Dissertations / Theses on the topic 'Fountain codes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 44 dissertations / theses for your research on the topic 'Fountain codes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hu, Ketai. "Reduced-complexity decoding of fountain codes." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27254.
Full textPAIBA, FRANKLIN ANTONIO SANCHEZ. "BIDIMENSIONAL FOUNTAIN CODES FOR ERASURE CHANNELS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2008. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=12457@1.
Full textEsta dissertação aborda o estudo de códigos fontanais (códigos LT e códigos Raptor) que são uma classe de códigos criados para a transmissão de dados de maneira confiável e eficiente através de canais os quais podem ser modelados como canais com apagamento. Os códigos LT e códigos Raptor são denominados códigos fontanais, devido a que eles são uma boa aproximação para o conceito de fontanas digitais. Além disso, eles são classificados como códigos de taxa versátil, no sentido que o número de símbolos codificados que podem ser gerados a partir dos dados de entrada é potencialmente ilimitado. Códigos LT são capazes de recuperar, com probabilidade maior do que (1 − delta), um conjunto de k símbolos de entrada a partir de quaisquer k + O((raiz quadrada de k)(ln(2))(k/delta)) símbolos codificados recebidos, com uma média de O(k ln(k/delta)) operações XOR. Os códigos Raptor são uma extensão de códigos LT, na qual o processo de codificação é composto de duas etapas: um código de bloco de comprimento fixo (denominado pré- código) e um código LT com uma distribuição de graus apropriada. Investigou-se o desempenho dos códigos LT usando duas novas distribuições de graus (Sóliton Robusta Melhorada e Sóliton Robusta Truncada) e foi proposto um modelo de códigos LT Bidimensionais, na qual os símbolos de entrada são agrupados em forma de matriz. Neste esquema os blocos correspondentes às linhas da matriz são codificados usando um código LT e, em seguida, a matriz resultante tem suas colunas também codificadas usando um código LT. Ainda que a complexidade do esquema tenha sido dobrada o desempenho alcançado pelos códigos LT Bidimensionais superou o desempenho dos códigos LT convencionais para situações em que a qualidade do canal BEC é elevada.
Fountain Codes (LT Codes and Raptor Codes) are a class of codes proposed to efficient and reliably transmit data through Erasure Channels. LT Codes and Raptor Codes are a good approximation to the concept of digital fountain and as such are named as fountain codes. They are said to be rateless codes in the sense that the number of symbols produced by the encoder could grow, potentially, to infinite. With probability of success larger than (1−delta), a decoder of an LT code based scheme can recover the k transmitted symbols from any received block of k + O((square root k)(ln(2))(k/delta)) correct symbols with an average of O(k ln(k/delta)) XOR operations. Raptor codes are an extension of the LT codes idea, with a tandem scheme where a fixed length block code (namely a pre- code) is followed by an LT code that uses a properly chosen degree distribution. In this dissertation the performance of LT codes with two recently proposed degree distributions, the Improved Robust Soliton and the Truncated Soliton Robust Distribution were investigated. A new scheme called Bidimensional LT Codes, has been proposed. In this scheme the input symbols are structured in a matrix form and afterwards the blocks corresponding to the lines of the matrix are encoded with an LT code. The columns of the new matrix so obtained are next encoded with a similar LT code. The complexity of the new scheme is doubled and yet its performance only just surpasses that of the conventional LT scheme for high quality BEC.
Nguyen, Dang Thanh. "Fountain codes for the wireless Internet." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/64484/.
Full textLázaro, Blasco Francisco [Verfasser]. "Fountain Codes under Maximum Likelihood Decoding / Francisco Lázaro Blasco." München : Verlag Dr. Hut, 2017. http://d-nb.info/1137023546/34.
Full textGrobler, Trienko Lups. "Fountain codes and their typical application in wireless standards like edge." Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/25381.
Full text- The Tornado graph structure is unsuitable for noisy decoding since the code structure protects the first layer of parity instead of the original message bits (a Tornado graph consists of more than one layer).
- The successful decoding of systematic LT codes were verified.
- A systematic Raptor code was introduced and successfully decoded. The simulation results show that the Raptor graph structure can improve on its constituent codes (a Raptor code consists of more than one code).
Dissertation (MEng)--University of Pretoria, 2008.
Electrical, Electronic and Computer Engineering
MEng
unrestricted
Shirvanimoghaddam, Mahyar. "From binary to analog fountain codes: design, theory, and applications." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12584.
Full textLim, Wen Jun. "Analysis and design of analog fountain codes for short packet communications." Thesis, The University of Sydney, 2022. https://hdl.handle.net/2123/29277.
Full textDu, Toit F. J. "A fountain code forward error correction strategy for SensLAB applications." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86399.
