275 research outputs found

    Positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions

    Get PDF
    The paper deals with the existence and multiplicity of positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions. The main tool used in the proof is fixed point index theory in cone. Some limit type conditions for ensuring the existence of positive solutions are given

    A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems

    Get PDF
    Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance difference between a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. Specifically, it makes use of properly designed training signals to degrade channel estimation at the UR which in turn limits the UR's eavesdropping capability during data transmission. In this paper, we propose a new two-way training scheme for DCE through exploiting a whitening-rotation (WR) based semiblind method. To characterize the performance of DCE, a closed-form expression of the normalized mean squared error (NMSE) of the channel estimation is derived for both the LR and the UR. Furthermore, the developed analytical results on NMSE are utilized to perform optimal power allocation between the training signal and artificial noise (AN). The advantages of our proposed DCE scheme are two folds: 1) compared to the existing DCE scheme based on the linear minimum mean square error (LMMSE) channel estimator, the proposed scheme adopts a semiblind approach and achieves better DCE performance; 2) the proposed scheme is robust against active eavesdropping with the pilot contamination attack, whereas the existing scheme fails under such an attack.Comment: accepted for publication in IEEE Transactions on Communication

    Nonnegative Matrix Factorization Applied to Nonlinear Speech and Image Cryptosystems

    Full text link
    Nonnegative matrix factorization (NMF) is widely used in signal separation and image compression. Motivated by its successful applications, we propose a new cryptosystem based on NMF, where the nonlinear mixing (NLM) model with a strong noise is introduced for encryption and NMF is used for decryption. The security of the cryptosystem relies on following two facts: 1) the constructed multivariable nonlinear function is not invertible; 2) the process of NMF is unilateral, if the inverse matrix of the constructed linear mixing matrix is not nonnegative. Comparing with Lin\u27s method (2006) that is a theoretical scheme using one-time padding in the cryptosystem, our cipher can be used repeatedly for the practical request, i.e., multitme padding is used in our cryptosystem. Also, there is no restriction on statistical characteristics of the ciphers and the plaintexts. Thus, more signals can be processed (successfully encrypted and decrypted), no matter they are correlative, sparse, or Gaussian. Furthermore, instead of the number of zero-crossing-based method that is often unstable in encryption and decryption, an improved method based on the kurtosis of the signals is introduced to solve permutation ambiguities in waveform reconstruction. Simulations are given to illustrate security and availability of our cryptosystem

    Blind extraction using fractional lower-order statistics

    Full text link
    In traditional method to blindly extract interesting source signals sequentially, the second-order or higher-order statistics of signals are often utilized. However, for impulsive sources, both of the second-order and higher-order statistics may degenerate. Therefore, it is necessary to exploit new method for the blind extraction of impulsive sources. Based on the best compression-reconstruction principle, a novel model is proposed in this work, together with the corresponding algorithm. The proposed method can be used for blind extraction of sources which are distributed from alpha stable process. Simulations are given to illustrate availability and robustness of our algorithm
    • …
    corecore