2,672 research outputs found

    Transmit design for MIMO wiretap channel with a malicious jammer

    Full text link
    In this paper, we consider the transmit design for multi-input multi-output (MIMO) wiretap channel including a malicious jammer. We first transform the system model into the traditional three-node wiretap channel by whitening the interference at the legitimate user. Additionally, the eavesdropper channel state information (ECSI) may be fully or statistically known, even unknown to the transmitter. Hence, some strategies are proposed in terms of different levels of ECSI available to the transmitter in our paper. For the case of unknown ECSI, a target rate for the legitimate user is first specified. And then an inverse water-filling algorithm is put forward to find the optimal power allocation for each information symbol, with a stepwise search being used to adjust the spatial dimension allocated to artificial noise (AN) such that the target rate is achievable. As for the case of statistical ECSI, several simulated channels are randomly generated according to the distribution of ECSI. We show that the ergodic secrecy capacity can be approximated as the average secrecy capacity of these simulated channels. Through maximizing this average secrecy capacity, we can obtain a feasible power and spatial dimension allocation scheme by using one dimension search. Finally, numerical results reveal the effectiveness and computational efficiency of our algorithms.Comment: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Artificial Noise-Aided Biobjective Transmitter Optimization for Service Integration in Multi-User MIMO Gaussian Broadcast Channel

    Full text link
    This paper considers an artificial noise (AN)-aided transmit design for multi-user MIMO systems with integrated services. Specifically, two sorts of service messages are combined and served simultaneously: one multicast message intended for all receivers and one confidential message intended for only one receiver and required to be perfectly secure from other unauthorized receivers. Our interest lies in the joint design of input covariances of the multicast message, confidential message and artificial noise (AN), such that the achievable secrecy rate and multicast rate are simultaneously maximized. This problem is identified as a secrecy rate region maximization (SRRM) problem in the context of physical-layer service integration. Since this bi-objective optimization problem is inherently complex to solve, we put forward two different scalarization methods to convert it into a scalar optimization problem. First, we propose to prefix the multicast rate as a constant, and accordingly, the primal biobjective problem is converted into a secrecy rate maximization (SRM) problem with quality of multicast service (QoMS) constraint. By varying the constant, we can obtain different Pareto optimal points. The resulting SRM problem can be iteratively solved via a provably convergent difference-of-concave (DC) algorithm. In the second method, we aim to maximize the weighted sum of the secrecy rate and the multicast rate. Through varying the weighted vector, one can also obtain different Pareto optimal points. We show that this weighted sum rate maximization (WSRM) problem can be recast into a primal decomposable form, which is amenable to alternating optimization (AO). Then we compare these two scalarization methods in terms of their overall performance and computational complexity via theoretical analysis as well as numerical simulation, based on which new insights can be drawn.Comment: 14 pages, 5 figure

    A WENO Algorithm of the Temperature and Ionization Profiles around a Point Source

    Full text link
    We develop a numerical solver for radiative transfer problems based on the weighted essentially nonoscillatory (WENO) scheme modified with anti-diffusive flux corrections, in order to solve the temperature and ionization profiles around a point source of photons in the reionization epoch. Algorithms for such simulation must be able to handle the following two features: 1. the sharp profiles of ionization and temperature at the ionizing front (I-front) and the heating front (T-front), and 2. the fraction of neutral hydrogen within the ionized sphere is extremely small due to the stiffness of the rate equations of atom processes. The WENO scheme can properly handle these two features, as it has been shown to have high order of accuracy and good convergence in capturing discontinuities and complicated structures in fluid as well as to be significantly superior over piecewise smooth solutions containing discontinuities. With this algorithm, we show the time-dependence of the preheated shell around a UV photon source. In the first stage the I-front and T-front are coincident, and propagate with almost the speed of light. In later stage, when the frequency spectrum of UV photons is hardened, the speeds of propagation of the ionizing and heating fronts are both significantly less than the speed of light, and the heating front is always beyond the ionizing front. In the spherical shell between the I- and T-fronts, the IGM is heated, while atoms keep almost neutral. The time scale of the preheated shell evolution is dependent on the intensity of the photon source. We also find that the details of the pre-heated shell and the distribution of neutral hydrogen remained in the ionized sphere are actually sensitive to the parameters used. The WENO algorithm can provide stable and robust solutions to study these details.Comment: 24 pages, 7 figures, accepted in New Astronom

    Amending coherence-breaking channels via unitary operations

    Full text link
    The coherence-breaking channels play a significant role in quantum information theory. We study the coherence-breaking channels and give a method to amend the coherence-breaking channels by applying unitary operations. For given incoherent channel Φ\Phi, we give necessary and sufficient conditions for the channel to be a coherence-breaking channel and amend it via unitary operations. For qubit incoherent channels Φ\Phi that are not coherence-breaking ones, we consider the mapping ΦΦ\Phi\circ\Phi and present the conditions for coherence-breaking and channel amendment as well.Comment: 8 page

    Is interleukin-18 associated with polycystic ovary syndrome?

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Recent research show that polycystic ovary syndrome (PCOS) may have an association with low-grade chronic inflammation, IL-18 is considered as a strong risk marker of inflammation.</p> <p>Methods</p> <p>To investigate serum IL-18 concentrations in PCOS patients and focus on its relationship between obesity and insulin resistance (IR). Sixty consecutive women with PCOS and thirty controls were recruited. Serum level of IL-18 and fasting blood glucose, fasting insulin, follicle-stimulating hormone (FSH), luteinizing hormone (LH) and testosterone (T) were measured.</p> <p>Results</p> <p>Serum levels of IL-18 was significantly higher in the PCOS group than in the control group. Serum level of IL-18 was higher in the PCOS group with IR than in the PCOS group without IR. Serum level of IL-18 was higher in obese PCOS patients than in lean PCOS patients. Serum level of IL-18 was higher in lean PCOS patients than in the lean control group. Serum level of IL-18 in the PCOS group was positively related to BMI, IR index and T.</p> <p>Conclusion</p> <p>IL-18 level was increased in PCOS patients, and correlated with insulin resistance, obesity and hyperandrogenism.</p

    Probing Half-odd Topological Number with Cold Atoms in a Non-Abelian Optical Lattice

    Full text link
    We propose an experimental scheme to probe the contribution of a single Dirac cone to the Hall conductivity as half-odd topological number sequence. In our scheme, the quantum anomalous Hall effect as in graphene is simulated with cold atoms trapped in an optical lattice and subjected to a laser-induced non-Abelian gauge field. By tuning the laser intensity to change the gauge flux, the energies of the four Dirac points in the first Brillouin zone are shifted with each other and the contribution of the single Dirac cone to the total atomic Hall conductivity is manifested. We also show such manifestation can be experimentally probed with atomic density profile measurements.Comment: 5 pages, 3 figure
    corecore