298 research outputs found
Positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions
The paper deals with the existence and multiplicity of positive solutions for a system of higher-order singular nonlinear fractional differential equations with nonlocal boundary conditions. The main tool used in the proof is fixed point index theory in cone. Some limit type conditions for ensuring the existence of positive solutions are given
A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems
Discriminatory channel estimation (DCE) is a recently developed strategy to
enlarge the performance difference between a legitimate receiver (LR) and an
unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless
system. Specifically, it makes use of properly designed training signals to
degrade channel estimation at the UR which in turn limits the UR's
eavesdropping capability during data transmission. In this paper, we propose a
new two-way training scheme for DCE through exploiting a whitening-rotation
(WR) based semiblind method. To characterize the performance of DCE, a
closed-form expression of the normalized mean squared error (NMSE) of the
channel estimation is derived for both the LR and the UR. Furthermore, the
developed analytical results on NMSE are utilized to perform optimal power
allocation between the training signal and artificial noise (AN). The
advantages of our proposed DCE scheme are two folds: 1) compared to the
existing DCE scheme based on the linear minimum mean square error (LMMSE)
channel estimator, the proposed scheme adopts a semiblind approach and achieves
better DCE performance; 2) the proposed scheme is robust against active
eavesdropping with the pilot contamination attack, whereas the existing scheme
fails under such an attack.Comment: accepted for publication in IEEE Transactions on Communication
Nonnegative Matrix Factorization Applied to Nonlinear Speech and Image Cryptosystems
Nonnegative matrix factorization (NMF) is widely used in signal separation and image compression. Motivated by its successful applications, we propose a new cryptosystem based on NMF, where the nonlinear mixing (NLM) model with a strong noise is introduced for encryption and NMF is used for decryption. The security of the cryptosystem relies on following two facts: 1) the constructed multivariable nonlinear function is not invertible; 2) the process of NMF is unilateral, if the inverse matrix of the constructed linear mixing matrix is not nonnegative. Comparing with Lin\u27s method (2006) that is a theoretical scheme using one-time padding in the cryptosystem, our cipher can be used repeatedly for the practical request, i.e., multitme padding is used in our cryptosystem. Also, there is no restriction on statistical characteristics of the ciphers and the plaintexts. Thus, more signals can be processed (successfully encrypted and decrypted), no matter they are correlative, sparse, or Gaussian. Furthermore, instead of the number of zero-crossing-based method that is often unstable in encryption and decryption, an improved method based on the kurtosis of the signals is introduced to solve permutation ambiguities in waveform reconstruction. Simulations are given to illustrate security and availability of our cryptosystem
Blind extraction using fractional lower-order statistics
In traditional method to blindly extract interesting source signals sequentially, the second-order or higher-order statistics of signals are often utilized. However, for impulsive sources, both of the second-order and higher-order statistics may degenerate. Therefore, it is necessary to exploit new method for the blind extraction of impulsive sources. Based on the best compression-reconstruction principle, a novel model is proposed in this work, together with the corresponding algorithm. The proposed method can be used for blind extraction of sources which are distributed from alpha stable process. Simulations are given to illustrate availability and robustness of our algorithm
- …