#### DMCA

## Blind Separation of Noisy Multivariate Data Using Second-Order Statistics (2005)

### Citations

7717 |
Matrix Analysis
- Horn, Johnson
- 1985
(Show Context)
Citation Context ...n possible to obtain the desired unitary factor, U, as any unitary matrix that diagonalizes RHX(r) for some time lag r. As pointed out in [3] it follows from the spectral theorem for normal matrices' =-=[9]-=- that the existence of a unitary matrix V is guaranteed such that for a nonzero time lag T, VHRHx(T)V= diag{di, ...,dk} (2.6) 'A normal matrix M, i.e. MMf=MHM, by the spectral theorem is unitarily dia... |

1851 |
Independent component analysis, a new concept? Signal processing
- Comon
- 1994
(Show Context)
Citation Context ...rmation, and other non-gaussian features. Some widely used methods for higher-order based source separation include contrast functions, cumulant matching [5][6][7], and independent component analysis =-=[8]-=-. In each the goal is to minimize some cost function measuring the higher-order dependencies between source signals. Non-Stationarity An additional potential characteristic of the source signals that ... |

1494 | An information-maximization approach to blind separation and blind deconvolution
- Bell, Sejnowski
- 1995
(Show Context)
Citation Context ... here # indicates the Moore-Penrose pseudo-inverse 70 with: P5.2 Maximum Information/Maximum Likelihood One possibility for the cost function, g(o), is the popular infomax cost function introduced in =-=[23]-=-. Here we maximize with respect to A, g(A) = H(h(A#X)) (5.3) where H(y) is the differential entropy for the vector of random processes y, H(y) = - j log(fy(y'))fy (y')dy' (5.4) and h): R"' " -+R"x' is... |

609 |
Maximum likelihood estimation from incomplete data via the EM algorithm (with Discussion).
- Dempster, Laird, et al.
- 1977
(Show Context)
Citation Context ...y')dy' (5.4) and h): R"' " -+R"x' is a finite. An equivalent approach estimate of P given X, i.e. squashing function for restricting the entropy to be [24] is to find P as the maximum likelihood [25] =-=[26]-=- P = max f(XIP) p (5.5) In both cases the distribution of the sources are assumed known in advance and the estimate P of the sources is found as the estimate that most resembles this distribution. 5.3... |

542 |
Detection of signals by information theoretic criteria
- Wax, Kailath
- 1985
(Show Context)
Citation Context ...ces are guaranteed to be distinct so that using Equation (2.11) will not work in practice regardless of the structure of Rx. Information theoretic approaches to this problem have been studied in [11],=-=[12]-=- and other methods in [13],[14]. In each, however, it has been assumed that either GGH is a scaled identity matrix as in (2.10), or that GGH is known a priori. To be robust in this estimation, so that... |

336 | A blind source separation technique using second-order statistics.
- Belouchrani, Abed-Meraim, et al.
- 1997
(Show Context)
Citation Context ...Regressive (AR) gaussian data show that SOON improves the quality of source separation in comparison to the standard second-order separation algorithms, i.e., Second-Order Blind Identification (SOBI) =-=[3]-=- and SecondOrder Non-Stationary (SONS) blind identification [4]. The sensitivity in performance of SONS and SOON to several algorithmic parameters is also displayed in these experiments. To reduce sen... |

277 | Independent Factor Analysis.
- Attias
- 1999
(Show Context)
Citation Context ...ndent auto-correlation functions, this second-order source of dependence can be used to unmix the sources. Some popular methods that take advantage of second-order statistics include, factor analysis =-=[1]-=-, Bayesian BSS [2], SOBI [3], and SONS [4]. Additionally a second-order method was developed in [17] that incorporated SOBI for use on low SNR data sets and cases where the signal order is unknown. In... |

