LT码编译码算法优化及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字喷泉码(Digital Fountain code, DFC)是一种与信道相关性较小的网络编码,在深空通信、网络通信等领域中都具有潜在的应用价值。数字喷泉码可以改善现行网络传输机制,提高信息传输效率,并且在实际网络应用时,可以改善不同服务介质之间的差异性,满足用户对于数据存储中较高的要求。但编码数据包冗余度的大小、译码时延、节点发送停止标识、网络节点运算量估计与度数分布函数等都是使得其不易在实际网络中实现的关键问题。数字喷泉码在提出的时候是一种思想,并没有实际的编码算法,直到后来提出了一种主要的数字喷泉码算法——LT(Luby Transform, LT)码,其具有数字喷泉码固有的基本特征,因此,对LT码算法研究可以有针对性的理解数字喷泉码的构成、性质等,对改进算法以及提高数字喷泉码的实用性奠定基础。为了改善LT码的编译码算法,提供编码的仿真分析平台,论文基于实际项目背景对LT码进行研究,主要内容如下:
     1.对数字喷泉码原理进行分析,结合网络编码(Network coding, NC)算法,探讨网络编码和数字喷泉码的特征,为在网络环境中应用具体的数字喷泉码算法提供基础;深入研究其度数分布函数和译码固有的失败概率等关键参数,在充分理解生成矩阵产生以及检测过程的基础上,给出参数在不同条件下的仿真结果;分析数字喷泉码的应用环境,研究其环境变化的适应性,并且讨论数字喷泉码研究中的关键问题。
     2.论文针对度数分布函数不理想,没有易实现的合适度数分布函数设计依据,应用数学的极限分析算法,在LT码的度分布中进行研究,最终降低了LT码的编码平均度数和复杂度,其核心的思想主要是对LT码的编码过程在极限条件下进行推导,并且依据推导过程,分析得出了在极限条件下对LT码进行研究的结论。论文得出在不同的参数条件下,LT码性能差异较大,通过合理的设计LT码方案,最大化LT码优势,优化了LT码的存储结构。
     3.在前述研究的基础上,论文之后对于LT码中原始数据的选择问题,提出了一种不定帧长LT码方案,对不同的数据部分分别进行编码,通过不同的设计来提高性能。同时,将论文研究过程中提出的改进算法进行综合,提供一套仿真测试软件平台。论文在Microsoft Visual C++环境中,完成编译码流程图设计和程序设计,达到实现LT码编译码仿真的功能。
     4.论文针对LT码共有的存储空间大、译码概率低等弊端,研究并提出一种减少LT码生成矩阵存储空间的方法,降低传输过程中的时延。因为生成矩阵的列相当于编码传送的数据包,将熵编码算法引入LT码的编码方案中,对生成矩阵按列进行熵编码优化,该方法能够较大幅度的减少LT码的数据量,并且保持LT码的特征和结构,使其译码准确度也有较大提高。通过理论研究和仿真分析得出,将生成矩阵进行优化后,较大地降低了其存储空间。
     5.因为在LT码的编译码算法中,会存在时延,主要有编码过程的时延、传输过程的时延以及译码过程的时延三类,而时延过大会使接收机不能及时获取编码数据包,从而影响对信道情况的判断,较大地影响整个LT码的性能。论文重点分析了网络中编码传输某一编码数据包的时延情况,并且基于前述提出的不定帧长LT码结构,形成了以LT码为基础的改进的网络通信流程,给出了公式推导结果。论文在特定的环境中,研究分析了快速LT编码的算法性能以及通信的基本模式。之后针对网络通信环境中的不同传输策略,对网络编码和LT码的时延性能进行分析和改进。
     6.由于在很多通信系统或网络环境中,都存在带宽受限、对环境没有自适应能力、需要发送端预测网络环境以及大量的反馈重传以保证接收机正确接收原始数据等不利因素,使得通信的可靠性也受到限制。因此,论文在无线传感网络、水声网络的网络背景中探讨了LT码的性能,研究了该两种网络环境的基本拓扑模型,分析LT码在其中应用时的效果,从而改善数据的传输性能。
The Digital Fountain code (DFC) is a network coding algorithm that has the leastrelevant to the channel, which is very potential for the deep space and networkcommunication. Because of the DFC, the executing network transport mechanism and theinformation transforming efficiency may be improved. However, many problems likeencoding packet redundancy, decoding delay, stop sending notify, the complexity of nodealgorithm and the degree distribution will make the DFC unsuccessful in actual network.When proposed, the DFC is just an idea, which hasn’t an actual encoding algorithm. LT(Luby Transform) code is a mainly kind of DFC code, it has the basic characteristics of theDFC, and so the construction and feature of DFC could be studied by LT. In order to improvethe encoding and decoding algorithm and provide a simulation platform, this paper researchesthe LT under actual program, including:
     1. A basic theory of DFC is given out and analyzed, and then the network code and DFCare combined to make certain research about their characteristics, which support theapplication investigation. At the same time, the degree distribution and decoding failureprobability are researched deeply. With the understanding of its process, simulation are thenarranged to produce the result. An application and suitability investigation of the environmentare done and many key problems are discussed.
