SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 2, April 2020, pp. 1972~1979
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp1972-1979  1972
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Improving the data recovery for short length LT codes
Nadhir Ibrahim Abdulkhaleq1
, Faeza Abbas Abed2
, Ihsan Jabbar Hasan3
, Falah Hasan Mahdi4
1
Department of Mobile Computing and Communication Engineering-College of Engineering, University of Information
Technology and Communication, Baghdad Al Mansour-Iraq
2,4
Department of Electronic Techniques, Institute of Technology-Middle Technical University, Iraq
3
Department of Electronic, Medical Technical Institute/Al Mansour-Middle Technical University, Iraq
Article Info ABSTRACT
Article history:
Received Jan 21, 2019
Revised Oct 29, 2019
Accepted Nov 5, 2019
Luby Transform (LT) code is considered as an efficient erasure fountain
code. The construction of the coded symbols is based on the formation of
the degree distribution which played a significant role in ensuring a smooth
decoding process. In this paper, we propose a new encoding scheme for LT
code generation. This encoding presents a deterministic degree generation
(DDG) with time hoping pattern which found to be suitable for the case of
short data length where the well-known Robust Soliton Distribution (RSD)
witnessed a severe performance degradation. It is shown via computer
simulations that the proposed (DDG) has the lowest records for unrecovered
data packets when compared to that using random degree distribution like
RSD and non-uniform data selection (NUDS). The success interpreted in
decreasing the overhead required for data recovery to the order of 25% for
a data length of 32 packets.
Keywords:
Deterministic degree generation
Encoding scheme
Luby transform code
Time hoping
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Nadhir Ibrahim Abdulkhaleq,
Department of Electronic Techniques
Middle Technical University,
Al Zaafaraniyah, Baghdad-Iraq.
Email: Nadir66raouf@gmail.com
1. INTRODUCTION
The word fountain describes the nature of these codes. An infinite stream of coded packets is sent
via the channel without information about the channel conditions. With such way of coding the rate of
the code is not fixed and is set while processing the received packets. Two codes represent the first practical
fountain codes, Luby transform (LT) [1], and Raptor codes [2]. These codes are designed for erasure
channels which fit the nature of internet communication systems [3]. fountain like codes can decode all
source packets when sufficient number of encoded packets are received [1]. For the encoding of LT codes
first, a degree is randomly chosen from a known degree distribution. Then, source packets are uniformly
chosen at random to be XORed to form the coded packet. This procedure continues until an
acknowledgement is received which declared complete recovery of the information packets.
The universal shape of the coded packets helps the receiver to gather any coded packets.
With each coded packet, the receiver has the knowledge about the dgree,indicies of the data packets that
forming the coded packet. The means for sending such data are explained in [1]. In Figure 1, an illustration
for a bipartite graphical representation of LT encoding and decoding operations. In this prototype code,
the data length of , and code-word length of with packet size of one-bitlpacket is represented.
Figure 1-a is devoted to the encoding operation whereas Figure 1-b up to Figure 1-g are used to illustrate
the decoding operation. For the decoding operation to be successful, the existence of degree-one coded
packet is vital. At every stage of the decoding operation this degree-one coded packet has to be found. Once
a degree-one coded packet is found then its connecting information packet is recovered. Secondly,
the recovered value updates the values of the neighbor coded packets. Finally, the connections of
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq)
1973
the recovered information packet were released. Moreover, this procedure is repeated until all the information
packets are recovered.
It is obvious from understanding the decoding process, that the generation of degrees is the core for
successful data recovery. Many attempts are presented to modify the conventional scheme of degree
generations. The first design for degree distribution used was the ideal soliton distribution (ISD) and robust
soliton distribution (RSD) [1]. The features of the RSD are suitable for bulk data files [1, 2, 4]. Esa Hyytiä
et al [5] used a sampling approach to determine the optimized degree distribution. They found that for large
information sequences, i.e., thousands of packets, the RSD shows good performance. In [6] the authors
investigated the optimization criteria of degree distributions for small file sizes. They concluded that,
in a well-design distribution just a few parameters require to be controlled to insure almost maximal
performance. Chen Z and Zhou Q [7], suggested an LT code with a revised RSD used for degree generation
based on using Kent chaotic map and pseudo-random number generator. Their idea based on joining both of
