• Title/Summary/Keyword: Single-blind method

Search Result 69, Processing Time 0.018 seconds

A Study on Blind Channel Equalization Based on Higher-Order Cumulants

  • Han, Soo-Whan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.6
    • /
    • pp.781-790
    • /
    • 2004
  • This paper presents a fourth-order cumulants based iterative algorithm for blind channel equalization. It is robust with respect to the existence of heavy Gaussian noise in a channel and does not require the minimum phase characteristic of the channel. In this approach, the transmitted signals at the receiver are over-sampled to ensure the channel described by a full-column rank matrix. It changes a single-input/single-output (SISO) finite-impulse response (FIR) channel to a single-input/multi-output (SIMO) channel. Based on the properties of the fourth-order cumulants of the over-sampled channel outputs, the iterative algorithm is derived to estimate the deconvolution matrix which makes the overall transfer matrix transparent, i.e., it can be reduced to the identity matrix by simple reordering and scaling. Both a closed-form and a stochastic version of the proposed algorithm are tested with three-ray multi-path channels in simulation studies, and their performances are compared with a method based on conventional second-order cumulants. Relatively good results are achieved, even when the transmitted symbols are significantly corrupted with Gaussian noise.

  • PDF

LP-Based Blind Adaptive Channel Identification and Equalization with Phase Offset Compensation

  • Ahn, Kyung-Sseung;Baik, Heung-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4C
    • /
    • pp.384-391
    • /
    • 2003
  • Blind channel identification and equalization attempt to identify the communication channel and to remove the inter-symbol interference caused by a communication channel without using any known trainning sequences. In this paper, we propose a blind adaptive channel identification and equalization algorithm with phase offset compensation for single-input multiple-output (SIMO) channel. It is based on the one-step forward multichannel linear prediction error method and can be implemented by an RLS algorithm. Phase offset problem, we use a blind adaptive algorithm called the constant modulus derotator (CMD) algorithm based on condtant modulus algorithm (CMA). Moreover, unlike many known subspace (SS) methods or cross relation (CR) methods, our proposed algorithms do not require channel order estimation. Therefore, our algorithms are robust to channel order mismatch.

Blind channel equalization using fourth-order cumulants and a neural network

  • Han, Soo-whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.1
    • /
    • pp.13-20
    • /
    • 2005
  • This paper addresses a new blind channel equalization method using fourth-order cumulants of channel inputs and a three-layer neural network equalizer. The proposed algorithm is robust with respect to the existence of heavy Gaussian noise in a channel and does not require the minimum-phase characteristic of the channel. The transmitted signals at the receiver are over-sampled to ensure the channel described by a full-column rank matrix. It changes a single-input/single-output (SISO) finite-impulse response (FIR) channel to a single-input/multi-output (SIMO) channel. Based on the properties of the fourth-order cumulants of the over-sampled channel inputs, the iterative algorithm is derived to estimate the deconvolution matrix which makes the overall transfer matrix transparent, i.e., it can be reduced to the identity matrix by simple recordering and scaling. By using this estimated deconvolution matrix, which is the inverse of the over-sampled unknown channel, a three-layer neural network equalizer is implemented at the receiver. In simulation studies, the stochastic version of the proposed algorithm is tested with three-ray multi-path channels for on-line operation, and its performance is compared with a method based on conventional second-order statistics. Relatively good results, withe fast convergence speed, are achieved, even when the transmitted symbols are significantly corrupted with Gaussian noise.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

Multiple Mixed Modes: Single-Channel Blind Image Separation

  • Tiantian Yin;Yina Guo;Ningning Zhang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.858-869
    • /
    • 2023
  • As one of the pivotal techniques of image restoration, single-channel blind source separation (SCBSS) is capable of converting a visual-only image into multi-source images. However, image degradation often results from multiple mixing methods. Therefore, this paper introduces an innovative SCBSS algorithm to effectively separate source images from a composite image in various mixed modes. The cornerstone of this approach is a novel triple generative adversarial network (TriGAN), designed based on dual learning principles. The TriGAN redefines the discriminator's function to optimize the separation process. Extensive experiments have demonstrated the algorithm's capability to distinctly separate source images from a composite image in diverse mixed modes and to facilitate effective image restoration. The effectiveness of the proposed method is quantitatively supported by achieving an average peak signal-to-noise ratio exceeding 30 dB, and the average structural similarity index surpassing 0.95 across multiple datasets.

A DFT Deblurring Algorithm of Blind Blur Image (무정보 blur 이미지 복구를 위한 DFT 변환)

  • Moon, Kyung-Il;Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.517-524
    • /
    • 2011
  • This paper presents a fast blind deconvolution method that produces a deblurring result from a single image in only a few seconds. The high speed of our method is enabled by considering the Discrete Fourier Transform (DFT), and its relation to filtering and convolution, and fast computation of Moore-Penrose inverse matrix. How can we predict the behavior of an arbitrary filter, or even more to the point design a filter to achieve certain specifications. The idea is to study the frequency response of the filter. This concept leads to an useful convolution formula. A Matlab implementation of our method usually takes less than one minute to deblur an image of moderate size, while the deblurring quality is comparable.