Full textENGLISH ABSTRACT: The discovery of sparse graph codes, used in forward error correction strate- gies, has had an unrivaled impact on Information theory over the past decade. A recent advancement in this field, called Fountain codes, have gained much attention due to its intelligent rate adaptivity, and lend itself to applications such as multicasting and broadcasting networks. These particular properties can be considered valuable in a wireless sensor network setting as it is capable of providing forward error correction, and the added conceptual network protocol related extensions. A wireless sensor network testbed in France, called SensLAB, provides an experimental facility for researchers to develop and evaluate sensor network protocols, aside from a simulation environment. Tremendous value can be added to the SensLAB community if an appropriate forward error correction design, such as Fountain codes, is deemed feasible for use on such a platform. This thesis investigates the use of Fountain codes, in a binary erasure channel environment, as a forward error correction strategy for the distribution of reliable data content over the SensLAB platform. A short message length LT code using two different decoding mechanisms were developed and evaluated for possible implementation. Furthermore, a short message length Raptor code was developed by using supplementary theory and optimisation techniques that permit scalability in terms of the message size. The results favoured the Raptor code design as it performs close to near optimal while still satisfying the rateless- and universality property, at low computational complexity.
AFRIKAANSE OPSOMMING: Die ontdekking van yl-grafiekkodes, van toepassing op foutkorreksie strategieë, het onlangs 'n ongeewenaarde impak op Informasieteorie gehad. In 'n onlangse vooruitgang in hierdie veld, genoem Fonteinkodes, word daar meer fokus geplaas op die intelligente tempo aanpassingsvermoë van hierdie kodes, wat nuttige toepassing kan inhou in multi-saai- en uitsaai netwerke. Hierdie eienskappe kan moontlik as waardevol beskou word in draadlose sensor netwerke weens die fout regstellingsvermoë en die bykomende konseptuele netwerk protokol verwante uitbreidings. 'n Draadlose sensor netwerk toetsplatvorm in Frankryk, genoem die SensLAB, bied navorsers die geleentheid om eksperimentele sensor netwerk protokolle te ontwikkel en te toets buite 'n tipiese simulasie-omgewing. Groot waarde kan bygevoeg word aan die SensLAB gemeenskap indien 'n geskikte foutkorreksie strategie ontwikkel word, soos Fonteinkodes, en as geskik beskou kan word vir hierdie platvorm. In hierdie tesis word Fonteinkodes saam met die SensLAB platvorm ondersoek, binne die raamwerk van 'n binêre verlieskanaal, om vir foutkorreksie oor die verspreiding van betroubare data in SensLAB op te tree. 'n Kort boodskap LT kode word voorgestel deur van twee verskillende dekoderings meganismes gebruik te maak. 'n Alternatief, genaamd Raptorkode, was ook ondersoek. 'n Raptorkode. 'n Kort boodskap Raptor kode, wat ontwikkel is met bykomende teorie en optimeringstegnieke, word ook voorgestel. Die bykomende tegnieke bied 'n skaleerbare boodskap lengte terwyl dit tempoloos en universeel bly, en lae kompleksiteit bied.
Wang, Xiaohan Sasha. "Investigation of Forward Error Correction Coding Schemes for a Broadcast Communication System." Thesis, University of Canterbury. Computer Science and Software Engineering, 2013. http://hdl.handle.net/10092/7902.
Full textHuang, Weizheng. "Investigation on Digital Fountain Codes over Erasure Channels and Additive White Gaussian Noise Channels." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336067205.
Full textSZABAS, CLAUDIO ALEJANDRO. "FOUNTAIN CODES AND OTHER CHANNEL CODING SCHEMES FOR PROTECTION OF TRANSPORT STREAMS OVER IP NETWORKS WITH PACKET ERASURE." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17792@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Há, nos dias atuais, uma crescente demanda pelo transporte de video sobre IP, i.e., para distribuição de conteúdo pela Internet, por serviços de IPTV em definição padrão e em alta definição e, mesmo para uso interno nas redes de emissoras tradicionais de televisão, que transportam contribuições de elevada qualidade para seus programas. Em tais aplicações, o conteúdo dos programas é transportado usando MPEG-2 ou MPEG-4, sob a forma de MPEG-2 Transport Streams, encapsulados com protocolos tais como RTP, UDP e IP. As redes IP, que são modelizadas como Redes com Apagamento de Pacotes (PEC) não foram, no entanto, concebidas para o transporte de mídias em tempo real, esbarra portanto em problemas comuns como perdas de pacotes e jitter, gerando perturbações que se refletem na recepção do conteúdo. Os métodos tradicionais para superar estas dificuldades, como por exemplo, os que se baseiam em retransmissões usando protocolos ARQ (Automatic Repeat on Request), não são uma solução eficiente para proteger a transmissão de multimídia em tempo real. A proteção de multimídia transmitida em tempo real via IP recorre, neste caso, aos códigos para canal. Há códigos para canal recomendados em RFC s e Padrões, usados amplamente pelos fabricantes de equipamento. Os modernos Códigos Fontanais, possuem características atraentes para o transporte de conteúdos multimídia em tempo real. Neste trabalho, simulações são realizadas, onde o conteúdo encapsulado em Transport Stream, é protegido com Códigos Fontanais antes do encapsulamento para o envio através da rede. A título de comparação, o experimento é realizado também usando outros códigos para canal recomendados. Para realizar a comparação são usadas medições padronizadas do Transport Stream, medições objetivas como artefatos de blocagem e finalmente uma análise subjetiva do conteúdo recebido é usada. O trabalho conclui com a proposta de um Codificador de canal adaptável para Transport Stream.