the probability functions but with no attention for the parameter. The result of this new degree
generation is shown in having more small degree values. C.M. Chen et al in [8] used a covariance matrix
adaptation as evolution strategy (CMA-ES) to enhance the degree values for better performance.
Their approach for the new distribution generates the degrees adaptively without changing the main
parameters. In [9] the author presents another attempt to improve the ability of degree generation to get better
encoding-decoding frame. They enforce the distribution to have an expected number of degree-one coded
packets as a division of data length. A state of the art work on fountain codes was done in [10] where
a memory-based rateless encoding method is proposed. In this new data allocation method, the degree one
coded symbol is isolated and connected to the data packets with the highest connection. The previous
literature review gives a bright vision for the concern to modify the RSD as an optimal degree distribution.
As a new attempt in this paper, a deterministic manner for both, the generation of the degrees and the choice
of the data packets which form the coded packets is introduced.
(a) (b) (c) (d)
(e) (f) (g) (h)
Figure 1. Encoding and decoding operations for lt code )
In the next section a review for degree generations is presented. Section 3 is dedicated for our
deterministic degree generation. Testing the ability of this new degree generation to enhance the code
performance is achieved in section 4. The last section is used to conclude the whole idea in few condensed
lines.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979
1974
2. DEGREE GENERATION APPROACHES
LT code design mainly depend on the quality of the degree generation method. The design has two
features, the degree distribution and the way of data selection. The degree generation in all conventional
approaches for LT code design are using random degree generation and also the data selection is applied
randomly. After the introduction of ideal soliton distribution and robust soliton distribution by Luby in [1]
many other studies [3, 5-9] on RSD were performed. And all these studies focused on improving RSD,
i.e., on improving the right-hand side distribution. While in [10] Khaled et al introduced a memory based
rateless encoding operation yielding non-uniform left hand side distribution which shows better performance
in terms of BER. In this paper, we propose a new approach for rateless encoding operation. The proposed
approach is based on deterministic construction of the generator matrix with non-uniform left hand and right
hand side distributions. Below we discuss, the degree generation methods that been used as a comparing tool
for our proposed one.
2.1. Ideal soliton distribution
This distribution offers an ideal distribution but not practical, because at certain point in
the decoding process a degree one coded symbol could be lost with high probability. It is defined as:
{ (1)
where is an integer represent the degree and is the length of information message.
2.2. Robust soliton distribution
In this modified degree distribution, the average number of degree one coded packets has been
increased [1]. The robust soliton distribution used the in (1) to construct its new distribution as:
(2)
where the normalization factor ∑ and is given as:
{
(3)
where √ is the average number of coded packets with degree one. The constant has
the value between 0 and 1, while represents the probability of decoder failure.
2.3. Non-uniform data selection (NUDS)
Approximately all the previous researches worked on improving the right-hand distribution.
However, in [10] a memory based encoding approach, resulting in better performance with the help of
memory tracking for the data packets degrees. Below, the algorithm proposed in [10] is outlined.
Algorithm 1 (NUDS)
1: Repeat
2: Generate a degree using RSD.
3: if
4: Select the data symbol with
largest degree, i.e., select the data
symbol with the most number of
connections.
5: else
6: Select data packets uniformly.
7: the selected data symbols to
form the code symbol
8: end if
9: Until (Acknowledgement signal is received destination).
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq)
1975
3. DETERMINISTIC DEGREE GENERATION (DDG)
RSD is considered as an optimal degree distribution for large file sizes, but it may suffer from
certain drawbacks when dealing with short size data files [11]. The reason for that is the amount of extra
coded packets that have to be collected to insure successful decoding. This extra needed packet for LT codes
has been approximated to be , while it could be enlarged for small message sizes to reach
,[12]. Sevral attempts have been presented in the field of improving the communication
systems using channel coding [13-18]. In addition, motivating from the decoding treatment which has done
by the pattern recognition (PR) [19-25] to resume decoding when the decoder halt, and the work introduced
by [10] for the NUDS, we propose a deterministic encoding (DDG) approach for LT like codes.
