Abstract
In this paper, we propose a novel distributed unequal error protection (UEP) rateless coding scheme (DURC) for space information networks (SIN). We consider the multimedia data transmissions in a dual-hop SIN communication scenario, where multiple disjoint source nodes need to transmit their UEP rateless coded data to a destination via a dynamic relay. We formulate the optimization problems to provide optimal degree distributions on the direct links and the dynamic relay links to satisfy the required error protection levels. The optimization methods are based on the And–Or tree analysis and can be solved by multi-objective programming. In addition, we evaluate the performance of the optimal DURC scheme, and simulation results show that the proposed DURC scheme can effectively provide UEP property under a variety of error requirements.
1. Introduction
With the development of space exploration and the evolution of future space information networks (SIN), erasure correcting codes have attracted considerable research interest to enhance the information transmission capacity under the extremely challenging space communication environments [], which are characterized by the frequent and lengthy link disruptions, high data loss and a long link delay []. In 2014, Consultative Committee for Space Data Systems (CCSDS) released an experimental specification of long erasure correcting (LEC) codes for near earth and deep-space communications [], in which near-optimum fixed code rate Irregular-Repeat-Accumulate (IRA) codes are proposed. In [], a joint design of the CCSDS file delivery protocol (CFDP) and IRA codes is discussed, and such erasure codes can be decoded efficiently with the Maximum-Likelihood algorithm [], and the code rate can be selected from several values [,].
Rateless codes (RC), also termed fountain codes, are capacity-achieving loss-resilient codes for erasure channels. Luby-Transform (LT) codes with a well-designed robust Soliton degree distribution (RSD) are the first practical realization of fountain codes []. They can recover the original k information (input) symbols from any received coded (output) symbols with probability and the decoding cost of operations, where θ is the allowable failure probability to recover the original message after N coded symbols have been received. To further reduce the decoding complexity and to address the issue of high error floor in LT codes, Shokrollahi proposed Raptor codes that concatenate the LT code with a weakened robust Soliton degree distribution (WRSD) with a high-rate pre-code []. In [,], LT codes are incorporated into the CFDP implementation, and both of the Packets Interleaving CCSDS File Delivery Protocol and the Loss-Tolerant File Delivery Protocol are able to resist channel erasures and can further reduce obvious overhead in CFDP.
Moreover, the line of sight (LOS) link is often unavailable for the space exploration rovers communicating to the base station directly []. The space exploration rovers and relay satellites can form a typical multi-access relaying SIN, which has a dynamic time-varying property of multi-hop links []. For example, the data from disjoint rovers/explorers need to be collected at the base station through a periodic relaying satellite []. Therefore, rateless codes have been considered in increasingly complicated SIN to provide an efficient distributed transmission scheme [].
The first distributed LT (DLT) codes is proposed in []. The degree distribution for the distributed sources is designed as a way of decomposing the standard RSD, which is suited for a pre-fixed number of source nodes communicating with a single destination via a relay. In [], selective distributed LT (SDLT) code is proposed by applying the And-Or tree analysis and linear programming, which can find some optimal combination at the relay node for an arbitrarily number of sources. In [], soliton-like rateless coding (SLRC) scheme is designed for a Y-network, and SLRC scheme can provide degree distributions that generate LT-like output symbols in a relay with simple network coding protocol. It was shown through Monte Carlo simulations that the SLRC outperforms the DLT and SDLT. In [], an improved approach of SLRC is proposed for the relay buffer-limited situation to ensure more effective decoding. The SIN is considered in the scenario that direct links and relay links are all existing, and an available degree distribution optimization scheme is proposed based on the And–Or tree analysis in []. The rateless network coding (NC) for dynamic relay topology based on [] is investigated preliminarily for increasing the system throughput in this paper.
Furthermore, there are several scenarios where the conventional rateless codes cannot perform optimally due to the lack of unequal error protection (UEP). For example, when transmitting the data blocks of discrete wavelet-transform encoded images in SIN, the lower frequency part of data blocks are more important than the higher frequency parts. Thus, it is more desirable to use rateless codes with UEP to protect the important parts. The first scheme of rateless codes with UEP property is proposed in [], and message symbols are allocated two different weights according to their importance levels. In [], expanding window fountain codes is proposed to generate output symbols only from message symbols within a certain window. Two overlapping and expanding windows are pre-designed, such that the smaller window contains important message symbols, and the larger window contains all the symbols. A distributed rateless code with an unequal error protection (UEP) property has been proposed in [] for a Y-network, and it can provide different data importance levels with different error probabilities for two sources. The generalized UEP rateless code (GURC) for distributed relay networks is proposed in [], and the relationship between UEP property and decoding error rate (DER) of LT codes is obtained by the And-Or tree analysis []. However, the UEP property for multiple source nodes and original data in a dynamic network topology of SIN is still lacking research.
Considering a relay has its own orbit around the mission planet, which makes the links between landed rovers and the relay being periodically available. Since the space explorers have limited energy, broadcasting is prohibited. Thus, the rovers cannot communicate with the relay and destination simultaneously. In this paper, to improve the throughput of the multimedia service in future SIN communications, we proposed a novel distributed UEP rateless coding (DURC) scheme for the multimedia data transmission in a multi-access relaying SIN, which could obtain a lower DER under the pre-selected parameters of UEP property. Specifically, the RC degree distributions and network coding rules are designed to match the duration of the link access conditions.
The rest of the paper is organized as follows. In Section 2, we present the system model and our DURC scheme. In Section 3, we derive the asymptomatic performance based on the And-Or tree analysis and optimize the degree distributions and network coding rules by using multi-objective programming. In Section 4, we employ NSGA-II to design DURC codes and evaluate the performance of the DURC under different channel conditions. Finally, we conclude the paper in Section 5.
2. System Model
We consider a communication scenario in SIN as shown in Figure 1: two disjoint exploration rovers with sources and with data block of length and input symbols, respectively. Let and denote the set of and input symbols, respectively. and transmit to a base station D with the assistance of a periodic moving relay satellite/orbiter R. Due to the periodic motion, R has limited access time, and the source nodes have the knowledge of the accessing period in the SIN. Note that, without loss of generality, the output symbols transmission in Figure 1 are on binary erasure channels (BEC), and the erasure probabilities between the four nodes are denoted by , where and . Note that the qualities of direct links are much worse than the relay links in SIN, i.e., . We define the relay links , , and (Y-network in Figure 1) as primary links, and the direct links between sources to destination, , , as secondary links.
Figure 1.
Dynamic multiple access SIN communications.
We define each period of the relay in the SIN as a transmission session, and each transmission session period is divided into two Phases.
In Phase 1, R is invisible to , , and D, then and performs LT coding over their information set and with degree distribution and , respectively, and transmits the coded symbols on the secondary links and to the destination D; in Phase 2, once primary links and are available, the secondary link is closed to save energy immediately. and performs LT coding over its information set and with degree distribution and , respectively, and transmits the coded symbols to the relay R, and a rateless NC is performed at R and then transmitted to D on . The connections and durations are illustrated in Figure 2. The number of coded symbols transmitted on each link are denoted by and . For this dynamic SIN network model, the detail of our DURC scheme is illustrated below:
- Initialization Suppose that the information symbol lengths of and are and , respectively. The () symbols are divided into n subsets according to their importance levels, expressed as and , the fraction of the information symbols in is and . selects the i-th importance level from subset with probability , which is called symbol-selection weight []. employs an LT-coding degree distribution in Phase 1, and in Phase 2, where denotes a pre-selected maximum value of .
- Phase 1 R is invisible, and and generate distributed rateless coded symbols from information symbols using LT-coding degree distribution , and transmit coded symbols to D by secondary links. In an encoding process at , if a degree is randomly selected with probability using the degree distribution , then information symbols are selected uniformly at random and are bitwise XORed to form the coded symbol.
