Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/62652
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sthaporn Chanayai | en_US |
dc.contributor.author | Anya Apavatjrut | en_US |
dc.date.accessioned | 2018-11-29T07:38:10Z | - |
dc.date.available | 2018-11-29T07:38:10Z | - |
dc.date.issued | 2018-08-21 | en_US |
dc.identifier.other | 2-s2.0-85053457546 | en_US |
dc.identifier.other | 10.1109/ICSEC.2017.8443960 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053457546&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/62652 | - |
dc.description.abstract | © 2017 IEEE. Fountain codes are new generation of FEC codes that offer rateless transmission on erasure channel. Most of previous studies of fountain codes focused on improving theoretical bound of encoding and decoding algorithms and so far, we did not find any that discuss implementation of these codes in real applications. Fountain codes have originally been designed for multicast and multimedia applications however the use of fountain codes was lately extended to other types of network including low-powered communications such as in IoT applications. The discussion on fountain codes implementation in network point of view is very limited. We know that with fountain codes, parity matrix is needed to be communicated to the decoders during or prior to data transmission. From literature review, we found one paper that has mentioned the usage of association key or seed to randomly generate the same parity matrix for both parties. Although using association key may be beneficial in multimedia applications where fountain codes have originally been designed for, transmission overhead has been shown to be less beneficial when applied with low-data communications. In this work, we proposed another header management scheme that allows reducing transmission overhead by including an array list of connections which identifies a list of original symbols encoded inside each frame. The experiment was performed and it has been shown that the proposed technique is more beneficial to be deployed in a small network such as in sensor networks or in IoT applications. | en_US |
dc.subject | Computer Science | en_US |
dc.title | Analysis of Header Management for LT Codes in IoTs Netwok | en_US |
dc.type | Conference Proceeding | en_US |
article.title.sourcetitle | ICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.