Student: Biruk Amare Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Summer break 2017 Description: The BSc thesis is to realize a simulation program in Matlab to investigate impulse-noise cancellation in a power-line transmission on the L-N pair utilizing N-PE sensing of the disturbance as a reference. We will
Posts By / Werner Henkel
Starting from obvious similarities in operations in LDPC decoding to common neuron models, we have started making this correspondence more obvious. There are manifold possibilities to bridge the two fields, where some applications like denoising offer very obvious links, others appear much more distant.
Student: Sudipta Basak Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2017 Description: The purpose of this research is to primarily focus on investigating channel reciprocity in power lines. Initially, we will conduct experiments to determine the properties of the power line channel from both the transmitter side
Student: Navdeep Manak Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2017 Description:
Student: Monder Hamruni Advisor: Prof. Dr.-Ing. Werner Henkel Oana Graur Time frame: Spring 2017 Description: The properties of the physical layer in wireless networks are exploited to generate one-time pads which are subsequently used for secure communication between legitimate users. Previous measurements testbeds relied mostly on RSSI information, since
Student: Etta Shyti Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2016 Description: All the work in this bachelors thesis is focused on investigating channel reciprocity in powerlines, i.e. performing measurements, which determine channel properties as seen from both the transmitting and receiving side, followed by a comparison and analysis of results.
Student: Kristi Gadeshi Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2016 Description: The purpose of this research is the investigation and understanding of a security technique in wireless communications based on physical attributes of the channel. We consider a scenario where a communication channel is set up between two
Student: Alban Sherifaj Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2016 Description: We investigate the possibility of using physical layer security as a new mean of securing data during transmission. We particularly look into the identification of the Direction of Arrival of reflection patterns in a NLOS channels as
In contrast to the the well-known separation theorem, in the non-asymptotic regime, joint source-channel coding can have advantages. We design multi-edge-type LDPC codes for different source statistics.
Student: Robin Nyombi Schofield Ssenyonga Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2015 Description: Neural network rules and coding theory concepts have been associated in the past. It is known that in relation to neural networks, iterative decoding exhibits some nonlinear dynamics. The purpose of this thesis, therefore, is
Student: Zinan Liu Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2015 Description: This Guided Research focuses on frame synchronization for the DMT-based transmission system, which is used on a proposed acoustic sensor network for sonar applications. The time offset estimate not only needs to be robust and accurate to
Student: Nazia Sarwat Islam Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Fall 2014 Description: Physical-layer security options can provide robust security measures in a wireless scenario and is a topic of current interest. In this work, we consider a wireless, reciprocal channel between two legitimate users and assume a frequent physical-layer key generation
Reserving spatial dimensions proved to be very efficient for PAR reduction. With a high numbers of transmit antennas, the corresponding rate loss can be neglected.
Student: Nazia Sarwat Islam Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Fall 2013 Description: Abstract—For physical-layer security, key reconciliation procedures are needed to correct key differences that can arise as a consequence of independent noise at the two ends of a reciprocal link. We assume either a random link in a mobile environment or use