- Phase 2.1 R is visible, and and generate distributed UEP rateless coded symbols from information symbols using LT-coding degree distribution , and transmit coded symbols to R by primary links. In an encoding process at , if a degree is randomly selected with probability using the degree distribution , then information symbols are selected with probability in and are bitwise XORed to form the coded symbol.
- Phase 2.2 The coded symbols are transmitted to relay R from and , and based on the network coding rule and , R generates three types of network coded symbols and forwards them to the destination D. R forwards ’s output symbol directly with the probability , while forwarding ’s output symbol directly with the probability , and XORs the two incoming symbols with the probability and then forwards to D .
- Decoding After receiving enough coded symbols from , and R, a joint decoding is performed on D to recover the information symbols of and .
Figure 2.
Connections and durations of DURC in SIN relaying Communications.
Considering the erasure probabilities of the links, in Phase 1 and Phase 2, the expected number of the coded symbols successfully received at D can be expressed as , and , where and are the number of the received coded symbols on the and links in Phase 1, respectively, and is the number of the received output coded symbols on the link in Phase 2.
3. Design of Distributed Unequal Error Protection Rateless Codes
3.1. Analysis of RC and NC Degree Distributions by the And-Or Tree Technique
In one transmission session, D will receive multi-path coded blocks in Phase 1 and Phase 2, and a joint decoding to restore the sources’ original symbols via the belief propagation (BP) algorithm. In this paper, we assume that the original symbols in one source node are divided into more important bits (MIB) and less important bits (LIB), which means that in the flowchart.
Based on the And-Or tree analysis [], let and denote the edge distributions of the input node and the output node in a rateless codes, respectively. The DER after l BP decoding iterations is expressed as , where . When k approaches infinity, the edge distribution of input nodes become a Poisson distribution, and the DER becomes ), where is the derivative of the output degree distribution, and γ is the decoding overhead defined as the ratio of the number of information symbols recovered by the destination decoder to the number of coded symbols. Thus, the decoding performance is only determined by γ and .
With the addition of the UEP property, the decoding overhead of the j-th importance level in the GURC [] becomes , where . The success decoding probability after iterations becomes .
Thus, the DER of message symbols from the j-th importance level for an ensemble at l-th iteration is expressed as
where .
In order to analyze the decoding performance of our DURC scheme, we should derive the relationship between degree distribution , and network coding rule P. We consider an And-Or tree as shown in Figure 3, and the received coded symbols can be divided into five groups. The first two groups are received on the secondary links and , termed and .
Figure 3.
And-Or tree illustration of the edges connection of .
The other three groups are received on the primary links, termed , and . and are the coded blocks forwarded by R with the probabilities and , respectively. is the coded symbol transmitted from R after the XOR operation with the probability . and are generated with degree distributions and , respectively. and are generated with degree distributions and , respectively. is generated with the convolution degree distribution .
The input nodes can be divided into four groups, termed , , and . and are the MIB and LIB of , respectively. Similarly, and are the MIB and LIB of , respectively. Thus, with depth as shown in Figure 3, with the root . Similarly, we can construct And-Or trees , and with the roots , and by using the same method.
Theorem 1.
Let (or ) be the probability that the root of (or ) evaluates to 0, indicating one input node not being recovered after l-th BP decoding iterations. Then, we have
where , and
Proof of Theorem 1.
In (2) and (3), the first product term means of Phase 1, and the second one means of Phase 2. For every importance level of the information symbols in a single source node, their input edge distribution and average degree are different. Thus, the parameters used in (2) and (3) can be defined as follows. The input edge distribution of primary link is expressed as , where is the input average degree, and where is its output average degree.
