Starting from obvious similarities in operations in LDPC decoding to common neuron models, we have started making this correspondence more obvious. There are manifold possibilities to bridge the two fields, where some applications like denoising offer very obvious links, others appear much more distant.  

  Student: Monder Hamruni Advisor: Prof. Dr.-Ing. Werner Henkel Oana Graur Time frame: Spring 2017           Description: The properties of the physical layer in wireless networks are exploited to generate one-time pads which are subsequently used for secure communication between legitimate users.  Previous measurements testbeds relied mostly on RSSI information, since

Read more…

Student: Etta Shyti Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2016       Description: All the work in this bachelors thesis is focused on investigating channel reciprocity in powerlines, i.e. performing measurements, which determine channel properties as seen from both the transmitting and receiving side, followed by a comparison and analysis of results.

Read more…

Student: Robin Nyombi Schofield Ssenyonga Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2015           Description: Neural network rules and coding theory concepts have been associated in the past. It is known that in relation to neural networks, iterative decoding exhibits some nonlinear dynamics. The purpose of this thesis, therefore, is

Read more…

Student: Zinan Liu Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Spring 2015           Description: This Guided Research focuses on frame synchronization for the DMT-based transmission system, which is used on a proposed acoustic sensor network for sonar applications. The time offset estimate not only needs to be robust and accurate to

Read more…

Student:  Nazia Sarwat Islam Advisor: Prof. Dr.-Ing. Werner Henkel Time frame: Fall 2014     Description: Physical-layer security options can provide robust security measures in a wireless scenario and is a topic of current interest. In this work, we consider a wireless, reciprocal channel between two legitimate users and assume a frequent physical-layer key generation

Read more…