     2. The paper investigates a mathematical limiting algorithm into the LT code to solve thebad degree distribution reference. Also, the average degree and algorithm complexity arereduced. The paper mainly researches the formula and works out certain conclusions underlimiting condition. Based on the conclusions, the performance difference is very large withdifferent parameters. Through the rational design, the advantage of LT code is maximized andthe storage is optimized.
     3. On the basic discussion above, for the data selection problem of the source, a variableframe length LT (VFLLT) code scheme is proposed, whose core idea is encode the sourcedata separately and improve the performance by different design. Furthermore, a softwareexamination platform is designed for the optimal LT algorithms above. The paper works theplatform under Microsoft Visual C++environment, and achieves the process diagram and programming to realize the function of LT code.
     4. For the deficiency of large storage memory and low decoding probability about the LT,an optimal generator matrix storage scheme is proposed to reduce the decoding delay. For thecolumns of the matrix can be assumed as packets, and so the proposed entropy encodingalgorithm can be introduced into the matrix to encode the columns, which greatly reduces thedata amount for transforming by maintaining the LT characteristics, and improves thedecoding accuracy. The theory research and simulation results show that when the generatormatrix is optimized, the storage will also be reduced heavily.
     5. Because the delay will exsiting in the LT code, which has encoding delay,transforming delay and decoding delay. And if with large delay, the receiver couldn’t get theencoding packets in time that influences the judgment of the channel and the performance ofLT code seriously. The paper focuses on the delay of the encoding and transmission of onepacket. On the base of VFLLT code above, the paper also improves the networkcommunication process with LT, gives out the formula deduction. On some special condition,the paper analyze the performance of the so called fast LT code and its basic mode ofcommunication.Moreover, the delay performances of LT and network code are simulatedunder different transforming strategy.
     6. Because of the wideband restriction and network environment and the unsuitability,many systems need the transmitting node to forecast the channel conditions and a lot offeedbacks to ensure the reliable receive, which reduce the reliability of the communicationsystem, the paper discusses the LT code performance in wireless sensor network andunderwater acoustic network, analyzes their basic topology mode with LT code that improvesthe data transmission performance.
引文
[1] G.Vinton.Cerf.On the Evolution of Internet Technologies[J]. PROCEEDINGS O-F THE IEEE,2004,92(9):1360-1370.
    [2] Luis,Antonio.A Game Theoretic Analysis of Protocols Based on Fountain Cod-es[C].Proceedings of the10th IEEE Symposium on Computers and Communi-cations.2005:625-630.
    [3] Michael Mitzeumacher.Digital Fountains:Asurvey and Look Forward[C].IEEE I-nformation Theory Workshop,2004:271-276.
    [4] Zhang Zhihui, Zhang Xinghui.Unequal Loss Protection Optimized Strategy forFGS Video Transmission[C].International Conference on Biomedical Engineeri-ng and Computer Science,2010:1-4.
    [5]雷维嘉,王换换,谢显中.喷泉中继传输网络中基于信道信息和剩余能量的中继选择算法[J].重庆邮电大学学报(自然科学版),2012,24(2):190-195.
    [6] Claude E.Shannon.A Mathematical Theory of Communication[J].The Bell Syste-m Technical Journal,1948,27:379-423.
    [7] C.Berrou,A.Glavieux.Near Optimum Error Correcting Coding and Decoding: T-urbo-Codes[J].IEEE Transactions on Communications,1996,44(10):1261-1271.
    [8] J.E.Kleider,J.S.Chuprun.Adaptive Type and Rate Modulation and Channel Codi-ng Tradeoffs for Speech Communication[C].IEEE Radio and Wireless Confer-ence,1999:103-106.
    [9] R.Ahlswede,Ning Cai.Network Information Flow[C].IEEE Transaction on Infor-mation Theory,2000:1204-1216.
    [10] Moonseo Park,Seong-Lyun Kim.Minimum Distortion Network Code Design forSource Coding Over Noisy Channel[C].IEEE19th International Symposium onPersonal,Indoor and Mobile Radio Communication,2008:1-5.
    [11]王仕奎,张爱清.基于喷泉码的分布式鲁棒存储[J].武汉大学学报(工学版),2007,40(3):120-126.
    [12] D.J.C.Mackay.Fountain Codes[C].IEEE Proceedings-Communications,2005:1062-1068.
    [13] Jing Yang, An Jianping. Combined Fountain Code with Network Coding forError-Tolerant Transmission Network[C].WiCom’09.5thInternational Conferenceon Wireless Communications, Networking and Mobile Computing,2009:1-4.
    [14]吴丹,田亚飞,杨晨阳.喷泉码多路并行转发中继系统传输时间分析[J].通信学报,2010,31(8):121-126.
    [15] S.Shamai, E. Telatar, S Verdu,etc.Fountain Capacity[C].IEEE International Sym-posium on Information Theory,2006:1881-1884.
    [16]黄诚,易本顺,甘良才等.采用模运算和混沌的喷泉码[J].北京邮电大学学报,2010,33(3):121-125.
    [17] D.Sejdinovic, D.Vukobratovic,A.Doufexi,etc.Expanding Window Fountain Codesfor Unequal Error Protection[J].IEEE Transactions on Communications,2009,57(9):2510-2516.
    [18] Zhou Yu-jia,Zhao Yin,Xu Hong guang.A Cycle Elimination Algorithm for Con-struction of LT Codes[C].International Conference on Wireless Communicationand Sensor Computing,2010:1-3.
    [19] N.Rahnavard,F.Fekri.Finite-Length Unequal Error Protection Rateless Codes: De-sign and Analysis[C].GLOBECOM’05.IEEEGlobal Telecommunications Confer-ence,2005:1353-1357.
    [20] Yuan Xiaojun,Li Ping.Doped Accumulate LT Codes[C].IEEE International Sym-posium on Information Theory,2007:2001-2005.
    [21] Payam Pakzad,Amin Shokrollahi.EXIT Functions for LT and Raptor Codes,andAsymptotic Ranks of Random Matrices[C].IEEE International Syposium on In-formation Theory,2007:411-415.
    [22] Yuan Xiaojun,Li Ping.On Systematic LT Codes[J].IEEE Communication Letters,2008,12(9):681-683.
    [23] A.Venkiah,C.Poulliat,D.Declercq.Rate Splitting Issue for Finite Length RaptorCodes[C].IEEE Sarnoff Symposium,2008:1-5.
    [24]黄诚,易本顺,吴雄斌等.短码长LT码的蚁群算法度分布优化[J].北京邮电大学学报,2010,33(6):129-133.
    [25] A.G.Dimakis,Wang Jiajun,K.Ramchandran.Unequal Growth Codes: IntermediatePerformance and Unequal Error Protection for Video Streaming[C].IEEE9thMultimedia Signal Processing,2007:107-110.
    [26]朱宏鹏,张更新,谢智东.喷泉码中LT码的次优度分布[J].应用科学学报,2009,27(1):6-11.
    [27] E.Hyytia,T.Tirronen,J.Virtamo.Optimal Degree Distribution for LT Codes withsmall Message Length[C].26th IEEE International Conference on Computer C-ommunications,2007:2576-2580.
    [28] S.Karande,K.Misra, S. Soltani,etc.Design and Analysis of Generalized LT-codesusing Colored Ripples[C].IEEE International Symposium on Information Theor-y,2008:2071-2075.
    [29] A.Tarable,S.Benedetto.Graph-based LT and Raptor codes[C].IEEE InternationalSymposium on Information Theory,2008:2061-2065.
    [30]雷维嘉,刘慧锋,谢显中.开关度分布:一种改进的LT数字喷泉编码度分布[J].重庆邮电大学学报(自然科学版),2012,24(1):34-38.
    [31] A.AbdulHussein,A.Oka,L. Lampe.Decoding with Early Termination for Rateless(Luby Transform)Codes[C].IEEE Wireless Communications and NetworkingConference,2008:249-254.
    [32]林广荣,依那,董明科,梁庆林.基于停止集的喷泉编码有限长性能估计[J].电子与信息学报,2008,30(11):2634-2637.
    [33]朱宏杰,裴玉奎,陆建华.一种提高喷泉码译码成功率的算法[J].清华大学学报(自然科学版),2010,50(4):609-617.
    [34] Kim Saejoon,Ko Karam,Chung Sae Young.Incremental Gaussian Elimination D-ecoding of Raptor Codes over BEC[J].IEEE Communications Letters,2008,12(4):307-309.
    [35] E.Maneva,A.Shokrollahi.New model for rigorous analysis of LT-codes[C].IEEEInternational Symposium on Information Theory,2006:2677-2679.
    [36] V.Bioglio.On the Fly Gaussian Elimination for LT Codes[J].IEEE Communicati-ons Letters,2009,13(12):953-955.
    [37] N.Rahnavard,B.N.Vellambi, F.Fekri. Rateless Codes With Unequal Error Protect-ion Property[J].IEEE Transactions on Information Theory,2007,53(4):1521-1532.
    [38] J.W.Byers, M.Luby, M.,itzenmacher.A Digital Fountain Approach to Asynchron-ous Reliable Multicast[J].IEEE Journal on Selected Areas in Communications,2002,20(8):1528-1540.
    [39] D.Kumar,T.Chahed,E.Altman.Analysis of a Fountain Codes Based Transport inan802.11WLAN Cell[C].21st International Teletraffic Congress,2009:1-8.
    [40] Wajahat Khan, Le Long Bao, E.Modiano.Autonomous Routing Algorithms forNetworks with Wide-Spread Failures[C].IEEE MILCOM Military Communicati-ons Conference,2009:1-6.
    [41] Zeng Weiliang,Wangy Youzheng,Lu Jianhua.A Highly Efficient Protocol for Ra-teless Coding Aided Cooperative Cellular Networks[C].IEEE MILCOM Militar-y Communications Conference,2009:23-29.
    [42] B.Sivasubramanian,H.Leib.Fixed-Rate Raptor Codes Over Rician Fading Chann-els[J].IEEE Transactions on Vehicular Technology,2008:27(6):3905-3911.
    [43]陈月云,刘伟.基于新型随机度分布的压缩喷泉码[J].电子与信息学报,2012,34(5):1185-1190.
    [44] Shao Xiaoying, C.H.Slump.A Novel Cross Coding Scheme for OFDM Systems[C].IEEE Information Theory Workshop,2009:445-449.
    [45] H.Jenkacv,T.Stockhammer,Xu Wen.Asynchronous and Reliable On-Demand Med-ia Broadcast[J].IEEE Network,2006,20(2):14-20.
    [46] Liu Xi,Lim Teng Joon.Fountain Codes over Fading Relay Channels[J].IEEE Tr-ansactions on Wireless Communications,2009,8(6):3278-3287.
    [47] S.D.Roy,S.Kundu.Multimedia Broadcast with Fountain Code in Cellular CDMA
    [C].4th International Conference on Computers and Devices for Communicati-on,2009:1-4.
    [48] Shao Xiaoying,C.H.Slump.Opportunistic Error Correction for MIMO[C].20th In-ternational Symposium on Personal, Indoor and Mobile Radio Communications,2009:1757-1761.
    [49] O.Etesami,A.Shkrollahi.Raptor Codes on Binary Memoryless Symmetric Chann-els[J].IEEE Transactions on Information Theory,2006:2033-2051.
    [50] R.Palanki,J.S.Yedidia.Rateless codes on noisy channels[C].International Symposi-um on Information Theory,2004:38.
    [51]林广荣,林新荣,依那等.基于LDPC码的数字喷泉码编码[J].电子与信息学报,2008,30(4):822-825.
    [52] Yang Yang,Chen Yongrui,Yi Weidong.Cross-Layer Forward Error Control ForReliable Transfer In Wireless Multimedia Sensor Networks[C].7th IEEE Cons-umer Communications and Networking Conference,2010:1-2.
    [53] A.Oka,L.Lampe.Data Extraction from Wireless Sensor Networks Using Distribu-ted Fountain Codes[J].IEEE Transactions on Communications,2009,57(9):2607-2618.
    [54]曾凡仔,陈苗苗,罗娟等.一种能量有效的无线传感网络节点跟踪算法[J].湖南大学学报(自然科学版),2009,36(1):81-84.
    [55] Marcel Busse,Thomas Haenselmann,Wolfgang Effelsberg.Energy-Efficient DataDissemination for Wireless Sensor Networks[C].5th Annual IEEE InternationalConference on Pervasive Computing and Communications Workshops,2007:301-306.