There is a growing demand for the transport of video over IP today, i.e., for content distribution over the Internet, IPTV services in Standard and High Definition, or even inside traditional broadcasters networks, transporting broadcast quality contributions to the main program. In such applications, the source encoded MPEG-2 or -4 content is transported in the form of MPEG-2 Transport Streams, encapsulated over network protocols. However, IP networks, which can be modeled as Packet Erasure Networks (PEC), were not originally designed for the transport of real time media. There are problems, such as packet drops and jitter, which generate severe impairments in the content that is decoded at the reception. Traditional methods for overcoming these problems, as for example retransmissions performed by Automatic Repeat Request (ARQ) protocols, are not suitable for real-time multimedia protection. Channel coding is the solution of choice for protecting real-time multimedia over IP. There are channel coding schemes specified in open recommendations and Standards, widely adopted by equipment vendors today. Fountain Codes present very attractive characteristics for the transport of real-time multimedia. In the present work, simulations with a Fountain code, protecting Transport Stream contents prior to network encapsulation, are presented. The experiment if repeated with other channel coding techniques commonly employed today. In order to analyze the decoded contents and obtain comparative results, standardized Transport Stream measurements, objective Blocking Artifacts measurements and subjective analysis of the decoded samples are employed. This work is concluded with the proposal of a Transport Stream Adaptive channel encoder, that is explained in Appendix-B.
Von, Solms Suné. "Design of effective decoding techniques in network coding networks / Suné von Solms." Thesis, North-West University, 2013. http://hdl.handle.net/10394/9544.
Full textThesis (PhD (Computer Engineering))--North-West University, Potchefstroom Campus, 2013
Usman, Mohammed. "Assessment of the performance and applicability of fountain codes for multimedia streaming applications and stratergy for their deployment over GPRS systems." Thesis, University of Strathclyde, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501924.
Full textJafarizadeh, Saber. "Distributed coding and algorithm optimization for large-scale networked systems." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13238.
Full textKabore, Wendyida Abraham. "Codage de canal et codage réseau pour les CPL-BE dans le contexte des réseaux Smart Grid." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0038/document.
Full textThis PhD dissertation deals with the mitigation of the impact of the Narrowband PowerLine communication (NB-PLC) channel impairments e.g., periodic impulsive noise and narrowband noise, by applying the error/erasure correction coding techniques. After an introduction to the concept of smart grid, the NB-PLC channels are characterized precisely and models that describe these channels are presented. The performance of rank metric codes, simple or concatenated with convolutional codes, that are particularly interesting to combat criss-cross errors on the NB-PLC networks are simulated and compared with Reed- Solomon (already present in several NB-PLC standards) codes performance. Fountain codes that can adapt to any channel erasures statistics are used for the NB-PLC networks and the performance of cooperative schemes based on these fountain codes on linear multi-hop networks are studied. Finally, algorithms to combine the network coding and fountain codes for the particular topology of PLC networks for the smart grid are proposed and evaluated
Yue, Jing. "Distributed Joint Network-Channel Coding in Multi-Hop Wireless Networks." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/15884.
Full textApavatjrut, Anya. "De l'usage des codes fontaines dans les réseaux de capteurs multisauts." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00708449.
Full textFerreira, Paulo Alexandre Ribeiro. "Impacto dos códigos rateless em sistemas de difusão DAB." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/21082.
Full textA Rádio Televisão Portuguesa inaugurou a rede de difusão DAB em 1998. Nos anos que se seguiram realizou a sua expansão tendo chegado a cobrir todo o território nacional. Devido a diversos fatores, nomeadamente o preço dos recetores, a rede foi desligada em 2010. Nesta tese mostramos que a tecnologia DAB continua atual, oferecendo grandes vantagens quer aos operadores quer ao público em geral e além disso propõe uma solução tecnológica para a utilização da referida rede DAB. A solução proposta, consiste na difusão de conteúdos multimédia de sinalética e pode ser estendida a qualquer outra rede de difusão, nomeadamente DVB. Para este tipo de conteúdos, propomos o uso de códigos “Fountain” do tipo LT ou Raptor, códigos que conseguem uma grande eficiência e não requerem canal de retorno. No entanto, também mostramos que a existência de um canal de dados alternativo à rede de difusão DAB, mesmo que de baixo débito, permite enviar os dados em falta de forma eficiente e articulada com a rede de difusão DAB. Esta solução permite aumentar a área de cobertura em relação à utilização exclusiva das redes DAB/DVB. No caso Português esta seria uma forma eficiente e comercialmente interessante de tirar partido do espectro livre nas bandas DAB e DVB, nomeadamente para os dispositivos de sinalética e da “Internet of Things”.
