Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 223, Issue COct 2024Current Issue
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:0165-1684
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
Reviews
review-article
Adaptive diffusion networks: An overview
Abstract

This work provides a comprehensive overview of adaptive diffusion networks, from the first papers published on the subject to state-of-the-art solutions and current challenges. These networks consist of a collection of agents that can measure and ...

Regular Articles
research-article
Data-driven output consensus for a class of discrete-time multiagent systems by reinforcement learning techniques
Abstract

The primary objective of this research paper is to examine the challenges associated with optimization and tracking control in discrete-time multiagent systems. This study begins by defining the optimal tracking control issue within the framework ...

Highlights

  • Policy gradient and Actor-Critic reinforcement learning for multiagent systems.
  • Our data-driven techniques boosts adaptability and agent consistency.
  • The ways improves coordination adaptability of agents, and minimizes overhead.

...
research-article
Windowed hypergraph Fourier transform and vertex-frequency representation
Abstract

In recent decades, many tools have been developed and applications have been made possible thanks to graph signal processing (GSP). In this scenario, relationships between elements always occur in pairs. Recently, this theory has been extended to ...

Highlights

  • A novel hypergraph Fourier transform that deals directly with one-dimensional signals is introduced.
  • A methodology to perform vertex-frequency analysis on hypergraphs is presented.
  • Experiments with path, cycle, squid, and random ...

research-article
Medical steganography: Enhanced security and image quality, and new S-Q assessment
Abstract

Medical diagnosing systems generate sensitive information involving the patient’s privacy. Steganography supports securely embedding secrecy, guaranteeing that an adversary cannot distinguish cover images and stego images. However, directly ...

Highlights

  • We propose MedSteGAN to learn embedding distortions for practical optimal embedding.
  • MedSteGAN provides an advanced framework to improve security and image quality.
  • MedSteGAN’s generator has a large receptive field to extract high-...

research-article
CFARnet: Deep learning for target detection with constant false alarm rate
Abstract

We consider the problem of target detection with a constant false alarm rate (CFAR). This constraint is crucial in many practical applications and is a standard requirement in classical composite hypothesis testing. In settings where classical ...

Highlights

  • Definition of a general framework for Bayesian and learning-based CFAR detectors.
  • Proving asymptotic equivalence to GLRT.
  • Introducing CFARnet - a practical CFAR deep learning approach.
  • Demonstration of the advantages of CFARnet ...

research-article
Collaborative trajectory planning and transmit resource scheduling for multiple target tracking in distributed radar network system with GTAR
Abstract

A reasonable resource management strategy can maximize the sensing performance of radar network system via adaptively controlling the working parameters of interest. In this paper, a collaborative trajectory planning and transmit resource ...

Highlights

  • Trajectory planning and resource scheduling for radar network with GTAR.
  • Transmit power with bandwidth and trajectory can be controlled jointly.
  • A solution technique integrated with the SDP, LHS and IPSOTS is proposed.

research-article
Quantity properties of variate and coefficient in errors-in-variables model under Gaussian noise
Highlights

  • More variates or coefficients are better for EIV/TLS problem.
  • Quantity properties confirmed by analytical derivation of CRB tool.
  • Additional variates and coefficients are encouraged for practical EIV system.
  • Simulated by CRB ...

Abstract

Total least-squares (TLS) aims to estimate the unknown parameters of an errors-in-variables (EIV) model from noisy observations when the coefficients are also perturbed by errors. It is helpful to know whether more variates and coefficients lead ...

research-article
Spatio-Temporal Articulation & Coordination Co-attention Graph Network for human motion prediction
Abstract

Human motion prediction, the task of forecasting future poses from a given observed sequence, is crucial for advancing human-centric computer vision. Significant progress has been made by employing fixed or adaptively learned spatiotemporal Graph ...

Highlights

  • Our approach leverages the physical and kinematic regularities of the motion system.
  • An attention mechanism learns weights for articulated, coordinated embeddings.
  • A multi-head temporal self-attention captures dependencies in ...

research-article
Proportionate affine projection tanh algorithm and its step-size optimization
Abstract

The problem of sparse adaptive system identification such as acoustic echo cancellation (AEC) needs robust adaptive filtering algorithms in the situation where the system is often corrupted by impulsive noise. To solve this problem this work ...