The proposed approach is designed to be used especially for short frame lengths. In our deterministic degree
generation, in case of having data packets, the degrees are generated following this formula:
{ (4)
Where is the repetition period value chosen to be between , m is an integer take
the values and is the size of the code length. For the information sequence consisting of
symbols, i.e., for , with ( ) the coded symbols
are formed using:
(5)
It is clear from (5) that the generator matrix is , however the extra needed coded packets are
generated using (4) with repetition of the same allocation of the data symbols illustrated in (5).
More immunity for such encoding scheme in case of bad channel conditions and in order to prevent losing
the same data packet, a Time-Hopping-Encoding scheme is used to produce a Time-Hopping-encoding
scheme. In this scheme, the encoding matrix is altered between two shapes, one is the original
deterministic and the other is the random shuffle of it , as shown in Figure 2:
Figure 2. Deterministic degree generation frame
Where can be adjusted as required by the transmitter. The proposed approach is explained in
Algorithm 2:
Algorithm 2 Deterministic Degree generation (DDG)
1: Repeat
2: for
3: if
4:
5: else
6:
7: end
8: end
9: for
10: if 1
11:
12: else
( ) ( ) ( )
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979
1976
13:
14: end
15: end
16: Until (Acknowledgement is obtained from receiver)
4. DECODING IN THE ABSENCE OF DEGREE-ONE CODE PACKET
LT-like codes suffer from the absence of degree-one coded packets during the decoding operation
especially for short length messages. If degree-one coded packet is not found at any stage of the decoding
operation, decoding failure is declared. Our work in [19], succeeded in breaking the decoder failure in a way
that even there is no degree-one coded symbol decoding operation can be continued by fetching for certain
configuration patterns inside the remaining coded symbols matrix. For this Pattern Recognition (PR)
proposed approach, assume that there is no degree-one coded symbol at any stage of the decoding operation
but there are two code-words and which are formed as:
(6)
where it is obvious that the degree of the code-words can be reduced to ‘1’ using:
(7)
which result is . Getting motivation from this approach, we added further fetching steps by trying
to reduce the degree of the coded symbols which are contained in each other, algorithm 3 illustrate this
approach, [19]:
Algorithm 3 Decoding Stuck Removal Approach
1: for iteration number=1: last % last may be any number (2, 3, 4)
2: Repeat
3:
4:
5: for any other code-words other than
6: if (deg ( ) equal 1, then
7: ; flag
8: break; resume BP decoding
9: end if
10:end-for
11: ,return to step 4
12: if flag success repeat steps (4-10) to decrease the degrees and replace
step 6 to (deg( )<deg ( ))
13: end if
14: until (All degrees are tried.)
15: end-for
5. RESULTS AND ANALYSIS
The LT code performance using BP algorithm is compared in an erasure channel environment using
three types of degree distributions which are DDG, RSD and NUDS. For the RSD the parameters are chosen
as , . The message length is chosen as 32 packets (the packet length could be with any
length, in our simulation it is represented by 1 bit). For the binary erasure channel erasure probability
is employed. Computer simulations are performed such that for each rate point on the graph
( is checked until 100 erroneous frames are received. It is seen in Figure 3 that the proposed
method is better than that of the LT-RSD and NUDS in terms of the number of unrecovered data packets
for all code rates.
The performance improvement for LT code is obvious for all distribution types under study with
the proposed decoding stuck removal algorithm BP-PR as shown in Figure 4. It is clear from Figure 4 that
the performance improvement for LT-RSD and NUDS is more compared to that on DDG. However,
DDG still gets the best performance. Another performance comparison graph is given in Figure 5 where
success rate is defined as:
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq)
1977
(8)
It is clear from Figure 5 that DDG approach recovers all the information frames at a rate of
while the other distributons have approximately the same performance and they do need to collect more
overhead to reach the achievement of our DDG.
Figure 3. Unrecovered packets results, using BP, RSD of ( , , )
Figure 4. Unrecovered packets results, using BP-PR, RSD of ( , , )
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979
1978
Figure 5. Successful decoding rates, using BP-PR, RSD of ( , , )
6. CONCLUSION
In this paper we proposed a time hopping deterministic degree generation encoding approach for
the forming of LT-like codes especially for small data files. It is shown via simulation results that
the proposed approach is better in terms of minimum number of unrecovered packets and overhead amount
required for full recovery of data packets than that of the classical LT-RSD and NUDS. The flexibility
features of the proposed approach support the design to overcome the problem of extra needed overhead for