    [56] C.Stefanovic,D.Vukobratovic,T,Karabenc,etc.On Energy Efficiency of Rateless P-acket Scheme for Distributed Data Storage in Wireless Sensor Networks[C].7thInternational Conference on Wireless On-demand Network Systems and Serv-ices,2010:61-65.
    [57] S.Agarwala,A.Paul,K,Schwan.e-SAFE: An Extensible, Secure and Fault TolerantStorage System[C].1st International Conference on Self-Adaptive and Self-Org-anizing Systems,2007:257-268.
    [58] Shao Xiaoying,R.Schiphorst,C.C.Slump.Energy Efficient Error Correction in Mo-bile TV[C].IEEE International Conference on Communications,2009:1-6.
    [59]侯春萍,倪春亚,侯永宏.基于EWF的H.264视频流UEP传输方案[J].天津大学学报,2012,45(4):309-313.
    [60] S.Kokalj-Filipovic,P.Spasojevic,E.Soljanin.Doped Fountain Coding for MinimumDelay Data Collection in Circular Networks[J].IEEE Journal on Selected Areasin Communications,2009,27(5):673-684.
    [61] K.Al Agha,N.Kadi,I.Stojmenovic.Fountain Codes with XOR of Encoded Packetsfor Broadcasting and Source Independent Backbone in Multi-hop Networks Using Network Coding[C].69th VTC Spring Vehicular Technology Conference,2009:1-5.
    [62] Lin ChenLong,Li KuanMing.Fountain Coding for Efficient TPEG Data Recepti-on on Data Carousel Transmission[C].9th International Conference on Intellige-nt Transport Systems Telecommunications,2009:486-491.
    [63] R.Janakiraman,XuLihao.Layered Priority Encoded Transmission for Video Strea-ming to Heterogeneous Clients[C].International Symposium on Information Theory,2004:331.
    [64] C.Hellge,T.Schierl,T.Wiegand.Multidimensional Layered Forward Error Correctio-n using Rateless Codes[C].IEEE International Conference on Communications,2008:480-484.
    [65] P.Cataldi,M.Gerla,F.Zampognaro.Rateless Codes for File Transfer over DVB-S[C].IEEE International Conference on Advances in Satellite and Space Comm-unications,2009:7-12.
    [66]韩松,顾国昌,邓迎春.基于M/MMPP/1节点模型的无线Ad Hoc网络容量分析[J].计算机学报,2011,34(9):1679-1686.
    [67] T.D.Nguyen,F.C.Kuo,L.Yang.Amalgamated Generalized Low Density Parity Che-ck and Luby Transform Codes for the Wireless Internet[C].IEEE65th VTC2007Spring Vehicular Technology Conference,2007:2440-2444.
    [68]黄诚,易本顺.喷泉码的Logistic映射实现[J].北京邮电大学学报,2009,32(1):103-107.
    [69] Li S.-Y.R., Yeung R.W., Cai N.Linear Network Coding[J].IEEE Transactions onInformation Theory,2003,49(2):371-381.
    [70] Koetter R.,Medard M.An Algebraic Approach to Network Coding[J].IEEE/ACMTransactions On Networking,2003,11(5):782-795.
    [71]曹博,曹志刚,晏坚等.PL FEC可靠组播解决方案分组长度研究[J].清华大学学报(自然科学版),2008,48(4):567-570.
    [72] Amin Shokrollahi.Raptor Codes[J].IEEE Transactions on Information Theory,2006,52(6):2551-2567.
    [73] R.Khalili,K.Salamatian.On the Capacity of Erasure Relay Channel:Multi-RelayCase[C].IEEE Information Theory Workshop,2005:103-107.
    [74] Wu Kedi,Zhang Zhaoyang,Huo Yuanyuan,etc.Accumulate Rateless Codes ForAWGN Channel[C].3rd International Conference on Communications and New-orks,2008:100-104.
    [75] Alberto Tarable,Sergio Benedetto.Analysis of PCO Raptor codes and Turbo-Fountain Codes on Noiseless Channels[C].International Symposium on InformationTheory,2007:416-420.
    [76] M.Luby.LT code[C].43rd Annual IEEE Symposium on Foundations of Comput-er Science,2002:271-280.
    [77]杨航,茹乐,杜兴民.一种新的LV-BPL宽带通信系统仿真[J].系统仿真学报,2007,19(14):3327-3330.