The Portuguese Radio Television set up a DAB broadcasting network in 1998. In the years that follow this network was expanded to the whole Portuguese territory. Due to several factors, including the high cost of the receivers, the network was shut down in 2010. In this thesis we show that the DAB technology continues to be a hot topic, presenting many advantages for the operators and consumers. Moreover, we propose a technical solution for an alternative use of the DAB network. The proposed solution consists in the broadcasting of multimedia signage and can be extended to other networks, including the DVB. For this type of contents, we propose the use of Fountain codes like the LT or the Raptor codes that achieve a high efficiency and do not require a feedback channel. However, if an alternate channel exists, even with a low bit-rate, it allows the coverage area to increase when compared to the exclusive use of DAB/DVB networks. In the Portuguese case this would be an efficient and commercially interesting way to take advantage of the free spectrum in DAB and DVB bands, particularly for signage devices and the "Internet of Things".
Sabir, Essaïd. "MAC protocols design and a cross-layered QoS framework for next generation wireless networks." Phd thesis, Université d'Avignon, 2010. http://tel.archives-ouvertes.fr/tel-00544071.
Full textSabir, Essaid. "Conception de Protocoles de la Couche MAC et Modélisation des Réseaux Hétérogènes de Nouvelle Génération." Phd thesis, Université d'Avignon, 2010. http://tel.archives-ouvertes.fr/tel-00538837.
Full textKhan, Muhammad Ahsan. "CFD Applications for Wave Energy Conversion Devices (MoonWEC) and Turbulent Fountains for Environmental Fluid Mechanics." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textLin, Yung-Seng, and 林育聖. "A PAPR Reduction Scheme Using Fountain Codes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/29124278610733046070.
Full text元智大學
通訊工程學系
99
This thesis mainly discusses that using fountain codes to reduce the peak to average power ratio (PAPR) for OFDM systems. In previous research, the arrangement of the mapping from one fountain codeword to one OFDM symbol has been proven with the PAPR reduction performance similar to the well-known method of selective mapping (SLM). In this thesis, we focus on the arrangement of the mapping from one fountain codeword to n OFDM symbols due to the longer length of the codeword and evaluate its PAPR reduction performance. Besides, the arrangement of the mapping from m fountain codewords, each occupies m/N subcarriers, to m*n OFDM symbols is also considered. Computer simulations show the PAPR reduction improvement for these arrangements.
OROZCO, VIVIAN. "Trapping Sets in Fountain Codes over Noisy Channels." Thesis, 2009. http://hdl.handle.net/1974/5309.
Full textThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2009-10-29 14:33:06.548
Wang, Mao-Hua, and 王茂樺. "A Hybrid Coding Scheme that Combines Fountain Codes and Reed-Solomon Codes." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/72724580505627618670.
Full text國立臺灣科技大學
電子工程系
100
Fountain codes have been widely discussed recently. The main characteristic is that the number of encoded packets is not fixed before the transmission. LT code is the first practical type of fountain code; it can achieve great performance and reach low coding and encoding complexities. Since LT codes act well on erasure channel, one might consider whether it can be applied on noisy channel. Because the inter-symbol interference (ISI), the packets may be contaminated. The detrimental effect of error propagation in LT hard decoding may occur. Belief propagation algorithm is a solution to avoid situation like this. However, the simulation results of the bit error rate turn out to be quite high. We need to come up with some method to improve the performance. In this thesis, we create a new type of codes called "Hybrid Fountain Codes" by combining Reed-Solomon codes and LT codes. Under Reed-Solomon codes' correcting ability, errors can be corrected easily and Tanner graph can be updated. By passing information, renewing Tanner graph and removing connections, complexities can be reduced dramatically. The calculation of LLR is an important issue. We have to extract LLR value of both source packets and encoded packets so hard decision can be made. The combination of both hard and soft decision value is also important. Sometimes we have to combine encoded packets' soft decision with source packets' hard decision and vice versa. In this thesis, we derive unified computations for combining hard and soft decisions at the source nodes and encoded nodes. Sometimes the LLR value may be too large to deal with, so the approximate formula is also derived. The main advantage of this scheme is that the bit error rate can approach zero and total iteration times can be lower as compared to LT soft decoding only.
