CN109412750A - Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication - Google Patents
Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication Download PDFInfo
- Publication number
- CN109412750A CN109412750A CN201811097456.9A CN201811097456A CN109412750A CN 109412750 A CN109412750 A CN 109412750A CN 201811097456 A CN201811097456 A CN 201811097456A CN 109412750 A CN109412750 A CN 109412750A
- Authority
- CN
- China
- Prior art keywords
- data packet
- source data
- coding
- type
- channel quality
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses the anti-eavesdropping transmission methods in a kind of multimedia communication based on fountain codes, comprising: 1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;2) legal transmitter Alice by each source data packet be based on business feature carry out importance ranking, while by channel quality by well arrive difference be three channel quality sections;3) legal transmitter Alice is marked using the source data packet having been received that legitimate receiver Bob is fed back to, and the importance and current channel information dynamic further according to source data packet to be sent adjust the structure of fountain coding, and coding is then wrapped tnIt is sent to legitimate receiver Bob;4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, and the label of source data packet is then fed back to legal transmitter Alice, and this method can be realized the transmission of the multi-media safety based on fountain.
Description
Technical field
The invention belongs to wireless communication technology field, it is related to the anti-eavesdropping transmission based on fountain codes in a kind of multimedia communication
Method.
Background technique
Safety of physical layer causes since it can realize safe transmission using characteristics of radio channels and encrypt independent of code key
The extensive concerns of researchers at home and abroad.But the biography of target is minimised as with secret maximum capacity and secret outage probability
The safety of physical layer technology of system has transmission rate low, the limitations such as decoding delay height, this broadband services pair of this and multimedia
The requirement of high-speed transfer and delay constraint does not match that.
Fountain codes have the property that: receiving end, which must accumulate enough coding packets, could restore original.
As long as that is legitimate user can accumulate to enough codings prior to eavesdropping side and wrap, it is avoided that information leakage, realizes safety
Communication.And fountain codes, when realizing safe transmission, the transmission rate of system is only limited by the Shannon capacity of legal link, when decoding
Prolong and substantially reduces.Meanwhile using the generation of the adaptive adjustment coding packet of the channel quality that feedback channel obtains legal link, make
It obtains receiving end and obtains even more important information under the conditions of delay constraint, therefore, study the multi-media safety based on fountain codes and pass
Transferring technology is of great significance.
Summary of the invention
It is an object of the invention to overcome the above-mentioned prior art, provide in a kind of multimedia communication based on fountain
The anti-eavesdropping transmission method of code, this method can be realized the transmission of the multi-media safety based on fountain.
In order to achieve the above objectives, the anti-eavesdropping transmission method in multimedia communication of the present invention based on fountain codes includes
Following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to important
Each source data packet is divided into three classes type- I, type- II and type- III by property degree in a manner of successively decreasing, while by channel quality
By to difference being well three channel quality sections, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | belong to
The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
3) legal transmitter Alice is marked using the source data packet having been received that legitimate receiver Bob is fed back to, then
The structure that fountain coding is adjusted according to the importance of source data packet to be sent and current channel information dynamic, must encode packet tn,
Then coding is wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then by the mark of source data packet
Note feeds back to legal transmitter Alice.
In step 3), when | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from also not solving out
The source data packet picked out at random in I class source data packet of type-;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from also not solving out
The source data packet picked out at random in II class source data packet of type-, ∑ sk1iBy from I class of type- for having solved out
The part that source data packet is selected at random carries out exclusive or and obtains;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet,
Then go to step 2).
For multimedia service, each frame of video is divided, a series of still images are obtained, by each width still image
Regard a source file as, still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s1,s2…sk, to this
N number of source data packet s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each in segmentation figure
The significance value of pixel, l indicate pixel number contained by each block of pixels;
12) binary map is sought using edge detection, then calculates marginal information amount contained by cut zone
SjIndicate the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then
The importance degree of the source data packet is higher.
