{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T07:15:26Z","timestamp":1693034126357},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T00:00:00Z","timestamp":1505088000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11277-017-4248-6","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:35:21Z","timestamp":1505165721000},"page":"5555-5585","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Utilization of Raptor Codes for OFDM-System Performance Enhancing"],"prefix":"10.1007","volume":"96","author":[{"given":"N. M.","family":"El-Gohary","sequence":"first","affiliation":[]},{"given":"Mohsen A. M.","family":"El-Bendary","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]},{"given":"M. M.","family":"Fouad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,11]]},"reference":[{"issue":"5","key":"4248_CR1","first-page":"374","volume":"1","author":"CS Patil","year":"2012","unstructured":"Patil, C. S., Karhe, R. R., & Aher, M. A. (2012). Development of mobile technology: A survey. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 1(5), 374\u2013379.","journal-title":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering"},{"issue":"8","key":"4248_CR2","first-page":"3404","volume":"4","author":"A Singh","year":"2015","unstructured":"Singh, A. (2015). A review of different generations of mobile technology. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), 4(8), 3404\u20133408.","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)"},{"key":"4248_CR3","unstructured":"Patil1, C. S., Karhe, R. R., Aher, M. A. (2012). Review on generations in mobile cellular technology. International Journal of Emerging Technology and Advanced Engineering, 2(10). www.ijetae.com . (ISSN 2250-2459, October 2012)."},{"key":"4248_CR4","volume-title":"Microwave mobile communications","author":"WC Jakes","year":"1974","unstructured":"Jakes, W. C. (1974). Microwave mobile communications (3rd ed.). New York: Wiley.","edition":"3"},{"key":"4248_CR5","unstructured":"Shannon, C. E. (1949). A mathematical theory of communication. Urbana, IL: University of Illinois Press (reprinted 1998)."},{"key":"4248_CR6","volume-title":"Wireless communications: Principles and practice","author":"TS Rappport","year":"2002","unstructured":"Rappport, T. S. (2002). Wireless communications: Principles and practice (2nd ed.). Singapore: Pearson Education Inc.","edition":"2"},{"key":"4248_CR7","volume-title":"Digital communications","author":"JG Proakis","year":"2001","unstructured":"Proakis, J. G. (2001). Digital communications (4th ed.). Mc-Graw-Hill: International Editions.","edition":"4"},{"key":"4248_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/B978-0-08-009306-2.50005-4","volume-title":"Statistical methods in radio wave propagation","author":"M Nakagami","year":"1960","unstructured":"Nakagami, M. (1960). The m-distribution\u2014A general formula of the intensity distribution of rapid fading. Statistical methods in radio wave propagation (pp. 3\u201336). Oxford, UK: Pergamon Press."},{"issue":"3","key":"4248_CR9","first-page":"49","volume":"6","author":"ME Abd El-Hameed","year":"2016","unstructured":"Abd El-Hameed, M. E., El-Bendary, M. A. M., Bekhiet, I. O., & Abd El-Kader, H. M. (2016). An efficient secured turbo codes for long term evolution system enhancement.\u00a0International Journal of Networks and Communications, 6(3), 49\u201356.","journal-title":"International Journal of Networks and Communications"},{"key":"4248_CR10","volume-title":"Fundamentals of WiMAX: Understanding broadband wireless networking","author":"JG Andrews","year":"2007","unstructured":"Andrews, J. G., Ghosh, A., & Mohamed, R. (2007). Fundamentals of WiMAX: Understanding broadband wireless networking. Upper Saddle River: Prentice Hall."},{"key":"4248_CR11","volume-title":"Modern digital and analog communications system","author":"BP Lathi","year":"2010","unstructured":"Lathi, B. P. (2010). Modern digital and analog communications system (3rd ed.). Oxford: Oxford University Press.","edition":"3"},{"key":"4248_CR12","doi-asserted-by":"crossref","DOI":"10.1002\/0470017406","volume-title":"Theory and application of OFDM and CDMA wideband wireless communication","author":"H Schulze","year":"2005","unstructured":"Schulze, H., & Luders, C. (2005). Theory and application of OFDM and CDMA wideband wireless communication. New York: Wiley."