2015
DOI: 10.1109/cc.2015.7188528
|View full text |Cite
|
Sign up to set email alerts
|

Joint network and fountain codes design for relay-assisted multi-user system

Abstract: 96wireless systems such as IMT-Advanced, a relay station needs to assist uplink transmissions originated from multiple user equipment within its coverage simultaneously [1] .General speaking, network coding (NC) is always used in efficient transmission. Full diversity can be achieved in NC cooperation system [2] . Rateless codes(RC), also known as fountain codes, are good at channel adaptability. The cooperation scheme based on RC has advantage on robustness [3] , throughput [4] , computation complexity, memor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…It is assumed that the frame length of user is 500. Based on the degree distribution method in [33], the degree distribution at user node is Ω U ( x ) = 0.0252 x + 0.4829 x 2 + 0.1571 x 3 + 0.1057 x 4 + 0.0523 x 6 + 0.0664 x 7 + 0.0384 x 4 + 0.031 x 15 + 0.007 x 46 + 0.034 x 47 . We assumed that M correct = 4, the degree distribution is Ω R ( x ) = 0.3704 x 2 + 0.4224 x 3 + 0.0124 x 7 + 0.1177 x 8 + 0.0546 x 15 + 0.0102 x 89 + 0.0123 x 90 .…”
Section: Simulation Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…It is assumed that the frame length of user is 500. Based on the degree distribution method in [33], the degree distribution at user node is Ω U ( x ) = 0.0252 x + 0.4829 x 2 + 0.1571 x 3 + 0.1057 x 4 + 0.0523 x 6 + 0.0664 x 7 + 0.0384 x 4 + 0.031 x 15 + 0.007 x 46 + 0.034 x 47 . We assumed that M correct = 4, the degree distribution is Ω R ( x ) = 0.3704 x 2 + 0.4224 x 3 + 0.0124 x 7 + 0.1177 x 8 + 0.0546 x 15 + 0.0102 x 89 + 0.0123 x 90 .…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…According to different channel condition, the degree distribution is also different. For multi‐user system with relay, the degree distribution design is shown in [33].…”
Section: Proposed Distributed Ple Schemementioning
confidence: 99%
“…The index sequence generation algorithm is as follows. Algorithm 1 Index sequence generation (1) Partition [0, 1] into L intervals uniformly, and the index of intervals is denoted as (1, 2, …, L ). (2) Using key bold-italicK as a seed to generate a random number a in [0, 1], which obeys uniform distribution. (3) Find the interval which a is in, and output the index of the interval as ij. Step 2 : Generate random degree sequence D=)(d1,thinmathspaced2,thinmathspace...Z+ based on the degree distribution normalΩfalse(dfalse) (the method can be seen in [39]) and bold-italicK D=RndKfalse(normalΩfalse(dfalse)false) where djZ+. The degree sequence generation algorithm can be seen as below: Algorithm 2 Degree sequence generation (1) Partition [0, 1] into Dmax (the maximum number of degree) intervals, the width of each interval is equal to the probability of each degree dj in normalΩfalse(dfalse). (2) Using key bold-italicK as a seed to generate a random number a in [0, 1], which obeys uniform distribution. (3) Find the interval which a is in, and output the corresponding degree dj. Step 3 : Select dj)(j=1,thinmathspace2,thinmathspace... values from I in sequence to form the index sequence.…”
Section: Concatenated Plementioning
confidence: 99%
“…On the basis of the degree distribution design method in [39], distributions normalΩfalse(xfalse) with length L=500 and δ=0.001 are shown as right leftthickmathspace.5emΩ(x)=0.0195x+0.4864x2+0.166x3+0.0599x4+0.0981x5+0.0879x9+0.0023x10+0.0442x22+0.0065x23+0.0096x98+0.0098x99+0.0097x100 On the basis of Fig. 4, RS(255,239) is assumed as the channel code in the simulation system.…”
Section: Comparison Analysis and Simulationmentioning
confidence: 99%
“…Later, raptor codes were proposed to provide better performance by precoding [3]. Following the advent of rateless codes, LT codes have been introduced and exploited in both data transmission [4] and storage [5]. Generally, given k input symbols, potentially infinite number of encoded symbols can be generated and then transmitted to the receiver on the fly.…”
Section: Introductionmentioning
confidence: 99%