the case of short length LT codes. For the decoding operation BP algorithm is employed supported by
the enhancement algorithm of pattern recognition (BP-PR). It has been approved that BP-PR has little
improvement to the proposed DDG-LT code compared to the clear improvement shown for the classical RSD
and NUDS-LT codes.
REFERENCES
[1] Luby M., "LT codes," In The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002,
Proceedings, IEEE, pp. 271-280, 2002.
[2] Shokrollahi A., "Raptor codes," IEEE/ACM Transactions on Networking (TON). vol. 1(14), pp. 2551-2267.
[3] Jafarizadeh S, & Jamalipour A., "An exact solution to degree distribution optimization in LT codes," In IEEE
Wireless Communications and Networking Conference (WCNC), IEEE, pp. 764-768, 2014.
[4] MacKay DJ, "Information theory, inference and learning algorithms," Cambridge University Press, 2003.
[5] Hyytiä E, Tirronen T, Virtamo J., "Optimizing the degree distribution of LT codes with an importance sampling
approach," In 6th International Workshop on Rare Event Simulation, pp. 56-66, 2006.
[6] Hyytia E, Tirronen T, Virtamo J., "Optimal degree distribution for LT codes with small message length," In 26th
IEEE International Conference on Computer Communications, IEEE, pp. 2576-2580, 2007.
[7] Chen Z. & Zhou Q., "Implementation of it codes with a revised robust soliton distribution by using kent chaotic
map," In 2010 International Workshop on Chaos-Fractal Theories and Applications, IEEE, pp. 149-153, 2010.
[8] Chen C. M., Chen Y. P., Shen T. C., Zao J. K., "On the optimization of degree distributions in LT code with
covariance matrix adaptation evolution strategy," In IEEE Congress on Evolutionary Computation, IEEE,
pp. 1-8, 2010.
[9] Yen K. K., Liao Y. C., Chen C. L, Chang H. C., "Adjusted robust soliton distribution (ARSD) with reshaped ripple
size for LT codes," In 2013 International Conference on Wireless Communications and Signal Processing, IEEE,
pp. 1-6, 2013.
[10] Hayajneh KF, Yousefi S, Valipour M., "Improved finite-length Luby-transform codes in the binary erasure
channel," IET Communications, vol. 9(8), pp. 1122-1130, 2015.
[11] Zao J. K, Hornansky M, Diao P. L., "Design of optimal short-length LT codes using evolution strategies," In 2012
IEEE Congress on Evolutionary Computation, IEEE, pp. 1-9, 2012.
[12] Wang X, Willig A, Woodward G., "Improving fountain codes for short message lengths by adding memory,"
In 2013 IEEE Eighth International Conference on Intelligent Sensors, IEEE, pp. 189-194, 2013.
Int J Elec & Comp Eng ISSN: 2088-8708 
Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq)
1979
[13] Sukar M. & Pal M., "SC-FDMA & OFDMA in LTE physical layer," International Journal of Engineering Trends
and Technology (IJETT), vol. 12(2), pp. 74-85, 2014.
[14] Sanghvi A, Mishra N, Waghmode R, Talele K., "Performance of reed-solomon codes in AWGN channel,"
International Journal of Electronics and Communication Engineering, vol. 4(3), pp. 259-266, 2011.
[15] Hussain G. A. & Audah L., "RS codes for downlink LTE system over LTE-MIMO channel," TELKOMNIKA
Indonesian Journal of Electrical Engineering, vol. 16(6), pp. 2563-2569, 2018.
[16] Adiono T, Ramdani A, Putra R., "Reversed-trellis tail-biting convolutional code (RT-TBCC) decoder architecture
design for LTE," International Journal of Electrical and Computer Engineering (IJECE), vol. 8(1),
pp. 198-209, 2018.
[17] Wang J., Li J., Cai C., "Two novel decoding algorithms for turbo codes based on taylor series in 3GPP LTE
system," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12(5), pp. 3467-3475, 2014.
[18] Sirait F., Dani A., Pangaribowo T., "Capacity improvement and protection of LTE network on ethernet based
technique," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16(1), pp. 200-209, 2018.
[19] Abdulkhaleq N. I., Gazi O., "Decoding of lt‐like codes in the absence of degree‐one code symbols," ETRI Journal,
vol. 38(5), pp.896-902, 2016.
[20] Abdulkhaleq N. I., & Gazi O., "A sequential coding approach for short length LT codes over AWGN channel," in
4th International Conference on Electrical and Electronic Engineering (ICEEE), IEEE, pp. 267-271, 2017.
[21] Abdulkhaleq N. I., Hasan I. J., Salih N. A., "Mitigation of packet erasure using new fountain code design," In 2018
IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), IEEE, pp. 1-7, 2018.
[22] Hasan I. J., Salih N. A., Abdulkhaleq N. I. "An Android smart application for an Arduino based local
meteorological data recording" 2019 IOP Conf. Ser.: Mater. Sci. Eng. Vol. 518, 2019.
[23] Salih N. A., Hasan I. J., Abdulkhaleq N. I., "Design and implementation of a smart monitoring system for water
quality of fish farms," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), Vol. 14,
No. 1, pp. 45-52, April 2019.
[24] Leftah H. A., Alminshid H. N.., "Channel capacity and performance evaluation of precoded MIMO-OFDM system
with large-size constellation," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), Vol.
9, No. 6, pp. 5024∼5030, December 2019.
[25] Leftah H. A., Boussakta, S., "Efficient modulation scheme for OFDM system with ZP and MMSE equalizer," In
2013 IEEE International Conference on Communications (ICC), IEEE, pp. 4703-4707, 2013.