Highlights

  • This work proposes a proportionate affine projection tanh algorithm robust against impulsive noise.
  • The proportionate can speed convergence rate.
  • The steady-state performance and stability conditions are analyzed.
  • The step-size ...

research-article
Modified LMS and NLMS algorithms with non-negative weights
Abstract

Non-negative constraints arise in certain system identification problems when the systems to be identified have only positive coefficients. This paper studies the stochastic behavior of modified LMS and NLMS algorithms, modified so as to only ...

Highlights

  • Convergence of LMS and NLMS algorithms under non-negative weight constraints.
  • At each iteration, the weight vector is projected onto the feasible space.
  • The new algorithm optimally projects the weight vector onto the feasible set.

research-article
A non-convex low-rank image decomposition model via unsupervised network
Highlights

  • A joint non-convex low-rank constrained model with unsupervised networks is proposed for image decomposition.
  • The unsupervised network is first used for the image decomposition task to extract image information.
  • The non-convex ...

Abstract

Image decomposition is the separation of a given image into two parts with different features, i.e., structure and texture. In order to extract the image information comprehensively, a non-convex unsupervised image decomposition model is proposed ...

research-article
Robust augmented Volterra adaptive filtering
Highlights

  • This paper proposes a new nonlinear system model for signal processing and develops its corresponding adaptive algorithm.
  • This paper also gives a variant version of the proposed algorithm to reduce its complexity.
  • The performance ...

Abstract

In the field of nonlinear signal processing, Volterra filter is generally used as an effective tool. The utilization of the augmented model can make the filter maintain its merit in both circular and non-circular signals. From this point of view, ...

research-article
SAR target recognition through adaptive kernel sparse representation model based on local contrast perception
Abstract

Sparse representation-based methods have shown promising prospects in synthetic aperture radar (SAR) target recognition due to their robustness under complex application conditions. However, these methods are still susceptible to the feature ...

Highlights

  • Enhancing SAR target image description with local contrast perception.
  • Local contrast features promote kernel sparse representation classification.
  • Learning feature distribution to optimize parameters of sparse representation.
  • ...

research-article
A comparative study of deep learning and iterative algorithms for joint channel estimation and signal detection in OFDM systems
Abstract

Joint channel estimation and signal detection (JCESD) is crucial in orthogonal frequency division multiplexing (OFDM) systems, but traditional algorithms perform poorly in low signal-to-noise ratio (SNR) scenarios. Deep learning (DL) methods have ...

Highlights

  • We create a benchmark for the task of joint channel estimation and signal detection.
  • Deep learning methods perform better in the more challenging low-SNR setting.
  • The iterative algorithm outperforms in the high-SNR setting with ...

research-article
Inter-pulse amplitude-frequency-phase agile design for cognitive radar
Abstract

This article deals with the joint design of inter-pulse amplitude, phase and frequency to detect coexisting strong and weak targets in the presence of interference for cognitive radar. First, an amplitude–frequency-phase agile (AFPA) signal model ...

Highlights

  • Inter-pulse amplitude, frequency and phase agile waveform.
  • Inter-pulse agile design via CD-FTECA algorithm for minimizing WISL.
  • Developing a CD-ADMM framework to track the non-convex problem of minimizing WPSL.

research-article
Convex regularized recursive kernel risk-sensitive loss adaptive filtering algorithm and its performance analysis
Abstract

In the context of channel estimation amid non-Gaussian impulse noise, traditional non-kernel-space methods face challenges of divergence, while many kernel-space methods fail to fully exploit the a priori information embedded in the channel. To ...

Highlights

  • We introduce a recursive variant of the KRSL method, denoted as RKRSL. The recursive approach achieves faster convergence and robustness against non-Gaussian noise. We incorporate convex regularization constraints into the recursive ...

research-article
Infimal post-composition approach for composite convex optimization applied to image restoration
Abstract

In this paper we introduce a new approach for solving image restoration problems by using the infimal postcomposition of a convex function by a linear operator. We derive this formulation for general linear composite convex problems in Hilbert ...