The invention has the following advantages:
Anti- eavesdropping transmission method in multimedia communication of the present invention based on fountain codes when specific operation, according to
The importance and current channel information dynamic adjustment fountain codes structure that send source data packet carry out the coding of source data packet to be sent,
The channel quality for being not entirely dependent on legal link is centainly better than eavesdropping link, is inferior to eavesdrop link in legal Link Channel Quality
When channel quality, still there is certain anti-eavesdropping energy, while when the channel quality of legal link is better than eavesdropping link, resisting
The validity of eavesdropping is significantly promoted, to effectively promote the safety of information transmission.In addition, the present invention is based on fountains
Code structure carries out the coding of source data packet to be sent, to improve the rate of information throughput of system, and the rate of information throughput only by
The Shannon capacity of legal link limits, and effectively reduces decoding delay, meets the requirement of this broadband services high-speed transfer of multimedia
And stringent time delay is limited and is required.In addition, the source data packet that the present invention is to be sent according to the adaptive selection of present channel quality,
While expanding legitimate channel advantage, guarantee that the video of legitimate receiver Bob receives quality, so that legitimate receiver Bob exists
Prior information is obtained in limited time delay as far as possible.
Detailed description of the invention
Fig. 1 is system model figure of the invention;
Fig. 2 is change curve of the intercept probability with SNR;
Fig. 3 is that QoS violates probability with the change curve of source data packet number;
Fig. 4 is the graph of relation that MSE changes with average signal-to-noise ratio;
Fig. 5 is variation relation curve graph of the PSNR with average signal-to-noise ratio;
Fig. 6 is actual video laser propagation effect figure of the invention.
Specific embodiment
The invention will be described in further detail with reference to the accompanying drawing:
In the present invention, data transmission system includes legal transmitter Alice and legitimate receiver Bob, wherein legal transmission
Machine Alice and legitimate receiver Bob configures single antenna, and system works in TDD mode, legal transmitter Alice
Send data by frame, the transmission of every frame data includes three phases: first stage, legitimate receiver Bob by feedback channel to
Legal transmitter Alice feeds back present channel quality;Second stage, legal transmitter Alice is according to channel quality and current conjunction
The source data packet that method receiver Bob has been received, adaptive selection need the source data packet for participating in coding to be encoded, obtain
Coding packet, then obtained data packet is sent to legitimate receiver Bob;Phase III, the source that legitimate receiver Bob comes out solution
The label of data packet feeds back to legal transmitter Alice, specifically includes the following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to important
Each source data packet is divided into three classes type- I, type- II and type- III by property degree in a manner of successively decreasing, while by channel quality
By to difference being well three channel quality sections, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | belong to
The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
Wherein, for multimedia service, each frame of video is divided, a series of still images are obtained, it is quiet by each
State image regards a source file as, and still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s1,s2…
sk, to N number of source data packet s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each in segmentation figure
The significance value of pixel, l indicate pixel number contained by each block of pixels;
12) edge detection is carried out using FT algorithm and seek binary map, then calculate marginal information amount contained by cut zoneSjIndicate the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then
The importance degree of the source data packet is higher.
3) legal transmitter Alice adjusts fountain according to importance and the current channel information dynamic of data to be transmitted packet and compiles
The structure of code carries out the coding of source data packet to be sent, must encode packet tn, coding is then wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then by the mark of source data packet
Note feeds back to legal transmitter Alice.
In step 3), when | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from also not solving out
The source data packet picked out at random in I class source data packet of type-;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from also not solving out
The source data packet picked out at random in II class source data packet of type-, ∑ sk1iBy from I class of type- for having solved out
The part that source data packet is selected at random carries out exclusive or and obtains;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet,
Then go to step 2).