More Related Content

What's hot

A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
IDES Editor
 
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
ijnlc
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
 
Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags
csandit
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
IJERA Editor
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device Communication
TELKOMNIKA JOURNAL
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
IRJET Journal
 
New Heuristic Model for Optimal CRC Polynomial
New Heuristic Model for Optimal CRC Polynomial New Heuristic Model for Optimal CRC Polynomial
New Heuristic Model for Optimal CRC Polynomial
IJECEIAES
 
The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...
journalBEEI
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
Alexander Decker
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
ijfcstjournal
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
Alexander Decker
 
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
CSCJournals
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
IJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
Unit 5 Quantization
Unit 5 QuantizationUnit 5 Quantization
Unit 5 Quantization
Dr Piyush Charan
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
CSCJournals
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 

What's hot (18)

A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device Communication
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
New Heuristic Model for Optimal CRC Polynomial
New Heuristic Model for Optimal CRC Polynomial New Heuristic Model for Optimal CRC Polynomial
New Heuristic Model for Optimal CRC Polynomial
 
The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Unit 5 Quantization
Unit 5 QuantizationUnit 5 Quantization
Unit 5 Quantization
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 

Similar to Improving the data recovery for short length LT codes

A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codes
TELKOMNIKA JOURNAL
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct_journal
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
dbpublications
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
International Journal of Reconfigurable and Embedded Systems
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
IJECEIAES
 
IRJET- Enhanced Density Based Method for Clustering Data Stream
IRJET-  	  Enhanced Density Based Method for Clustering Data StreamIRJET-  	  Enhanced Density Based Method for Clustering Data Stream
IRJET- Enhanced Density Based Method for Clustering Data Stream
IRJET Journal
 
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
dbpublications
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
IJARBEST JOURNAL
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
VLSICS Design
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
Kumar Goud
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
inventionjournals
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
IRJET Journal
 

Similar to Improving the data recovery for short length LT codes (20)

A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codes
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
IRJET- Enhanced Density Based Method for Clustering Data Stream
IRJET-  	  Enhanced Density Based Method for Clustering Data StreamIRJET-  	  Enhanced Density Based Method for Clustering Data Stream
IRJET- Enhanced Density Based Method for Clustering Data Stream
 
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Improving the data recovery for short length LT codes

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 2, April 2020, pp. 1972~1979 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp1972-1979  1972 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Improving the data recovery for short length LT codes Nadhir Ibrahim Abdulkhaleq1 , Faeza Abbas Abed2 , Ihsan Jabbar Hasan3 , Falah Hasan Mahdi4 1 Department of Mobile Computing and Communication Engineering-College of Engineering, University of Information Technology and Communication, Baghdad Al Mansour-Iraq 2,4 Department of Electronic Techniques, Institute of Technology-Middle Technical University, Iraq 3 Department of Electronic, Medical Technical Institute/Al Mansour-Middle Technical University, Iraq Article Info ABSTRACT Article history: Received Jan 21, 2019 Revised Oct 29, 2019 Accepted Nov 5, 2019 Luby Transform (LT) code is considered as an efficient erasure fountain code. The construction of the coded symbols is based on the formation of the degree distribution which played a significant role in ensuring a smooth decoding process. In this paper, we propose a new encoding scheme for LT code generation. This encoding presents a deterministic degree generation (DDG) with time hoping pattern which found to be suitable for the case of short data length where the well-known Robust Soliton Distribution (RSD) witnessed a severe performance degradation. It is shown via computer simulations that the proposed (DDG) has the lowest records for unrecovered data packets when compared to that using random degree distribution like RSD and non-uniform data selection (NUDS). The success interpreted in decreasing the overhead required for data recovery to the order of 25% for a data length of 32 packets. Keywords: Deterministic degree generation Encoding scheme Luby transform code Time hoping Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Nadhir Ibrahim Abdulkhaleq, Department of Electronic Techniques Middle Technical University, Al Zaafaraniyah, Baghdad-Iraq. Email: Nadir66raouf@gmail.com 1. INTRODUCTION The word fountain describes the nature of these codes. An infinite stream of coded packets is sent via the channel without information about the channel conditions. With such way of coding the rate of the code is not fixed and is set while processing the received packets. Two codes represent the first practical fountain codes, Luby transform (LT) [1], and Raptor codes [2]. These codes are designed for erasure channels which fit the nature of internet communication systems [3]. fountain like codes can decode all source packets when sufficient number of encoded packets are received [1]. For the encoding of LT codes first, a degree is randomly chosen from a known degree distribution. Then, source packets are uniformly chosen at random to be XORed to form the coded packet. This procedure continues until an acknowledgement is received which declared complete recovery of the information packets. The universal shape of the coded packets helps the receiver to gather any coded packets. With each coded packet, the receiver has the knowledge about the dgree,indicies of the data packets that forming the coded packet. The means for sending such data are explained in [1]. In Figure 1, an illustration for a bipartite graphical representation of LT encoding and decoding operations. In this prototype code, the data length of , and code-word length of with packet size of one-bitlpacket is represented. Figure 1-a is devoted to the encoding operation whereas Figure 1-b up to Figure 1-g are used to illustrate the decoding operation. For the decoding operation to be successful, the existence of degree-one coded packet is vital. At every stage of the decoding operation this degree-one coded packet has to be found. Once a degree-one coded packet is found then its connecting information packet is recovered. Secondly, the recovered value updates the values of the neighbor coded packets. Finally, the connections of
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq) 1973 the recovered information packet were released. Moreover, this procedure is repeated until all the information packets are recovered. It is obvious from understanding the decoding process, that the generation of degrees is the core for successful data recovery. Many attempts are presented to modify the conventional scheme of degree generations. The first design for degree distribution used was the ideal soliton distribution (ISD) and robust soliton distribution (RSD) [1]. The features of the RSD are suitable for bulk data files [1, 2, 4]. Esa Hyytiä et al [5] used a sampling approach to determine the optimized degree distribution. They found that for large information sequences, i.e., thousands of packets, the RSD shows good performance. In [6] the authors investigated the optimization criteria of degree distributions for small file sizes. They concluded that, in a well-design distribution just a few parameters require to be controlled to insure almost maximal performance. Chen Z and Zhou Q [7], suggested an LT code with a revised RSD used for degree generation based on using Kent chaotic map and pseudo-random number generator. Their idea based on joining both of the probability functions but with no attention for the parameter. The result of this new degree generation is shown in having more small degree values. C.M. Chen et al in [8] used a covariance matrix adaptation as evolution strategy (CMA-ES) to enhance the degree values for better performance. Their approach for the new distribution generates the degrees adaptively without changing the main parameters. In [9] the author presents another attempt to improve the ability of degree generation to get better encoding-decoding frame. They enforce the distribution to have an expected number of degree-one coded packets as a division of data length. A state of the art work on fountain codes was done in [10] where a memory-based rateless encoding method is proposed. In this new data allocation method, the degree one coded symbol is isolated and connected to the data packets with the highest connection. The previous literature review gives a bright vision for the concern to modify the RSD as an optimal degree distribution. As a new attempt in this paper, a deterministic manner for both, the generation of the degrees and the choice of the data packets which form the coded packets is introduced. (a) (b) (c) (d) (e) (f) (g) (h) Figure 1. Encoding and decoding operations for lt code ) In the next section a review for degree generations is presented. Section 3 is dedicated for our deterministic degree generation. Testing the ability of this new degree generation to enhance the code performance is achieved in section 4. The last section is used to conclude the whole idea in few condensed lines.