  • PDF

Underdetermined Blind Source Separation from Time-delayed Mixtures Based on Prior Information Exploitation

  • Zhang, Liangjun;Yang, Jie;Guo, Zhiqiang;Zhou, Yanwei
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2179-2188
    • /
    • 2015
  • Recently, many researches have been done to solve the challenging problem of Blind Source Separation (BSS) problems in the underdetermined cases, and the “Two-step” method is widely used, which estimates the mixing matrix first and then extracts the sources. To estimate the mixing matrix, conventional algorithms such as Single-Source-Points (SSPs) detection only exploits the sparsity of original signals. This paper proposes a new underdetermined mixing matrix estimation method for time-delayed mixtures based on the receiver prior exploitation. The prior information is extracted from the specific structure of the complex-valued mixing matrix, which is used to derive a special criterion to determine the SSPs. Moreover, after selecting the SSPs, Agglomerative Hierarchical Clustering (AHC) is used to automaticly cluster, suppress, and estimate all the elements of mixing matrix. Finally, a convex-model based subspace method is applied for signal separation. Simulation results show that the proposed algorithm can estimate the mixing matrix and extract the original source signals with higher accuracy especially in low SNR environments, and does not need the number of sources before hand, which is more reliable in the real non-cooperative environment.

A Single Server-based Secure Electronic Sealed-Bid Auction Method (단일 서버 기반의 안전한 봉인경매 기법)

  • Lee, Keon-Myung;Kim, Dong-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.678-686
    • /
    • 2004
  • This paper presents a new method to securely conduct online sealed-bid auctions with a single auctioneer server The sealed-bid auctions have several vulnerable security problems when they are performed on the Internet. One of such problems is the trust establishment between an auctioneer and bidders who participate in an auction. Several online sealed-bid auction methods have been developed to address this trust problem. The proposed method solves the security problems that would happen in the sealed-bid auction using a blind signature scheme and a contract signature protocol. It prevents the auctioneer from illegally manipulating the bidders' bidding information, repudiating the reception of some bid, manipulating the auction period, and illegally adding or deleting bids. In addition, it keeps the bidders from modifying the bidding information after issuing their bid and doing intentional mistake to invalidate their own bid. The method can be easily implemented using the multiagent architecture.

A Study on the Electrical Discharge Blind Hole Tap Machining of STD11 with Copper Electrode (구리전극봉을 이용한 합금공구강재(STD11)의 비관통 방전 탭 가공에 관한 연구)

  • Park, In-Soo;Wang, Duck-Hyun;Kim, Gi-Tae
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.16 no.3
    • /
    • pp.38-44
    • /
    • 2017
  • The technology of electrical discharge tap machining may be appropriate for making thread out of highly brittle material. Especially, it is very difficult to machine tap with the traditional method if the brittle material has been hardened by quenching. In this study, the shape of electrical discharge blind hole tap machining was analyzed by discharge time, discharge current, and the flushing hole condition after quenched the tool steel of STD11 has discharged the tap shape with a screw-shaped copper(Cu) electrode. An experimental design was planned and analyzed by Taguchi robust experimental design. The result showed that the shape of the blind hole discharge tap was influenced by the flushing hole, discharge time, and discharge current. The most important factor of the processing conditions was found to be the discharge current. When blind hole EDM with a copper electrode with a flushing hole was conducted, the discharged shape was found to be smooth and the angle of the discharged tapped thread was also found to be close to the thread angle of $60^{\circ}$. As the values of discharge time and discharge current increased, the EDMed surface coarsened due to the increase of the single discharge energy and the shape of the thread collapsing.

Robust Spectrum Sensing for Blind Multiband Detection in Cognitive Radio Systems: A Gerschgorin Likelihood Approach

  • Qing, Haobo;Liu, Yuanan;Xie, Gang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1131-1145
    • /
    • 2013
  • Energy detection is a widely used method for spectrum sensing in cognitive radios due to its simplicity and accuracy. However, it is severely affected by the noise uncertainty. To solve this problem, a blind multiband spectrum sensing scheme which is robust to noise uncertainty is proposed in this paper. The proposed scheme performs spectrum sensing over the total frequency channels simultaneously rather than a single channel each time. To improve the detection performance, the proposal jointly utilizes the likelihood function combined with Gerschgorin radii of unitary transformed covariance matrix. Unlike the conventional sensing methods, our scheme does not need any prior knowledge of noise power or PU signals, and thus is suitable for blind spectrum sensing. In addition, no subjective decision threshold setting is required in our scheme, making it robust to noise uncertainty. Finally, numerical results based on the probability of detection and false alarm versus SNR or the number of samples are presented to validate the performance of the proposed scheme.