Chang, Chia-Jung, and 張家榮. "Finite Length Analysis of Generalized Expanding Window Fountain Codes." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/72592165255282742405.
Full text國立臺灣大學
電信工程學研究所
97
Fountain codes are suitable for data transmission over binary erasure channels. When such codes are applied in live broadcast applications, due to the limited bandwidth and delay constraints, it is often convenient to treat the input media stream as a concatenation of short data blocks and to encode each block individually. However, the use of a small block size may result in poor coding efficiency. In this thesis, we introduce an approach to enhance the coding efficiency by encoding over progressively more source bits. Our approach can be considered as a generalization of the expanding window fountain code concept. In addition, we provide an error analysis based on state generating functions. The state generating function is useful both as a performance evaluation tool and as a design criterion for the generalized expanding window codes.
Tsai, I.-Tse, and 蔡宜澤. "On Fountain Codes for Cooperative Systems UsingVarious Relaying Strategies." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/56842953903610154965.
Full text國立中山大學
通訊工程研究所
100
In wireless communication, multipath fading distorts the phase and the amplitude of received signals and increases error rate, which degrades causes communication quality. Multiple-input-multiple-output (MIMO) techniques can be adopted to achieve diversity gain and reduce error rate. However, MIMO is hard to be implemented in mobile devices due to size limitation. With this regard, cooperative communications are proposed to allow users to cooperate each other’s and then achieve diversity without equipping multiple antennas. On the other hand, if source and relays adopt fixed-rate transmission under time-varying wireless channels, it requires timely feedback about channel-information for transmitters to adjust the rate of channel encoder. To reduce overhead required for aforementioned scheme, we adopt rateless fountain codes in cooperative networks. In recent year, most related studies focus on information-theoretical aspect, but it lacks discussion of practical coding. In our work, we use fountain codes in dual-hop cooperative communication and analyse transmission rate in terms of transmitting time. Fountain code was first proposed as Luby transform codes(LTC) for erasure channels. We combine low-density parity-check code( LDPC code) and LTC in cooperative communication networks, and analyze required transmission time under different cooperative protocols.
Chiu, Hsin-Liang, and 邱信良. "Fountain Codes for OFDM Multicast Systems with PAPR Reduction Capability." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/22649665133635719117.
Full text國立臺灣大學
電信工程學研究所
97
Recently, fountain codes have got much attention not only in theoretic researches but also in practical applications. Instead of using ARQ (Automatic Retransmit request) methods which may cause large amount of retransmissions for Multicast communication while packet-losses happen among the multicast links, it is more suitable to apply fountain codes for it. In this thesis, we consider an OFDM multicast system which uses fountain codes as packet-level codes to achieve its transmissions. We propose several designs in generating specific fountain codes to solve the inherent high PAPR (Peak-to-Average Power Ratio) problem in OFDM systems. Compared to other usual PAPR reduction methods which need additional side information in the physical layer, our designs require no additional side information in the physical layer. Moreover, the decoding performance of proposed fountain codes maintains almost the same as that of usual fountain codes. Mathematical analyses and simulations verify the excellence of our designs.
LIAU, Andrew. "Low-Complexity Soliton-like Network Coding for a Resource-Limited Relay." Thesis, 2011. http://hdl.handle.net/1974/6833.
Full textThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2011-10-07 21:13:03.862
Hayajneh, Khaled. "Improving the Left Degree Distribution of Fountain Codes in the Finite-Length Regime." Thesis, 2013. http://hdl.handle.net/1974/8189.
Full textThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2013-08-22 19:40:59.885
Lu, Tung-Lung, and 呂東融. "Design and Performance Evaluation of Fountain Codes in UDP Streaming Environments." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/65073492986595147794.
Full text國立交通大學
資訊學院資訊學程
104
The goals of this thesis are to utilize the network resources optimally and allowed to send real-time data as fast as possible. Excessive network traffic causes network congestion and it leads to packets loss. Transmission Control Protocol (TCP) congestion control avoid this kind of packets loss. However, packets losses could be caused by either network congestion or channel transmission errors. If packet losses are caused by transmission errors, TCP will slow down its sending rate that unnecessarily leads to low throughput. On the other hand, the receiver needs to wait the retransmitted packet when the sent packet is lost. If many packets are lost, it will lead to obvious latency and cause a lot of retransmitted packets, which cannot sustain high throughput. To solve the existing protocol inefficiency problem, we design fountain codes suitable in UDP streaming environments. In our research methods, the blocks of packets can transform them into the algebraic equations. Even if the packets within the block are lost, the receiver can synchronize by the seed number to reconstruct the random number generator matrix, and according to the gauss elimination to decode. The proposed LT encoding uses a characteristic 2 finite field with 256 elements, which can also be called the Galois field GF(2^8). These elements are derived from IETF (Internet Engineering Task Force) RFC 6330. We can use these elements to construct K×N random number matrix. Thus, we can extend K source packets to the N (N>K) encoding packets. If the receiver received the K packets, we could try to recover the K source packets. In the experimental results which indicate that the proposed fountain code in UDP streaming is very helpful in reducing inefficiency in the case of high packet loss rate. The demonstration is designed and implemented by the Network Simulator – NS2. Our results may serve as a basis to facilitate the related future fountain code research.
