期刊文献+

FastICA算法改进及仿真实验

Improvement and Simulation of FastICA
下载PDF
导出
摘要 由于收敛速度快,快速独立分量分析(FastICA)被普遍运用,但为克服FastICA对初始值的选择较敏感的缺点,提出了将具有五阶收敛速度的牛顿迭代法和带有阻尼因子的牛顿迭代法引到算法中,形成两种方法有机结合的改进算法,并将改进的算法应用到仿真实验中,从而提高算法的稳定性. The FastICA was widely used in because of its fast convergence property.In order to overcome its shortcoming of sensitivity to initial value problem,the Newton iterative method with five order convergence speed and with a damping factor of the Newton iterative method was proposed.The two methods were combined to form the final improvement algorithm,so the performance of the algorithm is improved.
出处 《佳木斯大学学报(自然科学版)》 CAS 2013年第4期579-581,585,共4页 Journal of Jiamusi University:Natural Science Edition
关键词 独立分量分析 牛顿迭代 阻尼因子 ICA Newton iteration damping factor
  • 相关文献

参考文献7

二级参考文献25

  • 1钟静,傅彦.基于快速ICA的混合语音信号分离[J].计算机应用,2006,26(5):1120-1121. 被引量:12
  • 2XU Zhong DAI Guanzhong YANG Deming.An Efficient ECDSA-Based Signature Scheme for Wireless Networks[J].Wuhan University Journal of Natural Sciences,2006,11(6):1707-1710. 被引量:4
  • 3Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//Proc of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press, 1996:48-57. 被引量:1
  • 4Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Eurocrypt' 82.Burg Feuerstein, Germany: Plenum Press, 1983 : 199-203. 被引量:1
  • 5Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Washington:IEEE Computer Society, 2000: 273-277. 被引量:1
  • 6Tan Zhuo-wen, Liu Zuo-jun, Tang Chun-ming.Digital proxy blind signature schemes based on DLP and ECDLP[J].MM Research Preprints,2002,21(7) :212-217. 被引量:1
  • 7Zhang F G, Safavi-Naini R, Lin C Y.New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings[EB/OL]. (2003-5-29) .http ://eprint.iacr.org/2003/104. 被引量:1
  • 8Li Ji-guo, Wang Shu-hong.New efficient proxy blind signature scheme using verifiable self-certified public key[J].International Journal of Network Security,2007,4(2):193-200. 被引量:1
  • 9Thi H N, Jutten C. Blind Source Separation for Convolutive Mixtures[J]. Signal Processing. 1995, 45(2) :209-229. 被引量:1
  • 10Lee T W,Bell A J, Lambert R H. Blind Separation of Delayed and Convolved Sources[J]. Advances in Neural Information Processing Systems. 1997,9 : 758-764. 被引量:1

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部