The input edge distribution of secondary link is expressed as , where , and the output edge distribution of secondary link is expressed as . is defined as the probability that has i children of input nodes, and is defined as the probability that has i children of input nodes. Moreover, also refers to the probability that has i children of (including and ), and refers to the probability that has i children of (including and ). Every only has the children of , and the probability of any evaluating to 1 is . Thus, if a has i children of , the probability of evaluating to 1 is . In the same way, if a node has i children of and j children of , the probability of evaluating to 1 is .
In the And-Or tree , and are the proportions of connecting with and , respectively. and are the proportions of connect with and , respectively. The relationships are expressed as (8). When , and are given, the DER in (2) and (3) monotonically decrease with l, and converge to fixed values, which can be regarded as the final DER. ☐
3.2. Analysis of System Throughput
The system throughput is defined as the ratio of the total number of recovered information symbols k and the sum of received output symbols n in one transmission session period. Since is the asymptotic DER, there exists a unique ideal throughput upper bound for a certain system model that is related to . For the LT code, the ideal DER tends to 0 when , which means that the upper bound is only affected by the overhead γ. In this way, we can derive the throughput upper bound for a typical BEC model as shown in Figure 1, which is given by
In (9), ε is the channel erasure probability, which affects the overhead γ. Moreover, by considering the periodic motion of relay R in the dynamic SIN scenario, we can derive the throughput upper bound of system model in this paper as
3.3. Optimizations of Rateless Coding Scheme and Network Coding Rule
To optimize the system performance, we construct a decision variables set about degree distribution, symbol selection weight and network coding rule in (2) and (3), , where denotes the coefficient of degree distribution, denotes symbol selection weight for different importance level, and P is the network coding rule. Since the channel state information of the links are unknown, we cannot obtain the exact number of coded symbols at D in each phase. Therefore, sub-optimal Q should be acquired for minimizing the BP DER at the destination D. Therefore, we give the optimizations as follows.
We first consider the secondary link in our scenario. The erasure probability or is much too high, which may lead to the received coded symbols being less than the information symbols at the destination D, i.e., and . Thus, as a supplementation to enhance the decoding performance of the whole transmission session, the optimization problem of or is to guarantee that the received coded symbols can recover part of the information symbols instead of recovering the total original information symbol sets or UEP, and similar optimal formulations can be found in [] and []. The optimization problem of to minimize the decoding error probability can be formulated as follows:
Without the exact knowledge of , the values of for different channel erasure probabilities are unknown. Problem (11) is thus a constrained nonlinear optimization problem and generally non-convex. Therefore, it is a simplified method to solve this problem instead, by considering the most important coded symbols at the LT BP-decoder. In each BP decoding iteration, degree-1 and degree-2 symbols are most important, as they can help other unrecovered coded symbols to reduce the number of edges connected with them. In this case, we could restrict the maximum degree and to 2, i.e., and . In [], a theoretical analysis is given to demonstrate that the partial decoding performance of the degree distribution with only degree-1 and degree-2 nodes is acceptable, when the received overhead is lower than 1.
In addition, these low-degree coded symbols are to be jointed with the coded symbols on the primary links to assist in full decoding. Therefore, to minimize the DER of the joint decoding at the destination D with a pre-selected decoding overhead , and the And-Or tree asymptotic performances of and in (2) and (3) can be easily computed by choosing the remaining parameters , , , , , and , with , and is known beforehand. It is not difficult to show that and are two conflicting objective functions by investigating (2) and (3). Therefore, we have a multi-objective optimization (MOP) problem about the objective function to minimize them concurrently, where S is the set of decision variables, i.e.,
Then, consider the primary links in our scheme, although the actual values of , and are unknown, and the expected ratio of the numbers of the received coded symbols on different links, : : , can be derived by given the block lengths and erasure probabilities. If a desired overhead and proportion of every importance level are given, the decoding performance of MIB and LIB only depend on the degree distribution and symbol selection weight. Thus, if we limit the decoding performance relation between LIB and MIB, the optimizations of rateless coding scheme of one source are finished when we finish optimizing the decoding performance of LIB. Furthermore, it is not difficult to show that and are two conflicting objective functions by investigating (2) and (3). Therefore, we have a multi-objective optimization (MOP) problem, MOP1, about the objective function and to minimize them concurrently, where Q is the set of decision variables shown above:
Note that the inequalities on the second line of (13) are added to guarantee UEP property, which limits the decoding performance relation between LIB and MIB. Thus, it should be noted that when the original information in any source is divided into importance levels, optimization can also be in the same way due to the same degree distribution and network coding rule for every importance level. The MOP2 can be formulated as follows, in which it will have importance levels for the whole system:
A fast non-dominated sorting genetic algorithm (NSGA-II) [] is one of the many algorithms that could give a Pareto front of MOP with an outstanding performance. Thus, we employ this algorithm to solve the set Q.
4. Simulation and Comparison
Let us investigate the DURC parameters under a totally symmetric network model, where the block lengths are , the information symbols lengths are , and the erasure probabilities of channel links are , , and . Setting the maximal value of the degree , desired total overhead , the proportion of MIB in every source is , and the decoding performance relationship between MIB and LIB is . To obtain the optimized degree distribution and , we solved the MOP1 and finally get a Pareto front about the optimized and . We plot the Pareto fronts obtained from our optimizations in Figure 4, where . It is obviously that the protection of is increasing with the increasing of η.
Figure 4.
Connections and durations of DURC in SIN relaying communications.
The partial optimization results are shown in Table 1. Furthermore, we select an equal error protect (eep) degree distribution from the sets of our optimized DURC scheme, i.e., and , the optimized and at sources are identical as . Furthermore, we substitute into the MOP problem (12) with a desired total overhead to solve for the RC degree distribution on secondary links as , and NC relaying probabilities as , and , and we can use these eep-DURC scheme to compare with three existing distributed rateless coding schemes in the same network model as described before. The store-and-forward (SF) scheme is that the RC degree distributions on secondary and primary links are both set as the classical degree distributions used for Raptor codes in [], and the relay node R randomly forwards the received coded symbols from and with equal probability. Simple network coding scheme (XOR) is that R always sends a new coded symbol to D, which is generated by XORing the two coded symbols from and . The SLRC scheme uses the network coding relay protocol as in [], the relay node R only forwards coded symbols with degree-1 and degree-2 with a threshold probability, and RC degree distributions on secondary and primary links are also the Raptor degree distributions.
Table 1.
Optimal network coding rule, selection weights and degree distributions for DURC with different importance levels.
Figure 5a shows the DER versus the total overhead for various distributed rateless codes (DRC) schemes, which are obtained by the asymptotical performances formed by And-Or tree analysis. It is noted that the XOR scheme has the worst decoding performance because of the lack of lower degree symbols (1 and 2) received by D. The SLRC scheme has better performance than the SF scheme when the overhead is larger than 1.15. The DER of the eep-DURC scheme, which is the basic of our proposed UEP, is clearly the lowest. Figure 5b shows the DER versus the total overhead for various UEP schemes. It is noted that the DURC schemes achieved the lowest DER for both MIB and LIB, which gives great support for information transmission in SIN.
Figure 5.
Decoding error rate versus the total overhead at the destination: (a) various DRC schemes; and (b) various UEP schemes.
Figure 6a shows the DER versus the total overhead of inner information in one source node for DURC and eep-DURC schemes from the And-Or tree performance evaluation. It is obvious that the DURC scheme can achieve marvel decoding performance of MIB with about two orders of the decoding performance of LIB decreasing, which gives great protection for MIB than eep-DURC scheme. Figure 6b shows the LIB performance of different sources for . The result shows that when decoding performance of increases, the performance of related will decrease, that is to say, the performance increase of one source is on the price of performance decrease of another source. Therefore, we only have to set desired parameters, and the scheme proposed in this paper will then satisfy different needs.
Figure 6.
Decoding performance of the DURC schemes: (a) DER performance of single node; (b) DER performance of various UEP setups.
We also estimate the throughput performance of the DURC scheme. To substitute the parameter setting in this section into (10), we can derive the system throughput upper bound as
Figure 7 shows the system throughput versus erasure probability of channel for information in one source and eep-DURC. To match the system setting of primary link and secondary link, we set .
Figure 7.
System throughput versus erasure probabilities.
5. Conclusions
We have investigated the design and optimization of the DURC over a dynamic energy-limited satellite relay network with multiple sources in SIN. The decoding performance has been analyzed by the And-Or tree technique, and the optimizations of parameters are solved by the MOP. The DURC can adapt the degree distribution, symbol selection weight and network coding rule to various erasure probabilities in different links. Simulation results show that, in the DURC, the information of any source can be divided into different arbitrary importance levels. The DURC can give great protection for the MIB without a large sacrifice of LIB. Furthermore, we can set different UEP levels for different sources to satisfy the requirement of system, which improves the flexibility of screening information for ground stations and makes the system more practical.
Acknowledgments
This work was supported in part by the National Natural Sciences Foundation of China (NSFC) under Grant 61525103, Grant 61371102 and Grant 61201144, the Natural Scientific Research Innovation Foundation in the Harbin Institute of Technology under Grant HIT. NSRIF. 2017051, and the Shenzhen Fundamental Research Project under Grant JCYJ20160328163327348 and Grant JCYJ20150930150304185.
Author Contributions
Jian Jiao and Yi Yang put forward the main idea and designed the distributed unequal error protection rateless coding scheme. Yi Yang and Bowen Feng did the analysis and prepared the manuscript. All authors have participated in writing the manuscript. All authors have read and approved the final manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
References
- De Cola, T.; Paolini, E.; Liva, G.; Calzolari, G.P. Reliability options for data communications in the future deep-space missions. Proc. IEEE 2011, 99, 2056–2074. [Google Scholar] [CrossRef]
- Yu, Q.; Wang, R.-H.; Zhao, K.-L.; Li, W.-F.; Sun, X.; Hu, J.-L.; Ji, X.-Y. Modeling RTT for DTN protocol over asymmetric cislunar space channels. IEEE Syst. J. 2016, 10, 556–567. [Google Scholar] [CrossRef]
- Consultative Committee for Space Data Systems (CCSDS). Erasure Correcting Codes for Use in Nearearth and Deep-Space Communications; National Aeronautics and Space Administration: Washington, DC, USA, November 2014. [Google Scholar]
- De Cola, T.; Marchese, M. Reliable data delivery over deep space networks: Benefits of long erasure codes over ARQ strategies. IEEE Wirel. Commun. 2010, 17, 57–65. [Google Scholar] [CrossRef]
- Paolini, E.; Liva, G.; Matuz, B.; Chiani, M. Maximum likelihood erasure decoding of LDPC codes: Pivoting algorithms and code design. IEEE Trans. Commun. 2012, 60, 3209–3220. [Google Scholar] [CrossRef]
- Liva, G.; Pulini, P.; Chiani, M. On-line construction of irregular repeat accumulate codes for packet erasure channels. IEEE Trans. Wirel. Commun. 2013, 12, 680–689. [Google Scholar] [CrossRef]
- Garrammone, G.; De Cola, T.; Matuz, B.; Liva, G. Recent findings on erasure codes for space communications. Int. J. Satell. Commun. Netw. 2014, 32, 201–211. [Google Scholar] [CrossRef]
- Luby, M. LT codes. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; pp. 271–280.
- Shokrollahi, A. Raptor codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
- Jiao, J.; Guo, Q.; Zhang, Q.-Y. Packets interleaving ccsds file delivery protocol in deep space communication. IEEE Aerosp. Electron. Syst. Mag. 2011, 26, 5–11. [Google Scholar] [CrossRef]
- Li, H.; Luo, H. An erasure coding-based loss-tolerant file delivery protocol for deep space communications. Acta Astronaut. 2011, 68, 1409–1416. [Google Scholar] [CrossRef]
- Wang, Y.; Jiao, J.; Sui, X.-D.; Wu, S.-H.; Li, Y.-H.; Zhang, Q.-Y. Rateless coding scheme for time-varying dying channels. In Proceedings of the 8th Wireless Communications & Signal Processing, Yangzhou, China, 13–15 October 2016; pp. 1–6.
- Niephaus, C.; Kretschmer, M.; Ghinea, G. QoS provisioning in converged satellite and terrestrial networks: A survey of the state-of-the-art. IEEE Commun. Surv. Tutor. 2016, 19, 1–27. [Google Scholar] [CrossRef]
- Gu, S.-S.; Yang, Y.; Jiao, J.; Xiang, W.; Zhang, Q.-Y. Distributed rateless coded collaboration for satellite relay networks. In Proceedings of the Wireless Communications & Signal Processing, Nanjing, China, 15–17 October 2015; pp. 1–6.
- Muhammad, M.; Giambene, G.; De Cola, T. QoS Support in SGD-based High Throughput Satellite Networks. IEEE Trans. Wirel. Commun. 2016, 15, 1–15. [Google Scholar] [CrossRef]
- Puducheri, S.; Kliewer, J.; Fuja, T. The design and performance of distributed LT codes. IEEE Trans. Inf. Theory 2007, 53, 3740–3754. [Google Scholar] [CrossRef]
- Sejdinovic, D.; Piechocki, R.; Doufexi, A. AND-OR tree analysis of distributed LT codes. In Proceedings of the IEEE Infromation Theory Workshop, Taormina, Italy, 12–10 June 2009; pp. 261–265.
- Liau, A.; Yousefi, S.; Kim, I.-M. Binary soliton-like rateless coding for the Y-network. IEEE Trans. Commun. 2011, 59, 3217–3222. [Google Scholar] [CrossRef]
- Liau, A.; Kim, I.-M.; Yousefi, S. Improved low-complexity soliton-like network coding for a resource-limited relay. IEEE Trans. Commun. 2013, 61, 3327–3335. [Google Scholar] [CrossRef]
- Gu, S.-S.; Jiao, J.; Yang, Z.-H.; Zhang, Q.-Y.; Xiang, W.; Cao, B. Network-coded rateless coding scheme in erasure multiple-access relay enabled communications. IET Commun. 2014, 8, 537–545. [Google Scholar] [CrossRef]
- Rahnavard, N.; Vellambi, B.N.; Fekri, F. Rateless codes with unequal error protection property. IEEE Trans. Inf. Theory 2007, 53, 1521–1532. [Google Scholar] [CrossRef]
- Sejdinovic, D.; Vukobratovic, D.; Doufexi, A. Expanding window fountain codes for unequal error protection. IEEE Trans. Commun. 2009, 57, 2510–2516. [Google Scholar] [CrossRef]
- Talari, A.; Rahnavard, N. Distributed unequal error protection rateless codes over erasure channels: A two-source scenario. IEEE Trans. Commun. 2012, 60, 2084–2090. [Google Scholar] [CrossRef]
- Baik, J.; Suh, Y.; Rahnavard, N.; Heo, J. Generalized unequal error protection rateless codes for distributed wireless relay networks. IEEE Trans. Commun. 2015, 63, 4630–4650. [Google Scholar] [CrossRef]
- Talari, A.; Rahnavard, N. On the intermediate symbol recovery rate of rateless codes. IEEE Trans. Commun. 2012, 60, 1237–1242. [Google Scholar] [CrossRef]
- Luby, M.; Mitzenmacher, M.; Shokrollahi, A. Analysis of random processes via and/or tree evaluations. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA, USA, 25–27 January 1998; pp. 364–373.
- Sanghavi, S. Intermediate performance of rateless codes. In Proceedings of the IEEE Infromation Theory Workshop, Bergen, Norway, 2–6 September 2007; pp. 478–482.
- Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evolut. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
© 2017 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).