Zobrazeno 1 - 10
of 1 794
pro vyhledávání: '"Tornado code"'
Publikováno v:
IEEE Transactions on Communications. 69:7139-7153
Lossless data transfer over communication networks has traditionally been achieved by means of ARQ protocols. However, the last ten years have seen an increasing interest in using erasure-correcting codes as an alternative, with the goal of reducing
In this letter, we present a hybrid iterative decoder for non-binary low density parity check (LDPC) codes over binary erasure channel (BEC), based on which the recursion of the erasure probability is derived to design non-binary LDPC codes with conv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::94b74cf4413999a99cec64d37274aa28
Autor:
Hanxu Hou, Yunghsiang S. Han
Publikováno v:
IEEE Transactions on Communications. 66:521-533
Array codes have been widely used in communication and storage systems. To reduce computational complexity, one important property of the array codes is that only exclusive OR operations are used in the encoding and decoding processes. Cauchy Reed–
Publikováno v:
Digital Signal Processing. 73:83-92
This paper presents a new algorithm to reduce significantly the computational cost of one of the best methods with self-recovery capabilities in the fragile watermarking literature. This is achieved by generating two sequences of reference bits assoc
Publikováno v:
Advances in Mathematics of Communications. 12:189-198
We study complementary information set codes of length \begin{document}$tn$\end{document} and dimension \begin{document}$n$\end{document} of order \begin{document}$t$\end{document} called ( \begin{document}$t-$\end{document} CIS code for short). Quas
Publikováno v:
IEEE Transactions on Communications. 65:5123-5136
The focus of this paper is on the analysis and design of Raptor codes using a multi-edge framework. In this regard, we first represent the Raptor code as a multi-edge type low-density parity-check (METLDPC) code. This MET representation gives a gener
Autor:
Chi Wan Sung, Xueqing Gong
Publikováno v:
Journal of Computer and System Sciences. 89:190-208
An erasure code is said to be k-reliable if it maps k source packets into n coded packets, and any k out of the n coded packets allow recovery of the original k source packets. Codes of k-reliability achieve the best reliability-storage tradeoff, whi
Publikováno v:
ACM Transactions on Storage. 13:1-27
Erasure codes are widely used in distributed storage systems to prevent data loss. Traditional codes suffer from a typical repair-bandwidth problem in which the amount of data required to reconstruct the lost data, referred to as the repair bandwidth
Publikováno v:
China Communications. 14:1-9
In this paper, we focus on short-block nonbinary LDPC (NB-LDPC) codes based on cyclic codes. Based on Tanner graphs' isomorphism, we present an efficient search algorithm for finding non-isomorphic binary cyclic LDPC codes. Notice that the parity-che
Autor:
Krishna Kaipa
Publikováno v:
IEEE Transactions on Information Theory. 63:4940-4948
We study the problem of classifying deep holes of Reed–Solomon codes. We show that this problem is equivalent to the problem of classifying maximum distance separable (MDS) extensions of Reed–Solomon codes by one digit. This equivalence allows us