},{"key":"4248_CR13","doi-asserted-by":"crossref","unstructured":"Marchetti, N., Rahman, M. I., Kumar, S., & Prasad, R. (2009). OFDM: Principles and challenges. In V. Tarokh (Ed.), New directions in wireless communications research \u00a0(pp. 29\u201362). Springer.","DOI":"10.1007\/978-1-4419-0673-1_2"},{"key":"4248_CR14","volume-title":"OFDM for wireless communications systems","author":"RV Nee","year":"2004","unstructured":"Nee, R. V., & Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House."},{"key":"4248_CR15","unstructured":"Harada, H., & Prasad, R. (2002) Simulation and software radio for mobile communications. Artech House, Universal Personal Communications library."},{"key":"4248_CR16","volume-title":"OFDM for wireless multimedia communications","author":"RV Nee","year":"2004","unstructured":"Nee, R. V., & Prasad, R. (2004). OFDM for wireless multimedia communications. Norwood: Artech House Publishers."},{"key":"4248_CR17","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low density parity check codes","author":"RG Gallager","year":"1963","unstructured":"Gallager, R. G. (1963). Low density parity check codes. Cambridge, MA: MIT Press."},{"key":"4248_CR18","doi-asserted-by":"crossref","unstructured":"Mackay, D. J. C. (2005). Fountain codes. IEE Proceedings-Communications, 152(6), 1062\u20131068.","DOI":"10.1049\/ip-com:20050237"},{"issue":"8","key":"4248_CR19","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/LSP.2003.814401","volume":"10","author":"S Celebi","year":"2003","unstructured":"Celebi, S. (2003). Inter block interference (IBI) minimizing time-domain equalizer (TEQ) for OFDM. IEEE Signal Processing Letters, 10(8), 232\u2013234.","journal-title":"IEEE Signal Processing Letters"},{"issue":"8","key":"4248_CR20","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/49.730448","volume":"16","author":"MV Clark","year":"1998","unstructured":"Clark, M. V. (1998). Adaptive frequency-domain equalization and diversity combining for broadband wireless communications. IEEE Journal on Selected Areas in Communications, 16(8), 1385\u20131395.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4248_CR21","doi-asserted-by":"crossref","unstructured":"Luby, M. (2002). LT-codes. In Proceedings of the 43rd annual IEEE symposium on the foundations of computer science, pp. 271\u2013280.","DOI":"10.1109\/SFCS.2002.1181950"},{"issue":"4","key":"4248_CR22","doi-asserted-by":"crossref","first-page":"2773","DOI":"10.1007\/s11277-015-2568-y","volume":"83","author":"NF Soliman","year":"2015","unstructured":"Soliman, N. F., Hassan, E. S., Shaalan, A. H. A., Fouad, M. M., El-Khamy, S. E., Albagory, \u00a0Y., et al. (2015). Efficient image communication in PAPR distortion cases. International Journal of Wireless Personal Communications, 83(4), 2773\u20132834.","journal-title":"International Journal of Wireless Personal Communications"},{"key":"4248_CR23","unstructured":"Rahman, M., Dash, S., Fitzek, F. (2005). OFDM based WLAN systems, Technical Report, Aalborg University, Denmark."},{"key":"4248_CR24","doi-asserted-by":"crossref","unstructured":"Luby, M., Watson, M., Gasiba, T., Stockhammer, T., & Xu, W. (2006). Raptor codes for reliable download delivery in wireless broadcast systems. In Proceedings of IEEE CCNC.","DOI":"10.1109\/CCNC.2006.1593014"},{"issue":"4","key":"4248_CR25","first-page":"86","volume":"3","author":"K Singh","year":"2014","unstructured":"Singh, K., & Khurana, J. (2014). Performance analysis of wireless OFDM system using raptor codes with different modulation. International Journal of Engineering Science and Innovative Technology (IJESIT), 3(4), 86\u201391.","journal-title":"International Journal of Engineering Science and Innovative Technology (IJESIT)"},{"issue":"04","key":"4248_CR26","first-page":"601","volume":"02","author":"AU Pandya","year":"2013","unstructured":"Pandya, A. U., Trapasiya, S. D., & Chinnam, S. S. (2013). Performance analysis of AL-FEC raptor code over 3GPP eMBMS network. International Journal of Research in Engineering and Technology,\u00a002(04), 601\u2013608.","journal-title":"International Journal of Engineering Science and Innovative Technology"},{"issue":"4","key":"4248_CR27","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1109\/TCOMM.2017.2650995","volume":"65","author":"JD Ellis","year":"2017","unstructured":"Ellis, \u00a0J. D., & Pursley, M. B. (2017). Adaptive transmission protocols for fountain-coded multicast in packet radio networks.