In step 2) by channel quality by well to difference be three channel quality sections concrete operations are as follows: set good letter
Road quality section proportion is P1, general channel quality section proportion is P2, Th1And Th2Indicate channel gain threshold
Value, wherein Th1=(1/ λ ln (1-P1)-1)1/2, Th2=(1/ λ ln (1-P1-P2)-1)1/2, when | h | > Th1When channel quality be it is good
It is good;Work as Th1≥|h|>Th2When, channel quality is general;When | h |≤Th2When, channel quality is poor.
In step 4), legitimate receiver Bob is demodulated using maximum-likelihood criterion, then utilizes BP iterative decoding algorithm
Solve source data packet.
Emulation experiment
For convenience of description, introduce several definition first, by intercept probability 1 be defined as when legitimate receiver Bob solve it is all
K source data packet in the case where, listener-in Eve also receives the probability of entire file;Intercept probability 2 is defined as when legal
In the case that receiver Bob solves K all source data packets, listener-in Eve has solved the probability of K-1 source data packet, QoS
Violate probability is defined as:
Wherein, TreqExpression allows to transmit coding packet number, Ttot,BAnd Ttot,EIt respectively represents legitimate receiver and listener-in is extensive
Packet quantity is encoded required for multiple all source data packets, the first item in formula defines time delay and violates probability, and Section 2 calculates
The information acquisition probability of listener-in Eve.
Effectiveness of the invention depends on the difference of both links channel, by the feedback of legitimate receiver Bob, according to
The strategy that coding is adjusted according to the channel quality of legal link expands the channel quality advantage of legal link, therefore in channel item
Part is poor, i.e., when SNR is lower, little come the gain obtained by adjustment coding structure, intercept probability is relatively high.And with
SNR is increased, and advantage of the invention starts to play, and intercept probability has certain decline;When SNR is increased to a certain extent, this hair
Bright little for the quality of the optimized gain Relative channel of legal user channel quality itself, the validity of anti-eavesdropping occurs one
Fixed to deteriorate, intercept probability increases again.But on the whole, intercept probability is all lower, and anti-eavesdropping can be preferable, as shown in Fig. 2,
Intercept probability is first reduced and is increased afterwards with the increase of SNR.
For QoS violates probability, when SNR is extremely low, time delay violates Probability maximum, and it is bigger that QoS violates probability;With
SNR increase, time delay violate probability reduce, and advantage of the present invention play so that information acquisition probability reduction, so QoS
Violating probability reduces.When SNR is continued growing, since good channel condition violates the time delay of legitimate receiver Bob generally
Rate is very low and is held essentially constant, and since advantage of the invention is declined, and information acquisition probability increases, and QoS violates probability
It improves, as shown in figure 3, QoS violation probability is increased after first quickly reducing with the increase of SNR.
Fig. 4 and Fig. 5 illustrates being applicable in for the anti-eavesdropping energy of the invention in multimedia application, with reference to Fig. 6 a, Fig. 6 b and figure
The video recovery quality of 6c, legitimate receiver Bob are preferable, although the pixel of important area can there is also the distortion of part
Restore well, does not influence subjective feeling;And then there are a large amount of mosaics in the recovery video of listener-in Eve, it is difficult to understand video
Content sufficiently shows the present invention for the applicability of multimedia transmission.
Claims (3)
1. the anti-eavesdropping transmission method in a kind of multimedia communication based on fountain codes, which comprises the following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to importance journey
Each source data packet is divided into three classes type- I, type- II and type- III by degree in a manner of successively decreasing, while by channel quality by good
It is three channel quality sections to difference, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | described in belonging to
The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
3) label of the legal transmitter Alice using the legitimate receiver Bob source data packet having been received fed back to, then root
The structure that fountain coding is adjusted according to importance and the current channel information dynamic of source data packet to be sent must encode packet tn, then
Coding is wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then that the label of source data packet is anti-
Feed legal transmitter Alice.