Chiu, Hsien-Tzu, and 邱仙姿. "A Framework of Temporal Data Retrieval for Unreliable WSNs Using Distributed Fountain Codes." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/49302743185634816639.
Full text國立清華大學
資訊工程學系
102
Distributed storage coding has been widely applied on data gathering over unreliable wireless sensor networks (WSNs), where it is essential to ensure the data persistence in case of massive sensor failures caused by battery run-out or some physical damage problems surroundings. How to efficiently and scalably disseminate and collect the sensing data over WSNs is a key challenge yet. In this study, assumed that there are K sensor nodes equipped sensing apparatus within N storage sensors, these K numbers of sensors can sense environmental changes and disseminate coded (by Fountain codes) time-series data over WSNs using the simple random walk. That is, each sensor will receive others’ data, randomly select d (which according to the chosen degree distribution) of them, and encode into an encoded data then store it. In this thesis, we employ two types of Fountain codes: Luby Transform (LT) codes and Repairable Fountain (RF) codes to maintain the level of data persistence. In order to perform the Fountain codes over WSNs, the question is to disseminate data in the long range of random walks to preserve the randomness so as to boost the source decoded rate. In other words, the hop count would be long enough such that the decoding process can be perfectly completed using less amount of redundancy (say 10%). In this thesis, a framework of less communication cost is proposed due to the temporal dependency of time-series data. The concept is simple: the complete decoding is not necessary for most of time-series data since the missing portions can be compensated by neighbors if exists. Our framework works as follows. We separate time-series data into two categories. For a given number t, the data corresponding to the numbers divisible by t will be totally recovered with high probability; however, the data corresponding to the other time slots is set as partially recovered. As mentioned, the missing one can be interpolated by the nearby neighboring data through temporal dependency. The proposed framework employs LT codes and RF codes to increase the level reliability. Besides, a mathematical model to estimate the appropriate source decoded rate is proposed to reduce the transmission cost (hop count) while maintaining tolerable level (< 4% normalized root-mean-square error (NRMSE)) of errors as well.
Hung, Tsung-Kang, and 洪從罡. "The architecture of random linear fountain codes with hybrid coding in multiple Galois fields." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/p3bdh5.
Full textLu, Yi-Pin, and 盧一斌. "Design and Implementation of Real-Time Wireless Video Streaming using Cross-Layer Optimization and Fountain Codes." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/28004601280978447707.
Full text國立臺灣大學
電子工程學研究所
104
In order to avoid retransmission latency, Fountain codes, also known as rateless codes, have been widely proposed and applied in the designs for streaming systems. Fountain codes retain the partially decoded information, and continue to receive and decode the coded symbols until the number of accumulated correctly received coded symbols exceeds a pre-determined threshold, and then the complete information sequence can be recovered. This thesis presents a novel solution to cross-layer optimization for fountain code-based video streaming over adaptive multiple-input multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) wireless networks. Armed with the adaptive OFDM in combination with the practical channel state information, the transmission throughput can be adjusted in order to improve channel efficiency when fountain codes are used. A resource allocation algorithm is proposed for wireless video streaming using MIMO-OFDM that achieves an improvement in SNR of 8 dB over the conventional approach. When considering the feasibility of hardware implementation, RaptorQ code, the most advanced solution for fountain code, requires that a huge matrix inversion be performed, typically in a dimension of up to 2^{16}. This thesis offers an index-based algorithm that is helpful in improving the online decoding of the RaptorQ decodingii algorithm, employing the same decoding mechanism as the conventional RaptorQ, but reducing the computational complexity from cubic to quadratic. Then, an IC implementation of a configurable RaptorQ decoder in 90 nm technology is presented. This chip achieves an average throughput of 7 Mbps at a power consumption of only 52.7 mW, while supporting compressed video streaming at a quality of up to SDTV (720x480). Furthermore, a low-complexity RaptorQ decoding algorithm is proposed that uses the Sherman-Morrison formula to achieve offine decoding of the RaptorQ decoding algorithm. Compared to the online RaptorQ decoding algorithm, the complexity of the proposed RaptorQ decoding algorithm is only 6.5%. Thus, based on this algorithm, a high performance hardware implementation is designed, and validated using a Xilinx Kintex-7 FPGA board. The throughput of the proposed design reaches 46.5 Mbps, which is more than twice that of previous works, while consuming almost the same power. The thesis finally provides a prototype for how a real-time wireless video streaming system that includes a low latency RaptorQ code will function. Exploiting the high-performance RaptorQ decoder, the FPGA implementation for the proposed RaptorQ decoder is able to fully meet the requirements for the next-generation of wireless video streaming systems. Hence, an FPGA implementation of both a RaptorQ decoder and a MIMO-OFDM receiver for a real-time wireless video streaming system is presented. Together with an RF front-end and a progressive video codec implemented via software, the design, implementation, and validation of a prototype for a high-performance real-time wireless video streaming system are accomplished.
