Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Space-time codes
Download
index.pdf
Date
2010
Author
Karaçayır, Murat
Metadata
Show full item record
Item Usage Stats
81
views
44
downloads
Cite This
The phenomenon of fading constitutes a fundamental problem in wireless communications. Researchers have proposed many methods to improve the reliability of communication over wireless channels in the presence of fading. Many studies on this topic have focused on diversity techniques. Transmit diversity is a common diversity type in which multiple antennas are employed at the transmitter. Space-time coding is a technique based on transmit diversity introduced by Tarokh et alii in 1998. In this thesis, various types of space-time codes are examined. Since they were originally introduced in the form of trellis codes, a major part is devoted to space-time trellis codes where the fundamental design criteria are established. Then, space-time block coding, which presents a different approach, is introduced and orthogonal spacetime block codes are analyzed in some detail. Lastly, rank codes from coding theory are studied and their relation to space-time coding are investigated.
Subject Keywords
Cryptography.
URI
http://etd.lib.metu.edu.tr/upload/12612028/index.pdf
https://hdl.handle.net/11511/19685
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Basic cryptanalysis methods on block ciphers
Çelik, Dilek; Doğanaksoy, Ali; Department of Cryptography (2010)
Differential cryptanalysis and linear cryptanalysis are the first significant methods used to attack on block ciphers. These concepts compose the keystones for most of the attacks in recent years. Also, while designing a cipher, these attacks should be taken into consideration and the cipher should be created as secure against them. Although di fferential cryptanalysis and linear cryptanalysis are still important, they started to be ine cient due to the improvements in the technology. So, these attacks are ...
On statistical analysis of synchronous stream ciphers
Sönmez Turan, Meltem; Doğanaksoy, Ali; Department of Cryptography (2008)
Synchronous stream ciphers constitute an important class of symmetric ciphers. After the call of the eSTREAM project in 2004, 34 stream ciphers with different design approaches were proposed. In this thesis, we aim to provide a general framework to analyze stream ciphers statistically. Firstly, we consider stream ciphers as pseudo random number generators and study the quality of their output. We propose three randomness tests based on one dimensional random walks. Moreover, we theoretically and experimenta...
Medium power-wideband envelope tracking RF power amplifier design
Şirin, Emre; Demir, Şimşek; Yüzer, Ahmet Hayrettin; Department of Electrical and Electronics Engineering (2015)
An inevitable trade-off between efficiency and linearity challenges RF researchers more than ever in today’s wireless communication systems. The reason is the tight linearity requirements of the high peak-to-average power ratio (PAPR) signals. Linearity is crucial because modern communication systems transmit non-constant envelope modulation signals. Efficiency is also crucial because portable systems have limited source of power and dissipated heat power increases cooling system cost. Various power amplifi...
Simulation and verification of security attacks on light-weight RFID protocols
Ahmed, Saman; Diker Yücel, Melek; Department of Cryptography (2014)
Radio Frequency Identification (RFID) technology is fast reaching all avenues of application. From retail to warehousing, tracking farm animals to monitoring medicine dosage in human body, traffic control to airport baggage control, it is penetrating all forums and industries and providing ease of deployment and automated visibility and management of inventories which was not possible with traditional barcodes. Along with its superiority over barcodes, RFID systems are also required to be costeffective to b...
Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours
Onur, Ertan; Delic, Hakan; Akarun, Lale (Elsevier BV, 2010-02-01)
For surveillance applications of wireless sensor networks, analysis of sensing coverage and quality of sensing is crucial. For rough terrains where obstacles block the sensing capability, region-based approaches must be employed to determine the sensing quality. In this paper, we present a method to determine the breach paths and the deployment quality defined as the minimum of the maximum detection probabilities on the breach paths in the presence of obstacles. We propose the utilization of watershed segme...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. Karaçayır, “Space-time codes,” M.S. - Master of Science, Middle East Technical University, 2010.