    [78]雷维嘉,谢显中,李广军.采用数字喷泉码的无线协作中继方案及其性能分析[J].电子学报,2010,38(1):228-233.
    [79] C.H. Liu,X.Hu.Wavelet-enabled Massive Data Compress Algorithm[C].Internatio-nal Conference on Computer Application and System Modeling,2010:515-517.
    [80]金坚,谷源涛,梅顺良.压缩采样技术及其应用[J].电子与信息学报,2010,32(2):470-475.
    [81]景明利,齐春.一种基于矩阵分解的正交4抽头多小波无损压缩算法[J].西安交通大学学报,2011,45(2):1-6.
    [82] T.Tirronen,J.Virtamo.Finding Fountain Codes for Real-Time Data by Fixed Poi-nt Method[C].International Symposium on Information Theory and Its Applica-tion,2008:1-6.
    [83]袁磊,安建平.具有不等差错保护特性的Raptor码研究[J].北京理工大学学报,2010,30(8):966-968.
    [84]黄诚,易本顺.基于抛物线映射的混沌LT编码算法[J].电子与信息学报,2009,31(10):2527-2531.
    [85] Andreas Merentitis,Nektarios Kranitis,etc.Low Energy Online Self-Test of Emb-edded Processors in Dependable WSN Nodes[J].IEEE Transactions on depend-able and secure computing,2012,9(1):86-100.
    [86] Ren Yueqing,Xu Lixin.A Study on Topological Characteristics of Wireless Sen-sor Network Based on Complex Network[C].International Conference on Com-puter Application and System Modeling,2010(15):486-489.
    [87]王宁,林雪红,林家儒.网络编码的分布式存储系统理论分析[J].北京邮电大学学报,2009,32(3):82-85.
    [88] Proakis J G Sozer E M,Rice JA,etc.Shallow Water Acoustic Networks[J].IEEECommunications Magazine,2001,39(11):114-119.
    [89] J.MacLaren Walsh,S.Weber.A Concatenated Network Coding Scheme for Multi-media Transmission[C].4th Workshop on Networkshop on Network Coding,Th-eory and Applications,2008:1-6..
    [90]慕建君,焦晓鹏,曹训志.数字喷泉码及其应用的研究进展与展望[J].电子学报,2009,37(7):1571-1577.
    [91] Zhou Qian,Li Liang,Chen ZengQiang.Encoding and Decoding of LT Codes Ba-sed on Chaos[C].3rd International Conference on Innovative Computing Infor-mation and Control,2008:451.
    [92] Wu Xuebin,Wang Haidong,Yan Zhiyuan.Erasure Codes for Broadcasting SmallFiles Over Erasure Channels with Low Bandwidth[C].42nd Annual Conferenceon InformationScience and Systems,2008:556-561.
    [93] H.Tarus,J.Bush,J.Irvine.Exploiting Redundancies to Improve Performance of LTDecoding[C].6th Annual Communication Networks and Services Research Con-ference,2008:198-202.
    [94] S.A.Aly,Kong Zhenning,E.Soljanin.Fountain Codes Based Distributed Storage A-lgorithms for Large-scale Wireless Sensor Networks[C].International Conferenceon Information Processing in Sensor Networks,2008:171-182.
    [95]雷维嘉,张鑫,谢显中.一种迭代方法的RS喷泉码的编译码算法[J].重庆邮电大学学报(自然科学版),2010,22(3):307-311.
    [96] D.Sejdinovi,R.J.Piechocki,A.Doufexi.Fountain Coding with Decoder Side Inform-ation[C].IEEE International Conference on Communications,2008:4477-4482.
    [97] Zhang Yuanyuan,Ma Yi,R.Tafazolli.Improved Coded Cooperation Schemes forWireless Communications[C].6th International Symposium on Modeling andOptimization in Mobile,Ad Hoc,and Wireless Networks and Workshops,2008:533-538..
    [98] Lei Weijia,Li Guangjun,Li Xiangming,etc.Iterative Coding and Decoding Algori-thm of RS Digital Fountain Code[C].11th IEEE Singapore International Confe-rence on Communication Systems,2008:237-240.
    [99]张楠,陈思,孙晔等.一种频域RS-LT级联码在短波通信中的应用研究[J].系统仿真学报,2008,20(10):2654-2658.
    [100] V.G.Subramanian,D.J.Leith.On a class of optimal rateless codes[C].46th AnnualAllerton Conference on Communication,Control,and Computing,2008:418-425..