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979 1974 2. DEGREE GENERATION APPROACHES LT code design mainly depend on the quality of the degree generation method. The design has two features, the degree distribution and the way of data selection. The degree generation in all conventional approaches for LT code design are using random degree generation and also the data selection is applied randomly. After the introduction of ideal soliton distribution and robust soliton distribution by Luby in [1] many other studies [3, 5-9] on RSD were performed. And all these studies focused on improving RSD, i.e., on improving the right-hand side distribution. While in [10] Khaled et al introduced a memory based rateless encoding operation yielding non-uniform left hand side distribution which shows better performance in terms of BER. In this paper, we propose a new approach for rateless encoding operation. The proposed approach is based on deterministic construction of the generator matrix with non-uniform left hand and right hand side distributions. Below we discuss, the degree generation methods that been used as a comparing tool for our proposed one. 2.1. Ideal soliton distribution This distribution offers an ideal distribution but not practical, because at certain point in the decoding process a degree one coded symbol could be lost with high probability. It is defined as: { (1) where is an integer represent the degree and is the length of information message. 2.2. Robust soliton distribution In this modified degree distribution, the average number of degree one coded packets has been increased [1]. The robust soliton distribution used the in (1) to construct its new distribution as: (2) where the normalization factor ∑ and is given as: { (3) where √ is the average number of coded packets with degree one. The constant has the value between 0 and 1, while represents the probability of decoder failure. 2.3. Non-uniform data selection (NUDS) Approximately all the previous researches worked on improving the right-hand distribution. However, in [10] a memory based encoding approach, resulting in better performance with the help of memory tracking for the data packets degrees. Below, the algorithm proposed in [10] is outlined. Algorithm 1 (NUDS) 1: Repeat 2: Generate a degree using RSD. 3: if 4: Select the data symbol with largest degree, i.e., select the data symbol with the most number of connections. 5: else 6: Select data packets uniformly. 7: the selected data symbols to form the code symbol 8: end if 9: Until (Acknowledgement signal is received destination).
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq) 1975 3. DETERMINISTIC DEGREE GENERATION (DDG) RSD is considered as an optimal degree distribution for large file sizes, but it may suffer from certain drawbacks when dealing with short size data files [11]. The reason for that is the amount of extra coded packets that have to be collected to insure successful decoding. This extra needed packet for LT codes has been approximated to be , while it could be enlarged for small message sizes to reach ,[12]. Sevral attempts have been presented in the field of improving the communication systems using channel coding [13-18]. In addition, motivating from the decoding treatment which has done by the pattern recognition (PR) [19-25] to resume decoding when the decoder halt, and the work introduced by [10] for the NUDS, we propose a deterministic encoding (DDG) approach for LT like codes. The proposed approach is designed to be used especially for short frame lengths. In our deterministic degree generation, in case of having data packets, the degrees are generated following this formula: { (4) Where is the repetition period value chosen to be between , m is an integer take the values and is the size of the code length. For the information sequence consisting of symbols, i.e., for , with ( ) the coded symbols are formed using: (5) It is clear from (5) that the generator matrix is , however the extra needed coded packets are generated using (4) with repetition of the same allocation of the data symbols illustrated in (5). More immunity for such encoding scheme in case of bad channel conditions and in order to prevent losing the same data packet, a Time-Hopping-Encoding scheme is used to produce a Time-Hopping-encoding scheme. In this scheme, the encoding matrix is altered between two shapes, one is the original deterministic and the other is the random shuffle of it , as shown in Figure 2: Figure 2. Deterministic degree generation frame Where can be adjusted as required by the transmitter. The proposed approach is explained in Algorithm 2: Algorithm 2 Deterministic Degree generation (DDG) 1: Repeat 2: for 3: if 4: 5: else 6: 7: end 8: end 9: for 10: if 1 11: 12: else ( ) ( ) ( )
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979 1976 13: 14: end 15: end 16: Until (Acknowledgement is obtained from receiver) 4. DECODING IN THE ABSENCE OF DEGREE-ONE CODE PACKET LT-like codes suffer from the absence of degree-one coded packets during the decoding operation especially for short length messages. If degree-one coded packet is not found at any stage of the decoding operation, decoding failure is declared. Our work in [19], succeeded in breaking the decoder failure in a way that even there is no degree-one coded symbol decoding operation can be continued by fetching for certain configuration patterns inside the remaining coded symbols matrix. For this Pattern Recognition (PR) proposed approach, assume that there is no degree-one coded symbol at any stage of the decoding operation but there are two code-words and which are formed as: (6) where it is obvious that the degree of the code-words can be reduced to ‘1’ using: (7) which result is . Getting motivation from this approach, we added further fetching steps by trying to reduce the degree of the coded symbols which are contained in each other, algorithm 3 illustrate this approach, [19]: Algorithm 3 Decoding Stuck Removal Approach 1: for iteration number=1: last % last may be any number (2, 3, 4) 2: Repeat 3: 4: 5: for any other code-words other than 6: if (deg ( ) equal 1, then 7: ; flag 8: break; resume BP decoding 9: end if 10:end-for 11: ,return to step 4 12: if flag success repeat steps (4-10) to decrease the degrees and replace step 6 to (deg( )<deg ( )) 13: end if 14: until (All degrees are tried.) 15: end-for 5. RESULTS AND ANALYSIS The LT code performance using BP algorithm is compared in an erasure channel environment using three types of degree distributions which are DDG, RSD and NUDS. For the RSD the parameters are chosen as , . The message length is chosen as 32 packets (the packet length could be with any length, in our simulation it is represented by 1 bit). For the binary erasure channel erasure probability is employed. Computer simulations are performed such that for each rate point on the graph ( is checked until 100 erroneous frames are received. It is seen in Figure 3 that the proposed method is better than that of the LT-RSD and NUDS in terms of the number of unrecovered data packets for all code rates. The performance improvement for LT code is obvious for all distribution types under study with the proposed decoding stuck removal algorithm BP-PR as shown in Figure 4. It is clear from Figure 4 that the performance improvement for LT-RSD and NUDS is more compared to that on DDG. However, DDG still gets the best performance. Another performance comparison graph is given in Figure 5 where success rate is defined as:
