek. 'n Raptorkode. 'n Kort boodskap Raptor kode, wat ontwikkel is met bykomende teorie en optimeringstegnieke, word ook voorgestel. Die bykomende tegnieke bied 'n skaleerbare boodskap lengte terwyl dit tempoloos en universeel bly, en lae kompleksiteit bied.
Wang, Xiaohan Sasha. "Investigation of Forward Error Correction Coding Schemes for a Broadcast Communication System." Thesis, University of Canterbury. Computer Science and Software Engineering, 2013. http://hdl.handle.net/10092/7902.
Full textHuang, Weizheng. "Investigation on Digital Fountain Codes over Erasure Channels and Additive White Gaussian Noise Channels." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336067205.
Full textBook chapters on the topic "Fountain codes"
Caire, Giuseppe, Shlomo Shamai, Amin Shokrollahi, and Sergio Verdú. "Fountain codes for lossless data compression." In Algebraic Coding Theory and Information Theory, 1–20. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/dimacs/068/01.
Full textApavatjrut, Anya, Claire Goursaud, Katia Jaffrès-Runser, and Jean-Marie Gorce. "Fountain Codes and Network Coding for WSNs." In Network Coding, 27–72. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118562819.ch2.
Full textYin, Rui-Na, and Ke-Bin Jia. "A Short-Wave Communication System Based on Fountain Codes." In Communications in Computer and Information Science, 262–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24999-0_37.
Full textLiu, Wei, Yueyun Chen, and Yudong Yao. "Multi-point Cooperative Fountain Codes Multicast for LTE Cellular System." In Internet of Things, Smart Spaces, and Next Generation Networking, 216–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32686-8_20.
Full textZhou, Juan, Ying Shen, and Youxi Tang. "Peak-to-Average Power-Ratio Reduction Scheme Employing Fountain Codes." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 67–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30493-4_7.
Full textChampel, Mary-Luc, Anne-Marie Kermarrec, and Nicolas Le Scouarnec. "FoG: Fighting the Achilles’ Heel of Gossip Protocols with Fountain Codes." In Lecture Notes in Computer Science, 180–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05118-0_13.
Full textLi, Yue, Shushi Gu, Ye Wang, Juan Li, and Qinyu Zhang. "Repairable Fountain Codes with Unequal Repairing Locality in D2D Storage System." In Ad Hoc Networks, 272–81. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05888-3_25.
Full textLi, Yue, Shushi Gu, Ye Wang, Wei Xiang, and Qinyu Zhang. "Repairable Fountain Codes with Unequal Locality for Heterogeneous D2D Data Storage Networks." In Wireless and Satellite Systems, 514–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19153-5_53.
Full textShao, Hanqin, Hongbo Zhu, and Junwei Bao. "Analysis and Design of Wireless Distributed Fountain Codes with Multiplicative Network Coding." In Machine Learning and Intelligent Communications, 250–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66785-6_29.
Full textShi, Pengcheng, Zhenyong Wang, and Dezhi Li. "Low Overhead Growth Degree Coding Scheme for Online Fountain Codes with Limited Feedback." In Wireless and Satellite Systems, 456–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93398-2_43.
Full textConference papers on the topic "Fountain codes"
MacKay, D. J. C. "Fountain codes." In IEE Seminar on Sparse-Graph Codes (Turbo Codes, Low Density Parity-Check Codes and Fountain Codes). IEE, 2004. http://dx.doi.org/10.1049/ic:20040504.
Full textWang, Zheng, and Jie Luo. "Concatenated fountain codes." In 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205958.
Full textAsteris, Megasthenis, and Alexandros G. Dimakis. "Repairable Fountain codes." In 2012 IEEE International Symposium on Information Theory - ISIT. IEEE, 2012. http://dx.doi.org/10.1109/isit.2012.6283579.
Full textFern�ndez-Hern�ndez, I., D. Calle, S. Cancela, A. Fern�ndez, R. Mart�nez, G. Seco-Granados, and P. Walker. "Fountain Codes for GNSS." In 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2017). Institute of Navigation, 2017. http://dx.doi.org/10.33012/2017.15368.
Full textShirvanimoghaddam, Mahyar, Yonghui Li, and Branka Vucetic. "Multiple access analog fountain codes." In 2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2014. http://dx.doi.org/10.1109/isit.2014.6875217.
Full textShirvanimoghaddam, Mahyar, Yonghui Li, and Branka Vucetic. "Capacity approaching analog fountain codes." In 2014 Australian Communications Theory Workshop (AusCTW). IEEE, 2014. http://dx.doi.org/10.1109/ausctw.2014.6766421.
Full textZhu, Hongjie, Chao Zhang, and Jianhua Lu. "Designing of Fountain Codes with Short Code-Length." In Chengdu, China. IEEE, 2007. http://dx.doi.org/10.1109/iwsda.2007.4408410.
Full textPyndiah, R. "Block turbo codes: ten years later." In IEE Seminar on Sparse-Graph Codes (Turbo Codes, Low Density Parity-Check Codes and Fountain Codes). IEE, 2004. http://dx.doi.org/10.1049/ic:20040505.
Full textUrbanke, R. "The quest for capacity-achieving codes." In IEE Seminar on Sparse-Graph Codes (Turbo Codes, Low Density Parity-Check Codes and Fountain Codes). IEE, 2004. http://dx.doi.org/10.1049/ic:20040506.
Full textNg, S. X. "Integrated wireless multimedia turbo-transceiver design approaching the Rayleigh channel's capacity: interpreting Shannon's lessons in the turbo-era." In IEE Seminar on Sparse-Graph Codes (Turbo Codes, Low Density Parity-Check Codes and Fountain Codes). IEE, 2004. http://dx.doi.org/10.1049/ic:20040507.
Full text