Peng, Jheng-Bao, and 彭鉦堡. "Broadcast Protocols Using Multipoint Relays And Fountain Codes for FH/TDMA Ad Hoc Networks Under Jamming Environment." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/47455653444654536099.
Full text元智大學
通訊工程學系
99
This thesis mainly discusses the protocols for broadcasting through multihop multipoint relays in wireless ad hoc networks. A base station broadcasts packets, which are first fountain encoded, downlink to all ad hoc nodes through multipoint relays. For simplicity, the relays transmit their packets according to the schedule of FH/TDMA. We assume two jamming cases which cause packet damaged. One is block jamming and the other is bit jamming. Besides the well-known flooding protocol and the optimized link state routing (OLSR) protocol under block jamming, we propose a weighted link state routing protocol. Compared with the flooding protocol, the proposed protocol can effectively decrease the total number of retransmitted packets sent by the relays in the network. Compared with the OLSR protocol, the proposed protocol can effectively decrease the retransmission delay in average for all nodes in the network. Under bit jamming, we propose the concept of virtual link to achieve higher resisting ability to jamming and hence lower number of retransmitted packets in the network. Simulation results verify our proposed ideas which provide good performance in the wireless ad hoc network.
Al-Awami, Louai. "Distributed Data Storage System for Data Survivability in Wireless Sensor Networks." Thesis, 2013. http://hdl.handle.net/1974/8403.
Full textThesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2013-09-30 22:43:04.509
BENACEM, Lucien. "Cooperative DVB-H: Raptor-Network Coding Protocols for Reliable and Energy Efficient Multimedia Communications." Thesis, 2010. http://hdl.handle.net/1974/5955.
Full textThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2010-08-03 19:45:54.943
Yang, Ding-Da, and 楊定達. "A Study on Designing Unequal error Protected Fountain coeds." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/69682623917058965019.
Full text元智大學
通訊工程學系
97
This thesis mainly concerns about the state-of-art methods on unequal error protected (UEP) fountain codes. The basic fountain codes such as random linear fountain codes, Luby Transform (LT) codes and Raptor codes are first introduced. Next, four existing UEP fountain codes use sliding windows, block duplication, priorities, expanding windows are examined. Besides we have made performance comparison among these methods, we propose some intuitive solutions to create more UEP classes on the sliding windows and priorities cases. In order to improve the failure rates of these codes, Raptor codes which integrates LDPC codes as outer codes and these UEP fountain codes as inner codes are also discussed in this thesis.
Lai, Yu-Hsun, and 賴煜勛. "Fountain Code Implementation in Compressed sensing for UDP streaming applications." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/466cag.
Full text國立交通大學
電子研究所
107
Deployments of video streaming applications in wireless mesh networks increase in recent years. However, the packet loss is inevitable in wireless channels. TCP applies retransmissions once a packet is lost, which makes TCP not suitable for multimedia communication. Unlike TCP, UDP does not require retransmission. It retains a high/constant transmission rate in a channel of high loss rate; however, the transmission quality is not guaranteed. The fountain code is a forward error correction method which guarantees to recover data as long as a sufficient amount of data is received. In this thesis, we implement a fountain code scheme on top of UDP for streaming applications. Due to the low throughput of a software implementation, we implement a fountain code hardware decoder in 65nm process. This decoder achieves 488.2MB/s under 500 Mhz. Under this fountain code scheme, a throughput higher than that of TCP in a high packet loss rate channel can be achieved. Since a fountain code decoder starts the decoding process only when enough codewords are received. This may cause video delay. We proposed a fountain code scheme compressed sensing algorithm that can start the decoding process even when there are not enough received codewords. In this way, it can be regarded as a scalable video coding scheme.
Chen, Chien-Hung, and 陳建宏. "Secure Multipath Routing Using Fountain Code for Mobile Ad-Hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/63041086234400731250.
