نتایج جستجو برای: کد raptor
تعداد نتایج: 7726 فیلتر نتایج به سال:
Fountain codes are becoming increasingly important for data transferring over dedicated high-speed long-distance network. However, the encoding and decoding complexity of traditional fountain codes such as LT and Raptor codes are still high. In this paper, a new fountain codes named LRF (Loss Rate Based Fountain) codes for data transfer is proposed. In order to improve the performance of encodi...
1 This work is part of EEEAG 104E163, a project sponsored by Vidiator Technology (US) Inc, TUBITAK, The Turkish National Science Foundation, and Dokuz Eylul University, Department of Computer Engineering. AbstractThis work presents Reliable Download analyses with and without interleaving in MBMS (Multimedia Broadcast Multicast Services) under various network conditions specific to MBMS. Since M...
Annex E of the Digital Video Broadcasting IPTV (DVB-IPTV) technical specification defines an optional Application-Layer Forward Error Correction (AL-FEC) protocol to protect the streaming media transported using RTP. The DVB-IPTV AL-FEC protocol uses two layers for FEC protection. The first (base) layer is based on the 1-D interleaved parity code. The second (enhancement) layer is based on the ...
FORMATION OF THE AVIAN GONADS AND REPRODUCTIVE ANATOMY The avian gonads arise from more than one embryonic source. The medulla or core arises from the mesonephric ducts. The outer cortex arises from a thickening of peritoneum along the root of the dorsal mesentery within the primitive gonadal ridge. Mesodermal germ cells that arise from yolk-sac endoderm migrate into this gonadal ridge, forming...
Annex E of the Digital Video Broadcasting IPTV (DVB-IPTV) technical specification defines an optional Application-Layer Forward Error Correction (AL-FEC) protocol to protect the streaming media transported using RTP. The DVB-IPTV AL-FEC protocol uses two layers for FEC protection. The first (base) layer is based on the 1-D interleaved parity code. The second (enhancement) layer is based on the ...
An optimal heuristic logic is an effective method for finding the sum of all prime numbers up to a given number. This paper presents different approaches, namely, general method and optimal method which facilitate to compare the results and draw the optimal solution. The method adopted is to know the number of symbols evaluated in each logic, construct better approaches based on heuristics, pro...
Software distributed shared-memory (SDSM) provides the abstraction necessary to run shared-memory applications on cost-effective parallel platforms such as clusters of workstations. However, problems such as cluster component reliability and cluster management, which are not directly related to performance, need to be addressed before SDSM solutions can be widely adopted. This paper presents Ra...
Much of the mammalian skeleton is derived from a cartilage template that undergoes rapid growth during embryogenesis, but the molecular mechanism of growth regulation is not well understood. Signaling by mammalian target of rapamycin complex 1 (mTORC1) is an evolutionarily conservedmechanism that controls cellular growth. Here we report that mTORC1 signaling is activated during limb cartilage d...
In this thesis, considering a one-relay cooperative system, we propose a new cooperative transmission scheme which implements the systematic Raptor code standardized in 3GPP. Within the framework of this scheme, we compare the bandwidth efficiency perfomance of different relaying protocols. To improve the performance of this cooperative system, we use ReedSolomon(RS) code as inner code which is...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید