Learn More
—The use of fountain codes in wireless cooperative relay networks can improve the system performance in aspects such as transmission time, energy consumption, transmission efficiency and outage probability etc. This has been proved when the number of the relay nodes and their relaying capabilities are stationary. But in practical networks the relay nodes(More)
The degree distribution of Fountain Codes has a very important influence on Fountain Codes decoding process. So optimizing the Fountain Codes degree distribution is very significant. In this paper, we present a new way to design the degree distribution with the idea of combining several different degree distributions and integrating them to one degree(More)
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards(More)
The physical layer security technology is an effective way to reduce information leakage in a wireless communication system. In this paper, we study the physical-layer security of one-way wiretap channel which contains a source-destination pair, an eavesdropper and multiple cooperating relay nodes. What's more, in this channel, there exists direct link(More)
This paper presents the secrecy capacity and the secure degrees of freedom of Gaussian Z channel with single antenna and confidential information. Firstly, we analysis the secrecy capacity and the upper bound of secure degrees of freedom of this channel in theory. Then, we respectively discuss the security pre-coding scheme for real Gaussian channel model(More)
A new adaptive demodulation(ADM) scheme based on rate less code and Maximum a Posteriori Probability compute the log-likelihood ratio(LLR) of each bit in the modulated symbol, if the LLR of this bit is larger than the pre-set threshold, demodulate this bit, else delete it. Because the channel state information(CSI) is known by the receiver, this scheme(More)