    [101] A.Eryilmaz,A.Ozdaglar,M.Medard.On the Delay and Throughput Gains of Codi-ng in Unreliable Networks[J].IEEE Transactions on Information Theory,2008,54(12):5511-5524.
    [102] Zhang Yangfan,Liu Yingzhuang,Zhou zongyi.On the Delay Performance of Ra-ndom Linear Codes Based Wireless Broadcasting Scheme[C].4th IEEE Interna-tional Conference on Circuits and Systems for Communications,2008:763-767..
    [103] Shao Xiaoying,R.Schiphorst,C.H.Slump.Opportunistic Error Correction in WLANApplications[C].4th International Conference on Wireless Communications,Net-working and Mobile Computing,2008:1-5.
    [104] C.Berger,Zhou Shengli,Wen Yonggang.Optimizing Joint Erasure-and Error-Corr-ection Coding for Wireless Packet Transmissions[J].IEEE Transactions on Wir-eless Communications,2008,7(11):4586-4595.
    [105]顾术实,焦健,杨志华等.面向深空通信的中继协作喷泉码设计[J].系统工程与电子技术,2012,34(8):1696-1701.
    [106] P.Palanisamy,T.V.S.Sreedhar.Performance Analysis of Raptor Codes in OFDMSystems[C].1st International Conference on Emerging Trends in Engineering a-nd Technology,2008:1307-1312.
    [107] S.Ahmad,R.Hamzaoui,M.Al-Akaidi,etc.Practical Channel-adaptive Video Streami-ng with Fountain Codes[C].3rd International Conference on Pervasive Comput-ing and Applications,2008:351-355.
    [108] D.Sejdinovic,R.J.Piechocki,A.Doufexi,etc.Rate Adaptive Binary Erasure Quantiza-tion with Dual Fountain codes[C].IEEE Global Telecommunications Conference,2008:1-5.
    [109] R.Gummadi,R.S.Sreenivas.Relaying a Fountain code across multiple nodes[C].I-EEE Information Theory Workshop,2008:149-153.
    [110]姚文顶,李晖,陈立甲等.深空通信中喷泉码技术研究[J].系统工程与电子技术,2009,31(1):40-44.
    [111] S.Argyropoulos,A.S.Tan,N.Thomos.Robust Transmission of Multi-View Video St-reams using Flexible Macroblock Ordering and Systematic LT Codes[C].3DTVConference,2007:1-4.
    [112] H.Wicaksana,Ting Ho See,Guan Yong Liang.Spectral Efficient Half Duplex Re-laying for Fountain Code with Wireless Network Coding[C].IEEE InternationalConference on Communications Workshops,2008:295-299.
    [113] D.Sejdinovic,V.Ponnampalam,R.J.Piechocki,etc.The Throughput Analysis of Diff-erent IR-HARQ Schemes Based on Fountain Codes[C].IEEE Wireless Commu-nications and Networking Conference,2008:267-272.
    [114] P.Casari,M.Rossi,M.Zorzi.Towards Optimal Broadcasting Policies for HARQ ba-sed on Fountain Codes in Underwater Networks[C].5th Annual Conference onWireless on Demand Network Systems and Services,2008:11-19.
    [115]彭真,陈兰香,郭躬德.基于喷泉码的隐私保护和数据恢复方法[J].华中科技大学学报(自然科学版),2012,40(1):54-57.
    [116] Zhu Hongpeng,Zhang Gengxin,Li Guangxia.A Novel Degree Distribution Algor-ithm of LT Codes[C].11th IEEE International Conference on ConmmunicationTechnology,2008:221-224.
    [117] Zhu Hongpeng,Li Guangxia,Xie Zhidong.Advanced LT Codes in Satellite DataBroadcasting System[C].11th IEEE Singapore International Conference on Co-mmunication Systems,2008:1431-1435.
    [118] D.Sejdinovic,R.J.Piechocki,A.Doufexi.AND-OR Tree Analysis of Distributed LTCodes[C].IEEE Information Theory Workshop on Networking and InformationTheory,2009:261-265.
    [119] Lin Yongzhao,Liu Wei,Zhang Qun,etc.Application of the Concatenation of ReedSolomon and Luby Transform Codes in Deep Communications[C].3rd IEEE I-nternational Conference on Space Mission Challenges for Information Technol-ogy,2009:29-33.
    [120] N.Wu,T.D.Nguyen,C.Y.Wei,etc.Intergrated LT Coding,Bit Interleaved DifferentialSpace Time Coding and Sphere Packing Modulation for the Wireless Internet[C].IEEE Vehicular Technology Conference,2008:344-348.