\u00a0IEEE Transactions on Communications, 65(4), 1786\u20131796.","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"4248_CR28","doi-asserted-by":"crossref","first-page":"3905","DOI":"10.1109\/TVT.2008.923664","volume":"57","author":"B Sivasubramanian","year":"2008","unstructured":"Sivasubramanian, \u00a0B., & Leib, H. (2008). Fixed-rate raptor codes over rician fading channels.\u00a0IEEE Transactions on Vehicular Technology, 57(6), 3905\u20133911.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"27\u201330","key":"4248_CR29","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/CISP.2008.59","volume":"2","author":"W Yao","year":"2008","unstructured":"Yao, W., Chen, L., Li, H., & Xu, H. (2008). Research on fountain codes in deep space communication. Congress on Image and Signal Processing, 2(27\u201330), 219\u2013224.","journal-title":"Congress on Image and Signal Processing"},{"key":"4248_CR30","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I Reed","year":"1960","unstructured":"Reed, I., & Solomon, G. (1960). Polynomial codes over certain finite fields. SIAM Journal of Applied Mathematics, 8, 300\u2013304.","journal-title":"SIAM Journal of Applied Mathematics"},{"key":"4248_CR31","volume-title":"Reed-solomon codes and their applications","year":"1994","unstructured":"Wicker, S., & Bhargava, V. (Eds.). (1994). Reed-solomon codes and their applications. Piscataway, NJ: IEEE Press."},{"key":"4248_CR32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-00174-5","volume-title":"Introduction to coding theory","author":"J Lint van","year":"1992","unstructured":"van Lint, J. (1992). Introduction to coding theory (2nd ed.). Berlin: Springer.","edition":"2"},{"key":"4248_CR33","volume-title":"Information theory, inference, and learning algorithms","author":"D MacKay","year":"2003","unstructured":"MacKay, D. (2003). Information theory, inference, and learning algorithms. Cambridge: Cambridge University Press."},{"issue":"3\u20134","key":"4248_CR34","first-page":"213","volume":"6","author":"A Shokrollahi","year":"2009","unstructured":"Shokrollahi, A., & Luby, M. (2009). Raptor codes. Foundations and Trends\u00ae in Communications and Information Theory, 6(3\u20134), 213\u2013322.","journal-title":"Foundations and Trends\u00ae in Communications and Information Theory"},{"issue":"6","key":"4248_CR35","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi, A. (2006). Raptor codes. IEEE Transactions Information Theory, 52(6), 2551\u20132567.","journal-title":"IEEE Transactions Information Theory"},{"key":"4248_CR36","doi-asserted-by":"crossref","unstructured":"Shokrollahi, A. (2009). Theory and applications of raptor codes. In Proceedings of MathKnow, pp. 59\u201389.","DOI":"10.1007\/978-88-470-1122-9_5"},{"key":"4248_CR37","unstructured":"Shokrollahi, A., Lassen, S., & Karp, R. (2005). Systems and processes for decoding chain reaction codes through inactivation. U.S. Patent number 6,856,263."},{"key":"4248_CR38","unstructured":"Shokrollahi, A., Lassen, S., & Luby, M. (2006). Multi-stage code generator and decoder for communication systems. U.S. Patent 7,068,729."},{"key":"4248_CR39","doi-asserted-by":"crossref","unstructured":"Yao, Q., Tang, C., & Wu, S. (2011). Frame fountain: Coding and decoding MAC frames. School of computing, University of Southern Mississippi.","DOI":"10.1109\/GLOCOMW.2011.6162537"},{"key":"4248_CR40","doi-asserted-by":"crossref","unstructured":"Luby, M. (1998). Tornado codes: Practical erasures codes based on random irregular graphes. International Computer Science Institute and Digital Fountain.","DOI":"10.1007\/3-540-49543-6_14"},{"key":"4248_CR41","unstructured":"Khisti, A. (2003). Tornado codes and Luby transform codes. SemanticScholar Org. web-site (pp. 1\u201312). 22 Oct 2003."},{"issue":"1","key":"4248_CR42","first-page":"10","volume":"6","author":"NM El-Gohary","year":"2016","unstructured":"El-Gohary, N. M., El-Bendary, M. A. M., Abd El-Samie, F. E., Fouad, M. M. (2016).\u00a0Performance evaluation of various erasures coding techniques in digital communication.\u00a0Journal of Wireless Networking and Communications, Scientific & Academic Publishing, 6(1), 10\u201320.