Highlights

  • Use of infimal postcomposition of a convex function by a linear operator for solving inverse problems.
  • Globally weakly convergent algorithms based on the Douglas–Rachford splitting.
  • Explicit closed expression for the proximity ...

research-article
An efficient sub-aperture millimeter-wave imaging technique based on boundary-type MIMO array
Abstract

Millimeter-wave (MMW) 3-D imaging based on multiple-input-multiple-output (MIMO) radar has been widely studied due to its unique advantages in human security screening. However, more research has been done on the use of scanning 1-D MIMO array ...

Highlights

  • A fast imaging method based on boundary MIMO array is proposed.
  • The computational complexity of the proposed method is comprehensively analyzed.
  • The focusing error resulting from the proposed imaging method is analyzed.
  • ...

research-article
Cross-modal learning for optical flow estimation with events
Abstract

Benefiting from the low latency and high dynamic range, event cameras have recently been adopted for Optical Flow (OF) prediction under harsh environments with high-speed motion or extreme lighting conditions. However, the emitted events only ...

Highlights

  • Alleviating the imperfection of events by utilizing the spatiotemporal attention-based module.
  • Fully exploiting the cross-modal characteristics between frames and events.
  • Designing long-term motion information for global temporal ...

research-article
Perceptual authentication hashing for digital images based on multi-domain feature fusion
Abstract

In recent decades, numerous perceptual authentication hashing schemes have been proposed for image content authentication. However, most of these schemes are based on a single spatial or transform domain, and they fail to provide satisfactory ...

Highlights

  • A new robust perceptual hashing scheme for image authentication is proposed.
  • Multi-domain feature fusion strategy is exploited for hash sequence generation.
  • The channel filter and attention module are designed in frequency domain.

research-article
Cross-domain prototype similarity correction for few-shot radar modulation signal recognition
Abstract

The new classes of radar signals are increasingly difficult to acquire under non-cooperative environments, which makes it difficult to support convolutional neural network training with limited labeled samples. The few-shot learning (FSL) methods ...

Highlights

  • A CDPSC method is proposed for few-shot radar modulation signal recognition.
  • A domain prototype similarity mapping strategy improves the accuracy of prototypes.
  • The method improves feature extraction ability by extracting time-...

research-article
On the stochastic significance of peaks in the least-squares wavelet spectrogram and an application in GNSS time series analysis
Abstract

In this paper, the mathematical derivation of the underlying probability distribution function for the normalized least-squares wavelet spectrogram is presented. The impact of empirical and statistical weights on the estimation of the spectral ...

Highlights

  • The Least-Squares Wavelet Analysis (LSWA) of GNSS time series in Rome is presented.
  • The mathematical derivation of stochastic surfaces for spectrograms in LSWA is shown.
  • Considering statistical weights improved the accuracy of ...

research-article
Underwater image restoration based on progressive guidance
Abstract

Underwater images often suffer from local distortions during the imaging and transmission process, which can negatively impact their quality. Fortunately, it is possible to improve image quality by removing local distortion without making any ...

Highlights

  • Establishing a dataset containing common local distortions in underwater images.
  • Proposing a distortion localization and restoration framework for underwater images.
  • Creating a network for extracting global, distortion-free, and ...

Short Communications
rapid-communication
Joint track initiation of resolvable group target
Abstract

This paper studies the problem of resolvable group target track initiation (RGTI) and proposes a novel method to obtain the discrete association vectors and continuous trajectory parameters of individual targets within the group, which benefits ...

rapid-communication
Nonlinear subband adaptive filter based on Andrew’s sine estimator for Van der Pol system identification
Abstract

Echo cancellation has been effectively achieved through the successful application of subband adaptive filtering (SAF) algorithms. However, the performance of these algorithms may significantly deteriorate when the system exhibits nonlinear ...

rapid-communication
Massive MIMO secure beamforming design via manifold optimization combined with momentum
Abstract

Secure beamforming with constant modulus has been regarded as a promising solution in enhancing the physical-layer security by intelligently designing the antenna phase of massive multiple-input multiple-output (MIMO) devices. The resulting ...

Highlights

  • Provide an efficient and low-complexity method for massive MIMO secure beamforming.
  • Project the problem onto a manifold to solve it without relaxation.
  • Combine momentum and adaptive step size to accelerate convergence.
  • ...

Comments