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq) 1977 (8) It is clear from Figure 5 that DDG approach recovers all the information frames at a rate of while the other distributons have approximately the same performance and they do need to collect more overhead to reach the achievement of our DDG. Figure 3. Unrecovered packets results, using BP, RSD of ( , , ) Figure 4. Unrecovered packets results, using BP-PR, RSD of ( , , )
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1972 - 1979 1978 Figure 5. Successful decoding rates, using BP-PR, RSD of ( , , ) 6. CONCLUSION In this paper we proposed a time hopping deterministic degree generation encoding approach for the forming of LT-like codes especially for small data files. It is shown via simulation results that the proposed approach is better in terms of minimum number of unrecovered packets and overhead amount required for full recovery of data packets than that of the classical LT-RSD and NUDS. The flexibility features of the proposed approach support the design to overcome the problem of extra needed overhead for the case of short length LT codes. For the decoding operation BP algorithm is employed supported by the enhancement algorithm of pattern recognition (BP-PR). It has been approved that BP-PR has little improvement to the proposed DDG-LT code compared to the clear improvement shown for the classical RSD and NUDS-LT codes. REFERENCES [1] Luby M., "LT codes," In The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, Proceedings, IEEE, pp. 271-280, 2002. [2] Shokrollahi A., "Raptor codes," IEEE/ACM Transactions on Networking (TON). vol. 1(14), pp. 2551-2267. [3] Jafarizadeh S, & Jamalipour A., "An exact solution to degree distribution optimization in LT codes," In IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp. 764-768, 2014. [4] MacKay DJ, "Information theory, inference and learning algorithms," Cambridge University Press, 2003. [5] Hyytiä E, Tirronen T, Virtamo J., "Optimizing the degree distribution of LT codes with an importance sampling approach," In 6th International Workshop on Rare Event Simulation, pp. 56-66, 2006. [6] Hyytia E, Tirronen T, Virtamo J., "Optimal degree distribution for LT codes with small message length," In 26th IEEE International Conference on Computer Communications, IEEE, pp. 2576-2580, 2007. [7] Chen Z. & Zhou Q., "Implementation of it codes with a revised robust soliton distribution by using kent chaotic map," In 2010 International Workshop on Chaos-Fractal Theories and Applications, IEEE, pp. 149-153, 2010. [8] Chen C. M., Chen Y. P., Shen T. C., Zao J. K., "On the optimization of degree distributions in LT code with covariance matrix adaptation evolution strategy," In IEEE Congress on Evolutionary Computation, IEEE, pp. 1-8, 2010. [9] Yen K. K., Liao Y. C., Chen C. L, Chang H. C., "Adjusted robust soliton distribution (ARSD) with reshaped ripple size for LT codes," In 2013 International Conference on Wireless Communications and Signal Processing, IEEE, pp. 1-6, 2013. [10] Hayajneh KF, Yousefi S, Valipour M., "Improved finite-length Luby-transform codes in the binary erasure channel," IET Communications, vol. 9(8), pp. 1122-1130, 2015. [11] Zao J. K, Hornansky M, Diao P. L., "Design of optimal short-length LT codes using evolution strategies," In 2012 IEEE Congress on Evolutionary Computation, IEEE, pp. 1-9, 2012. [12] Wang X, Willig A, Woodward G., "Improving fountain codes for short message lengths by adding memory," In 2013 IEEE Eighth International Conference on Intelligent Sensors, IEEE, pp. 189-194, 2013.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Improving the data recovery for short length LT codes (Nadhir Ibrahim Abdulkhaleq) 1979 [13] Sukar M. & Pal M., "SC-FDMA & OFDMA in LTE physical layer," International Journal of Engineering Trends and Technology (IJETT), vol. 12(2), pp. 74-85, 2014. [14] Sanghvi A, Mishra N, Waghmode R, Talele K., "Performance of reed-solomon codes in AWGN channel," International Journal of Electronics and Communication Engineering, vol. 4(3), pp. 259-266, 2011. [15] Hussain G. A. & Audah L., "RS codes for downlink LTE system over LTE-MIMO channel," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 16(6), pp. 2563-2569, 2018. [16] Adiono T, Ramdani A, Putra R., "Reversed-trellis tail-biting convolutional code (RT-TBCC) decoder architecture design for LTE," International Journal of Electrical and Computer Engineering (IJECE), vol. 8(1), pp. 198-209, 2018. [17] Wang J., Li J., Cai C., "Two novel decoding algorithms for turbo codes based on taylor series in 3GPP LTE system," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12(5), pp. 3467-3475, 2014. [18] Sirait F., Dani A., Pangaribowo T., "Capacity improvement and protection of LTE network on ethernet based technique," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16(1), pp. 200-209, 2018. [19] Abdulkhaleq N. I., Gazi O., "Decoding of lt‐like codes in the absence of degree‐one code symbols," ETRI Journal, vol. 38(5), pp.896-902, 2016. [20] Abdulkhaleq N. I., & Gazi O., "A sequential coding approach for short length LT codes over AWGN channel," in 4th International Conference on Electrical and Electronic Engineering (ICEEE), IEEE, pp. 267-271, 2017. [21] Abdulkhaleq N. I., Hasan I. J., Salih N. A., "Mitigation of packet erasure using new fountain code design," In 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), IEEE, pp. 1-7, 2018. [22] Hasan I. J., Salih N. A., Abdulkhaleq N. I. "An Android smart application for an Arduino based local meteorological data recording" 2019 IOP Conf. Ser.: Mater. Sci. Eng. Vol. 518, 2019. [23] Salih N. A., Hasan I. J., Abdulkhaleq N. I., "Design and implementation of a smart monitoring system for water quality of fish farms," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), Vol. 14, No. 1, pp. 45-52, April 2019. [24] Leftah H. A., Alminshid H. N.., "Channel capacity and performance evaluation of precoded MIMO-OFDM system with large-size constellation," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), Vol. 9, No. 6, pp. 5024∼5030, December 2019. [25] Leftah H. A., Boussakta, S., "Efficient modulation scheme for OFDM system with ZP and MMSE equalizer," In 2013 IEEE International Conference on Communications (ICC), IEEE, pp. 4703-4707, 2013.