\u00a0","journal-title":"Journal of Wireless Networking and Communications, Scientific & Academic Publishing"},{"key":"4248_CR43","doi-asserted-by":"publisher","unstructured":"Neckebroek, J., Moeneclaey, M., Magli, E. (2010). Comparison of Reed-Solomon and Raptor codes for the protection of video on-demand on the erasure channel. In 2010 international symposium on information theory and its applications (ISITA). doi: 10.1109\/ISITA.2010.5649587 .","DOI":"10.1109\/ISITA.2010.5649587"},{"key":"4248_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4177-5","author":"MAM El-Bendary","year":"2017","unstructured":"El-Bendary, M. A. M. (2017). FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and Applications. doi: 10.1007\/s11042-016-4177-5 .","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"4248_CR45","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s11277-015-2645-2","volume":"84","author":"I Eldokany","year":"2015","unstructured":"Eldokany, I., El-Rabaie, E. S. M., Elhalafawy, S. M., Eldin, M. A. Z., Shahieen, M. H., Soliman, N. F., et al. (2015). Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Communications, 84(1), 475\u2013521.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"4248_CR46","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1007\/s11277-014-1977-7","volume":"79","author":"NF Soliman","year":"2014","unstructured":"Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. S. M., Alshebeili, S. A., et al. (2014). Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless Personal Communications, 79(3), 2141\u20132154.","journal-title":"Wireless Personal Communications"},{"key":"4248_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3671-4","author":"H Kasban","year":"2016","unstructured":"Kasban, H., & El-Bendary, M. A. M. M. K. (2016). Performance improvement of digital image transmission over mobile WiMAX networks. Wireless Personal Communications. doi: 10.1007\/s11277-016-3671-4 .","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"4248_CR48","first-page":"10","volume":"16","author":"H Kasban","year":"2014","unstructured":"Kasban, H., El-Tokhy, M. A. R., & El-Bendary, M. A. M. (2014). Interleaved reed-solomon codes with code rate switching over wireless\u00a0communications channels. International Journal of Information Technology and Computer Science, 16(1), 10\u201318.","journal-title":"International Journal of Information Technology and Computer Science"},{"key":"4248_CR49","unstructured":"Mohamed, M. A. M., El-Azm, A. A., El-Fishwy, N., El-Tokhy, M. A. R., El-Samie, F. E. A., Shawki, F. (2008). Bluetooth performance improvement with existing convolutional codes over AWGN channel. In Proceedings of 2nd international conference on elec engineering. Design and Technology. ICEEDT\u201908."},{"issue":"11","key":"4248_CR50","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1080\/00207217.2012.680786","volume":"99","author":"MAMM El-Bendary","year":"2012","unstructured":"El-Bendary, M. A. M. M., El-Azm, A. E. A., El-Fishawy, N. A., Al-Hosarey, F. S. M., Eltokhy, M. A. R., El-Samie, F. E. A., et al. (2012). JPEG image transmission over mobile network with an efficient channel coding and interleaving. International Journal of Electronics, 99(11), 1497\u20131518.","journal-title":"International Journal of Electronics"},{"key":"4248_CR51","doi-asserted-by":"crossref","DOI":"10.1007\/978-4-431-55069-3","volume-title":"Developing security tools of WSN and WBAN networks applications, LNEE","author":"MAM El-Bendary","year":"2015","unstructured":"El-Bendary, M. A. M. (2015). Developing security tools of WSN and WBAN networks applications, LNEE. Japan: Springer."},{"key":"4248_CR52","unstructured":"El-Bendary, M. A. M. (2014). Lower complexity of secured WSN networks. In Developing security tools of WSN and WBAN networks applications. Lecture Notes in Electrical Engineering (Vol. 316, pp. 97\u2013151).\u00a0Springer."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4248-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4248-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4248-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:26:11Z","timestamp":1692984371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4248-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,11]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["4248"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4248-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,11]]}}}