923 research outputs found

    Positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions

    Get PDF
    The paper deals with the existence and multiplicity of positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions. The main tool used in the proof is fixed point index theory in cone. Some limit type conditions for ensuring the existence of positive solutions are given

    Efficient Nonnegative Tucker Decompositions: Algorithms and Uniqueness

    Full text link
    Nonnegative Tucker decomposition (NTD) is a powerful tool for the extraction of nonnegative parts-based and physically meaningful latent components from high-dimensional tensor data while preserving the natural multilinear structure of data. However, as the data tensor often has multiple modes and is large-scale, existing NTD algorithms suffer from a very high computational complexity in terms of both storage and computation time, which has been one major obstacle for practical applications of NTD. To overcome these disadvantages, we show how low (multilinear) rank approximation (LRA) of tensors is able to significantly simplify the computation of the gradients of the cost function, upon which a family of efficient first-order NTD algorithms are developed. Besides dramatically reducing the storage complexity and running time, the new algorithms are quite flexible and robust to noise because any well-established LRA approaches can be applied. We also show how nonnegativity incorporating sparsity substantially improves the uniqueness property and partially alleviates the curse of dimensionality of the Tucker decompositions. Simulation results on synthetic and real-world data justify the validity and high efficiency of the proposed NTD algorithms.Comment: appears in IEEE Transactions on Image Processing, 201

    Blind extraction using fractional lower-order statistics

    Full text link
    In traditional method to blindly extract interesting source signals sequentially, the second-order or higher-order statistics of signals are often utilized. However, for impulsive sources, both of the second-order and higher-order statistics may degenerate. Therefore, it is necessary to exploit new method for the blind extraction of impulsive sources. Based on the best compression-reconstruction principle, a novel model is proposed in this work, together with the corresponding algorithm. The proposed method can be used for blind extraction of sources which are distributed from alpha stable process. Simulations are given to illustrate availability and robustness of our algorithm

    A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems

    Get PDF
    Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance difference between a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. Specifically, it makes use of properly designed training signals to degrade channel estimation at the UR which in turn limits the UR's eavesdropping capability during data transmission. In this paper, we propose a new two-way training scheme for DCE through exploiting a whitening-rotation (WR) based semiblind method. To characterize the performance of DCE, a closed-form expression of the normalized mean squared error (NMSE) of the channel estimation is derived for both the LR and the UR. Furthermore, the developed analytical results on NMSE are utilized to perform optimal power allocation between the training signal and artificial noise (AN). The advantages of our proposed DCE scheme are two folds: 1) compared to the existing DCE scheme based on the linear minimum mean square error (LMMSE) channel estimator, the proposed scheme adopts a semiblind approach and achieves better DCE performance; 2) the proposed scheme is robust against active eavesdropping with the pilot contamination attack, whereas the existing scheme fails under such an attack.Comment: accepted for publication in IEEE Transactions on Communication
    corecore