An Improved Independent Component Analysis with Reference

Article Preview

Abstract:

Independent component analysis with reference is a general framework to incorporate a priori information of interesting source signal into the cost function as constrained terms to form an augmented Lagrange function, and utilizes Newton method to optimize the cost function. It can extract any interesting source signal without extracting all source signals comparing with the traditional Independent component analysis method. In this paper, to accelerate the convergence speed of the Independent component analysis with reference, two improved algorithms are presented. The new algorithms, firstly whiten the observed signals to avoid matrix inverse operation to reduce algorithm complexity, secondly use improved Newton method with fast convergence speed to optimize cost function,in the end deduce the improved Independent component analysis with reference algorithms. Simulation result demonstrates the new algorithms have faster convergence speed with smaller error compared with the original method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

64-67

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] W Lu, J Rajapakse. 3rd international conference on independent component Analysis and blind source separation, San Diego, California, (2001). p.120.

Google Scholar

[2] W Lu, J Rajapakse. advances in neural information processing systems. (2000) , p.570.

Google Scholar

[3] L Qinghua, Z rongrui Y fuliang. Information sciences. vol. 177(2007) , p.1265.

Google Scholar

[4] Zhang Shoucheng, Liu Yongkai. Computer Engineering and applications. vol(48)(2012), p.130.

Google Scholar

[5] Li Changli, L Guisheng, S Yuli. Digital signal processing. vol. 20 (2010), p.575.

Google Scholar

[6] W Lu, J Rajapakse. IEEE Transactions on neural networks. vol. 16 (2005) , p.203.

Google Scholar

[7] S Zhangli. IEEE transactions on information forensics and security. vol. 6 (2011), p.360.

Google Scholar

[8] L Breuer, M Axer. Journal of Neuroscience methods. vol. 220 (2013), p.30.

Google Scholar

[9] W Zhiyang, C Jin, D Guangming. Mechanical systems and signal processing. vol. 25 (2011), p.2501.

Google Scholar

[10] W Xiao-feng. mathematics practice and theory, vol. 40 (2010) , p.216.

Google Scholar

[11] S Qifang, L Xiwen. Journal of Taizhou University, vol. 30(2008), p.1.

Google Scholar