Full text國立宜蘭大學
資訊工程研究所碩士班
99
Due to the rapid development of wireless network technologies such as Bluetooth, ZigBee, Wi-Fi, WiMAX, to name a few MANETs (Mobile Ad hoc Networks) have become the networks of choice for various types of applications, including military applications, emergency preparedness and responses, crisis management, to name a few. With these advantages come some challenges, particularly from a data routing and security standpoint. In a MANET, information exchange between nodes can happen without the need of a centralized server or human operator, assuming that nodes cooperate with each other for routing. With this requirement in mind, the presence of malicious nodes in routing operations may cause serious security concerns. Due to these issues associated with cooperative routing, providing a complete message security in MANETs is still a challenge. We propose a novel trust-based multipath routing scheme for MANETs (so-called Fountain Trusted-based Multipath AODV routing protocol - FTMAODV) which uses the fountain code to build a trusted and secure path to transmit the message from source to destination. Simulation experiments show that FTMAODV outperforms AODV and AOMDV in terms of end-to-end delay, packet delivery ratio, and throughput, chosen as performance metrics.
"Digital Fountain for Multi-node Aggregation of Data in Blockchains." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.51720.
Full textDissertation/Thesis
Masters Thesis Computer Science 2018
Guo, Yi-Shiuan, and 郭憶萱. "Design of a Fountain-Code-Based Error Control Scheme for On-Demand Streaming." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46049047838387402587.
Full text國立高雄應用科技大學
資訊管理系
97
In wireless network environments, there exist many factors that may interference the transmission of data. How to reduce the error rate in wireless transmission is an important design issue for wireless applications. In this paper, we focus on the error control problem for on-demand streaming. There are two types of error control schemes: automatic repeat request (ARQ) or forward error correction (FEC). The use of ARQ requires the retransmission of data, which causes extra overhead for the server and the network and may violate the real-time requirement of streaming data. On the other hand, traditional FEC schemes employ Reed-Solomon Codes, which has high coding efficiency and computational complexity. In view of this, in this paper, we proposed a novel approach that combined Multiplexed Harmonic Broadcasting and digital fountain codes to cope with the error control problem. The proposed scheme can actually compute the maximum initial waiting time required for users to obtain jitter-free smooth video streaming. Our simulation results show that the proposed error control scheme performs well in different network conditions as compared to traditional FEC error control scheme.
HSU, TSAI-CHEN, and 許在鎮. "Optimal Resource Allocation in Fountain Coded Cognitive Radio Networks with Energy Harvesting Secondary Users." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/49681586155052485971.
Full text國立中山大學
通訊工程研究所
103
In recent years,people rely on mobile communication in their daily life due to rapid development of wireless communications, which leads to growing demand of wireless data transmission.With this regard,spectrum resources become more and more scarce and expensive.With the development of electronic devices,mobile devices have more and more powerful functions, leading to increase on energy consumption.Therefore, RF energy harvesting that converts RF signals into electricity has been investigated to extend the battery lifetime of smart devices.Scholars have suggested that it can be converted to electromagnetic energy reception.This paper considers cognitive radio networks with one pair of primary users(PU) and multiple pairs of secondary users(SU), where second transmitters harvest energy from signal transmitted by PU.One the other hand, SU acts as a relay to boost primary transmission.THus, SU can be allocated with longer time-period to transmit itsown signal.We investigate optimal resource allocation at secondary user to maximize SU''s throughput subject to guaranteeing success of primary transmission.Due to we have multiple SUs, we will choose one optimal SU based on the maximal throughput according to the optimal resource allocation of respective SU.In order to enhance spectrum efficiency we adopt fountain coding to ecnode primary message at both PU and SU.This thesis aims to optimize the resource allocation of SUs in term of maximal throughput under the premise of successful primary transmission.Give the choice of SU, we derive close-form solution of optimal resource allocation maximum throughput.Finally, it shows through simulations that throughput of secondary transmission increases with the number of SU.
Chen, Yu Heng, and 陳鈺衡. "The Decoding Probability Model Estimation of Fountain Code Over P2P Streaming System and Its Application." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/64336610956082345191.
Full text國立清華大學
電機工程學系
100
ECC (Error-Correcting Codes) is used to recover loss data due to error in network data transmission. The traditional ECC has fixed code rate, the code rate will affect the ability of error correction, if channel condition is so bad that the quantity of data loss is too large to recover, the overall system decoding performance will drop quickly due to error propagation in P2P streaming system. In the thesis, we use fountain code combine with P2P system, fountain code doesn’t have the fixed code rate, so there is no problems of error checking and correction. We proposed a decoding distribution which is an approximation to statistic results for fountain code, and we put the distribution’s information into our distributed decoding probability predicted model which considers error propagation. Furthermore, we can do peer selection by using the predicted decoding probability when the upload bandwidth is not enough. Our experimental results show that the proposed predicted model has high accuracy, and the overall system decoding probability also increases after our peer selection method.
Luus, Francois Pierre Sarel. "Joint source-channel-network coding in wireless mesh networks with temporal reuse." Diss., 2011. http://hdl.handle.net/2263/28903.
Full textDissertation (MEng)--University of Pretoria, 2011.
Electrical, Electronic and Computer Engineering
unrestricted