[1]ZHOU Shuanghong,WANG Lingling.Research on multi-eigenvalue decomposition blind source separation algorithm for sparse chaotic signals[J].CAAI Transactions on Intelligent Systems,2018,13(5):843-847.[doi:10.11992/tis.201703032]
Copy

Research on multi-eigenvalue decomposition blind source separation algorithm for sparse chaotic signals

References:
[1] LIN Yancong, YANG Jiachen, LV Zhihan, et al. A self-assessment stereo capture model applicable to the internet of things[J]. Sensors, 2015, 15(8):20925-20944.
[2] YAN Gan, LV Yuxiang, WANG Qiyin, et al. Routing algorithm based on delay rate in wireless cognitive radio network[J]. Journal of networks, 2014, 9(4):948-955.
[3] WANG Ke, ZHOU X, LI Tonglin, et al. Optimizing load balancing and data-locality with data-aware scheduling[C]//IEEE International Conference on Big Data. Washington, DC, USA, 2014:119-128.
[4] ZHANG Liguo, HE Binghang, SUN Jianguo, et al. Double image multi-encryption algorithm based on fractional chaotic time series[J]. Journal of computational and theoretical nanoscience, 2015, 12(11):4980-4986.
[5] SU Tianyun, LV Zhihan, GAO Shan, et al. 3D seabed:3D modeling and visualization platform for the seabed[C]//Proceedings of 2014 IEEE International Conference on Multimedia and Expo Workshops. Chengdu, China, 2014:1-6.
[6] GENG Yishuang, CHEN Jin, FU Ruijun, et al. Enlighten wearable physiological monitoring systems:on-body RF characteristics based human motion classification using a support vector machine[J]. IEEE transactions on mobile computing, 2016, 15(3):656-671.
[7] LV Zhihan, HALAWANI A, FENG Shengzhong, et al. Multimodal hand and foot gesture interaction for handheld devices[J]. ACM transactions on multimedia computing, communications, and applications, 2014, 11(1S):Article No. 10.
[8] LIU Guanxiong, GENG Yishuang, PAHLAVAN K, et al. Effects of calibration RFID tags on performance of inertial navigation in indoor Environment[C]//International Conference on Computing, Networking and Communications. Garden Grove, CA, USA, 2015:196-200.
[9] HE Jie, GENG Yishuang, WAN Yadong, et al. A cyber physical test-bed for virtualization of RF access environment for body sensor network[J]. IEEE sensors journal, 2013, 13(10):3826-3836.
[10] HUANG Wenhua, GENG Yishuang. Identification method of attack path based on immune intrusion detection[J]. Journal of networks, 2014, 9(4):964-971.
Similar References:

Memo

-

Last Update: 2018-10-25

Copyright © CAAI Transactions on Intelligent Systems