2. the anti-eavesdropping transmission method in multimedia communication according to claim 1 based on fountain codes, which is characterized in that step
It is rapid 3) in, as | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from the type- I not solved out also
The source data packet picked out at random in class source data packet;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from the type- not solved out also
The source data packet picked out at random in II class source data packet, ∑ sk1iBy from the I class source data of type- for having solved out
The part progress exclusive or selected at random is wrapped to obtain;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet, then turn
To step 2).
3. the anti-eavesdropping transmission method in multimedia communication according to claim 1 based on fountain codes, which is characterized in that right
In multimedia service, each frame of video is divided, a series of still images are obtained, regards each width still image as a source
Still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s by file1,s2…sk, to N number of source data
Wrap s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each pixel in segmentation figure
Significance value, l indicates pixel number contained by each block of pixels;
12) binary map is sought using edge detection, then calculates marginal information amount contained by cut zoneSjTable
Show the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then the source
The importance degree of data packet is higher.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811097456.9A CN109412750B (en) | 2018-09-19 | 2018-09-19 | Anti-eavesdrop transmission method based on fountain codes in multimedia communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811097456.9A CN109412750B (en) | 2018-09-19 | 2018-09-19 | Anti-eavesdrop transmission method based on fountain codes in multimedia communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109412750A true CN109412750A (en) | 2019-03-01 |
CN109412750B CN109412750B (en) | 2020-03-31 |
Family
ID=65465045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811097456.9A Active CN109412750B (en) | 2018-09-19 | 2018-09-19 | Anti-eavesdrop transmission method based on fountain codes in multimedia communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109412750B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111556222A (en) * | 2020-04-22 | 2020-08-18 | 之江实验室 | Fountain code-based image data variable-rate safe transmission method |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101478373A (en) * | 2009-01-16 | 2009-07-08 | 北京航空航天大学 | Signal source and channel combined optimized adaptive error control method |
CN101567755A (en) * | 2009-05-25 | 2009-10-28 | 北京理工大学 | Network coding method based on fountain codes |
US20130148705A1 (en) * | 2008-08-11 | 2013-06-13 | Sean Simmons | System and method for communicating using an in-vehicle system |
CN103856304A (en) * | 2014-02-21 | 2014-06-11 | 北京神舟航天软件技术有限公司 | Reliable file transmission protocol with selectable safety levels |
CN103886272A (en) * | 2014-03-20 | 2014-06-25 | 北京邮电大学 | Safety storage technology based on fountain codes |
CN105306168A (en) * | 2015-09-18 | 2016-02-03 | 西安交通大学 | Method for guaranteeing secure transmission of wireless data based on fountain codes |
CN105553618A (en) * | 2015-12-22 | 2016-05-04 | 西安交通大学 | Secure image transmission method based on fountain code and self-adaptive resource distribution |
CN107196732A (en) * | 2017-04-24 | 2017-09-22 | 辽宁工业大学 | The anti-eavesdrop coding method encoded based on fountain codes |
CN107222284A (en) * | 2017-07-27 | 2017-09-29 | 西安交通大学 | A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback |
CN107360568A (en) * | 2017-08-24 | 2017-11-17 | 西安交通大学 | The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes |
CN108259138A (en) * | 2018-04-25 | 2018-07-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of safe transmission method repeatedly fed back using fountain codes |
-
2018
- 2018-09-19 CN CN201811097456.9A patent/CN109412750B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130148705A1 (en) * | 2008-08-11 | 2013-06-13 | Sean Simmons | System and method for communicating using an in-vehicle system |
CN101478373A (en) * | 2009-01-16 | 2009-07-08 | 北京航空航天大学 | Signal source and channel combined optimized adaptive error control method |