170 | Infomax and maximum likelihood for blind source separation.
- Cardoso
- 1997
(Show Context)
Citation Context ...of random processes y, H(y) = - j log(fy(y'))fy (y')dy' (5.4) and h): R"' " -+R"x' is a finite. An equivalent approach estimate of P given X, i.e. squashing function for restricting the entropy to be =-=[24]-=- is to find P as the maximum likelihood [25] [26] P = max f(XIP) p (5.5) In both cases the distribution of the sources are assumed known in advance and the estimate P of the sources is found as the es... |

99 |
The airborne visible/infrared imaging spectrometer (AVIRIS). Remote Sens.
- Vane, Green, et al.
- 1993
(Show Context)
Citation Context ... Data 4.5.1 The AVIRIS instrument To compare the performance of SOON to that of PCA and NAPCA we have chosen a data set collected with the AVIRIS instrument used at the Jet Propulsion Laboratory [21] =-=[22]-=-. Aviris is 224 channel instrument that records frequencies ranging from 370 to 2500 nm which spans the visible to the mid-infrared bands. The images used here have been collected over Moffet Field, C... |

81 | Blind Separation of Instantaneous Mixture of Sources via the Gaussian Mutual
- Pham
- 2001
(Show Context)
Citation Context ...his domain, including kurtosis, mutual information, and other non-gaussian features. Some widely used methods for higher-order based source separation include contrast functions, cumulant matching [5]=-=[6]-=-[7], and independent component analysis [8]. In each the goal is to minimize some cost function measuring the higher-order dependencies between source signals. Non-Stationarity An additional potential... |

52 |
Enhancement of high spectral resolution remote-sensing data by noise-adjusted principal components transform
- Lee, Woodyatt, et al.
- 1990
(Show Context)
Citation Context ...The two classic methods most used in the remote sensing community for these purposes are Principal Component Analysis (PCA) and its extension, Noise Adjusted Principal Component Analysis (NAPCA) [19] =-=[20]-=-. 53 4.2 Principal Component Analysis (PCA) 4.2.1 The Method Principal component Analysis is a method for changing the coordinate system of a data set. Formally the process can be described as operati... |

26 | Maximum likelihood source separation by the expectation-maximization technique: Deterministic and stochastic implementation
- Belouchrani, Cardoso
- 1995
(Show Context)
Citation Context ...)fy (y')dy' (5.4) and h): R"' " -+R"x' is a finite. An equivalent approach estimate of P given X, i.e. squashing function for restricting the entropy to be [24] is to find P as the maximum likelihood =-=[25]-=- [26] P = max f(XIP) p (5.5) In both cases the distribution of the sources are assumed known in advance and the estimate P of the sources is found as the estimate that most resembles this distribution... |

22 | A Bayesian approach to blind source separation
- Rowe
- 2002
(Show Context)
Citation Context ...tion functions, this second-order source of dependence can be used to unmix the sources. Some popular methods that take advantage of second-order statistics include, factor analysis [1], Bayesian BSS =-=[2]-=-, SOBI [3], and SONS [4]. Additionally a second-order method was developed in [17] that incorporated SOBI for use on low SNR data sets and cases where the signal order is unknown. In each the cost fun... |

22 | A finite-step global convergence algorithm for the parameter estimation of multichannel MA processes, - Tong, Inouye, et al. - 1992 |

13 | On optimal source separation based on second and fourth order cumulants
- Cardoso, Bose, et al.
- 1996
(Show Context)
Citation Context ...n this domain, including kurtosis, mutual information, and other non-gaussian features. Some widely used methods for higher-order based source separation include contrast functions, cumulant matching =-=[5]-=-[6][7], and independent component analysis [8]. In each the goal is to minimize some cost function measuring the higher-order dependencies between source signals. Non-Stationarity An additional potent... |

6 | Noise Estimation and Compensation for Improved Characterization of Multivariate Processes - Blind - 2000 |

6 |
Heuristic Segmentation of NonStationary Time Series
- Fukuda, Stanley, et al.
(Show Context)
Citation Context ...the data set. The method applicable for this characterization depends on the type of data being analyzed. For time series data many heuristics exist for partitioning the data into stationary segments =-=[18]-=-. An algorithm that computes exact partitioning of the data into stationary segments scales4 as 0(2 -1), where T is the number of 4Consider a time series with T samples, then there exists T-1 position... |

5 |
Iterative Signal-Order and Noise Estimation for Multivariate Data, IEE Letters, (Accepted for publication
- Lee, Staelin
- 2001
(Show Context)
Citation Context ...atrix as in (2.10), or that GGH is known a priori. To be robust in this estimation, so that we may use the less restrictive noise model of this thesis, we adopt a method outlined in the ION algorithm =-=[16]-=- which utilizes a scree plot. The scree plot used here displays the log magnitude-ordered eigenvalues of the sample correlation matrix for the data matrix X as a function of eigenvector number. In Fig... |

1 |
Iterative technique for blind source separation using fourth order cumulants
- Cardoso
- 1992
(Show Context)
Citation Context ... domain, including kurtosis, mutual information, and other non-gaussian features. Some widely used methods for higher-order based source separation include contrast functions, cumulant matching [5][6]=-=[7]-=-, and independent component analysis [8]. In each the goal is to minimize some cost function measuring the higher-order dependencies between source signals. Non-Stationarity An additional potential ch... |

1 |
On detection of the number of singals in presence of white noise
- Zhao, Bai
(Show Context)
Citation Context ...matrices are guaranteed to be distinct so that using Equation (2.11) will not work in practice regardless of the structure of Rx. Information theoretic approaches to this problem have been studied in =-=[11]-=-,[12] and other methods in [13],[14]. In each, however, it has been assumed that either GGH is a scaled identity matrix as in (2.10), or that GGH is known a priori. To be robust in this estimation, so... |

1 |
A new look at the statistical model identification," ieeetaucon, vol
- Akaile
(Show Context)
Citation Context ...istinct so that using Equation (2.11) will not work in practice regardless of the structure of Rx. Information theoretic approaches to this problem have been studied in [11],[12] and other methods in =-=[13]-=-,[14]. In each, however, it has been assumed that either GGH is a scaled identity matrix as in (2.10), or that GGH is known a priori. To be robust in this estimation, so that we may use the less restr... |

1 |
Estimating the dimension of a model," 4nn
- Schwartz
- 1978
(Show Context)
Citation Context ...ct so that using Equation (2.11) will not work in practice regardless of the structure of Rx. Information theoretic approaches to this problem have been studied in [11],[12] and other methods in [13],=-=[14]-=-. In each, however, it has been assumed that either GGH is a scaled identity matrix as in (2.10), or that GGH is known a priori. To be robust in this estimation, so that we may use the less restrictiv... |

1 | Iterative Blind Separation of Gaussian Data of Unknown Order - Mueller - 2003 |

1 |
A transformation for ordering multipsectral data in terms of image quality with implications for noise removal
- Green, Berman, et al.
- 1988
(Show Context)
Citation Context ...ion. The two classic methods most used in the remote sensing community for these purposes are Principal Component Analysis (PCA) and its extension, Noise Adjusted Principal Component Analysis (NAPCA) =-=[19]-=- [20]. 53 4.2 Principal Component Analysis (PCA) 4.2.1 The Method Principal component Analysis is a method for changing the coordinate system of a data set. Formally the process can be described as op... |

1 |
for Research in Security Prices. Accessed
- Center
- 2004
(Show Context)
Citation Context ...its, merges, and all other cash flows to share holders so that such artifacts would not factor in the resulting pricing behavior. The data was obtained from the Center for Research in Security Prices =-=[27]-=- and provided by Wharton Research Data Services [28]. Here the objective was to obtain the independent components detected by SOON and establish their utility in predicting future pricing behavior and... |

1 |
Research Data Services Accessed
- Wharton
- 2004
(Show Context)
Citation Context ...rs so that such artifacts would not factor in the resulting pricing behavior. The data was obtained from the Center for Research in Security Prices [27] and provided by Wharton Research Data Services =-=[28]-=-. Here the objective was to obtain the independent components detected by SOON and establish their utility in predicting future pricing behavior and explaining market dynamics. A scree plot containing... |