Now showing items 1-10 of 10

    • Massive random access with trellis-based codes and random signatures 

      Tanc, A. K.; Duman, Tolga M. (IEEE, 2021-01-05)
      We investigate unsourced and grant-free massive random access in which all the users employ the same codebook, and the basestation is only interested in decoding the distinct messages sent. To resolve the colliding user ...
    • A new wireless asynchronous data communications module for industrial applications 

      Ege, Y.; Şensoy, M.G.; Kalender O.; Nazlibilek, S.; Çitak H. (2013)
      All the sensors such as temperature, humidity, and pressure used in industry provide analog outputs as inputs for their control units. Wireless transmission of the data has advantages on wired transmission such as USB port, ...
    • An overview of physical layer security with finite-alphabet signaling 

      Aghdam, Sina Rezaei; Nooraiepour, A.; Duman, Tolga M. (Institute of Electrical and Electronics Engineers Inc., 2019)
      Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing ...
    • Performance and computational analysis of polarization-adjusted convolutional (PAC) codes 

      Moradi, Mohsen (Bilkent University, 2022-06)
      We study the performance of sequential decoding of polarization-adjusted con- volutional (PAC) codes. We present a metric function that employs bit-channel mutual information and cutoff rate values as the bias values and ...
    • Polar code construction for non-binary source alphabets 

      Çaycı, Semih; Arıkan, Orhan; Arıkan, Erdal (IEEE, 2012)
      In this paper, approximation methods for binary polar code construction proposed by Tal and Vardy are extended to non-binary source alphabets. Additionally, a new approximation method that enables accurate polar code ...
    • Randomized convolutional and concatenated codes for the wiretap channel 

      Nooraiepour, Alireza (Bilkent University, 2016-10)
      Wireless networks are vulnerable to various kinds of attacks such as eavesdropping because of their open nature. As a result, security is one of the most important challenges that needs to be addressed for such networks. ...
    • Randomized convolutional codes for the wiretap channel 

      Nooraiepour, A.; Duman, T. M. (Institute of Electrical and Electronics Engineers Inc., 2017)
      We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as a way of confusing the eavesdropper over a wiretap channel. We describe optimal and practical sub-optimal decoders for ...
    • Randomized turbo codes for the wiretap channel 

      Nooraiepour, Alireza; Duman, Tolga M. (IEEE, 2017-12)
      We study application of parallel and serially concatenated convolutional codes known as turbo codes to the randomized encoding scheme introduced by Wyner for physical layer security. For this purpose, we first study how ...
    • Short block length code design for interference channels 

      Sharifi, S.; Dabirnia, Mehdi; Tanç, A. K.; Duman, Tolga M. (IEEE, 2016)
      We focus on short block length code design for Gaussian interference channels (GICs) using trellis-based codes. We employ two different decoding techniques at the receiver side, namely, joint maximum likelihood (JML) ...
    • Short length trellis-based codes for gaussian multiple-access channels 

      Ozcelikkale, A.; Duman, T. M. (Institute of Electrical and Electronics Engineers Inc., 2014)
      We focus on trellis-based joint code design for two-user Gaussian multiple-access channel (MAC) in the short block length regime. We propose a design methodology, provide specific code designs and report numerical performance ...