    [121] Lee Ki-Moon,H.Radha,Kim Beom-Jin,etc.Kovalenko’s Full-Rank Limit and Overheads as Lower Bounds of Error-Performances of LDPC and LT Codes overBinary Erasure Channels[C].International Symposium on Information Theory and Its Applications,2008:1-5.
    [122] Lu Feng,Foh Chuan Heng,Cai Jianfei,etc.LT Codes Decoding:Design and Anal-ysis[C].IEEE International Symposium on Information Theory,2009:2492-2496.
    [123] A.Hagedorn,S.Agarwal,D.Starobinski.Rateless Coding with Feedback[C].IEEE I-NFOCOM2009:1791-1799.
    [124] Zhang Kai,Huang Xinming,Shen Chen.Soft Decoder Architecture of LT Codes[C].IEEE Workshop on Signal Processing Systems,2008:210-215.
    [125] S.Puducheri,J.Kliewer,T.E.Fuja.The Design and Performance of Distributed LTCodes[J].IEEE Transactions on Information Theory,2007,53(10):3740-3754.
    [126]林永照,吴成柯,刘薇.LT码和q-LDPC码级联方案在深空通信中的应用[J].电子与信息学报,2010,32(8):1898-1903.
    [127] S.S.Woo,M.K.Cheng.Prioritized LT Codes[C].42nd Annual Conference on Infor-mation Sciences and Systems,2008:568-573.
    [128] Y.Kong, L.Nguyen,W.M Jang.Self-Encoded Spread Spectrum Modulation withDifferential Encoding[C].7th International Symposium on Spread Spectrum Techniques and Applications,2002:471-474.
    [129]高飞,曾宪锋,卜祥元.数字喷泉码技术在跳频通信中抗干扰性能研究[J].北京理工大学学报,2012,32(4):420-424.
    [130] M.Darnell.Error Control Coding: Fundamentals and Applications[J].IEE Proceed-ings F Communications,Radar and Signal Processing,1985,132(1):68-71.
    [131] Kuang Yujun,Long Keping,Chen Qianbin.Mobile TCP/IP Architecture for Mobi-lity Management over IP networks[C].4th International Conference on OpticalInternet,2005,552-557.
    [132]孙蓉,刘景伟,孙岳等.非规则RA码误码率特性分析[J].系统工程与电子技术,2011,33(3):654-658.
    [133] A.Woo,D.Culler.A Transmission Control Scheme for Media Access in SensorNetworks[C].Proceedings of the ACM MobiCom,2001:221-235.
    [134] D.Gomez-Barquero,N.Cardona,A.Bria,etc.Affordable Mobile TV Services in Hy-brid Cellular and DVB-H Systems[J].IEEE Network,2007,21(2):34-40.
    [135] I.F.Akyildiz,Su.Weilian,Y.Sankarasubramaniam,etc.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(8):102-114.
    [136]邓在辉,易本顺,甘良才.采用带梯度的粒子群优化算法的LT码度分布设计[J].北京邮电大学学报,2011,34(3):40-43.
    [137] J.Y.Le Boudec,R.Merz,B.Radunovic.DCC-MAC A Decentralized MAC Protocolfor802.15.4a-like UWB Mobile Ad-hoc Networks Based on Dynamic ChannelCoding[C].Proceedings of the First International Conference on Broadband Ne-tworks,2004:396-405.
    [138] Zhu Hongjie,Zhang Chao,Lu Jianhua.Designing of Fountain Codes with ShortCode-Length[C].3rdInternational Workshop on Signal Design and Its Applicati-on in Communications,2007:65-68.
    [139] M.Rossi,G.Zanca,L.Stabellini,etc.A Network Reprogramming Protocol for Wirele-ss Sensor Networks Using Fountain Codes[C].SECON’08.5thAnnual IEEE C-ommunications Society Conference on Sensor,Mesh and Ad Hoc Communicat-ions and Networks,2008:188-196.
    [140] Yang Jing,An Jianping,Li Xiangming.Combined Fountain Code with NetworkCoding in Cooperative Communication[C].Second International Conference onNetworks Security Wireless Communication and Trusted Computing,2010:24-27.
    [141] Zhou Qian,Chen Zengqiang.Application of Chaos in Digital Fountain Codes[C].The9th International Conference for Young Computer Scientists,2008:2786-2791.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700