CN101567755A (en) * | 2009-05-25 | 2009-10-28 | 北京理工大学 | Network coding method based on fountain codes |
CN103856304A (en) * | 2014-02-21 | 2014-06-11 | 北京神舟航天软件技术有限公司 | Reliable file transmission protocol with selectable safety levels |
CN103886272A (en) * | 2014-03-20 | 2014-06-25 | 北京邮电大学 | Safety storage technology based on fountain codes |
CN105306168A (en) * | 2015-09-18 | 2016-02-03 | 西安交通大学 | Method for guaranteeing secure transmission of wireless data based on fountain codes |
CN105553618A (en) * | 2015-12-22 | 2016-05-04 | 西安交通大学 | Secure image transmission method based on fountain code and self-adaptive resource distribution |
CN107196732A (en) * | 2017-04-24 | 2017-09-22 | 辽宁工业大学 | The anti-eavesdrop coding method encoded based on fountain codes |
CN107222284A (en) * | 2017-07-27 | 2017-09-29 | 西安交通大学 | A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback |
CN107360568A (en) * | 2017-08-24 | 2017-11-17 | 西安交通大学 | The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes |
CN108259138A (en) * | 2018-04-25 | 2018-07-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of safe transmission method repeatedly fed back using fountain codes |
Non-Patent Citations (3)
Title |
---|
刘政: ""喷泉码与无线网络防窃听技术研究"", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
吕超; 任品毅; 杜清河; 孙黎: ""喷泉码无线安全传输应用的传输功率控制改进方案"", 《陕西省通信学会2016年学术年会论文集》 * |
汪立康; 彭建华; 易鸣: ""一种基于反馈的喷泉码安全传输方法"", 《计算机应用研究》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111556222A (en) * | 2020-04-22 | 2020-08-18 | 之江实验室 | Fountain code-based image data variable-rate safe transmission method |
CN111556222B (en) * | 2020-04-22 | 2022-01-14 | 之江实验室 | Fountain code-based image data variable-rate safe transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN109412750B (en) | 2020-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100407691C (en) | Packet transceiver apparatus | |
CN101213780B (en) | Adaptive modulation for cooperative coded systems | |
US7797014B2 (en) | Apparatus and method for performing uplink power control in broadband wireless access system | |
Lu et al. | QoE-driven multi-user video transmission over SM-NOMA integrated systems | |
CN106899524B (en) | Safety access method based on channel estimating and user QoS | |
CN104284375B (en) | A kind of method of wireless network rate adaptation regulation | |
Leung et al. | Link adaptation and power control for streaming services in EGPRS wireless networks | |
CN109412750A (en) | Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication | |
CN107222284B (en) | The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things | |
CN102223202A (en) | Method and system for detecting loss reasons of radio broadcast data packet and method and system for adapting rate | |
Bafghi et al. | Joint optimization of power consumption and transmission delay in a cache-enabled C-RAN | |
Choudhury et al. | Throughput optimization for wireless LANs in the presence of packet error rate constraints | |
CN111556222B (en) | Fountain code-based image data variable-rate safe transmission method | |
US8503353B2 (en) | Reverse link power and data rate control | |
KR102631694B1 (en) | System and Method for encryption/decription and channel-coding | |
CN108809515B (en) | Fountain code-based multicast secure transmission method in wireless cache network | |
EP3753229B1 (en) | Devices and methods for coded caching | |
CN102957510B (en) | AMC (Adaptive Modulation and Coding) method based on SC-FDE (Single Carrier-Frequency Domain Equalization) system | |
CN101415208B (en) | Self-adapting modulation encode method adapting for mobile multicast system | |
Aljohani et al. | Exit-chart-aided joint source coding, channel coding, and modulation design for two-way relaying | |
Tang et al. | Notice of Violation of IEEE Publication Principles: Adaptive modulation for fading channels | |
Fujihashi et al. | Wi-Fi Offloading for Multi-Homed Hybrid Digital-Analog Video Streaming | |
Du et al. | Joint Power and Constellation Size Adaptation for Mobile Multicast Employing MQAM Over Wireless Fading Channels | |
Atici et al. | Improving the performance of wireless H. 264 video broadcasting through a cross-layer design | |
Deng et al. | A novel adaptive code block group hybrid automatic repeat request scheme for low earth orbit satellite networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |