Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 473-477.
• Big Data & Data Mining • Previous Articles Next Articles
HE Xiao-wen, HU Yi-fei, WANG Hai-ping, CHEN Mo
CLC Number:
[1]JOLLIFFE I T.Principal Component Analysis[J].Journal of Marketing Research,2002,25(4):513. [2]Gersho A,Gray R M.Vector quantization and signal compression[J].Springer International,1992,159(1):407-485. [3]LEE D D,SEUNG H S.Learning the parts of objects by nonnegative matrix factorization[J].Nature,2001,40I(6755):788-79I. [4]CHEN W S,ZHAO Y,PAN B,et al.Supervised kernel nonne-gative matrix factorization for face recognition[J].Neurocompu-ting,2016,205(C):165-181. [5]KITAMURA K,BANDO Y,ITOYAMA K,et al.Student’s t multichannel nonnegative matrix factorization for blind source separation[C]∥IEEE International Workshop on Acoustic Signal Enhancement.IEEE,2016:1-5. [6]KANG T G,KWON K,SHIN J W,et al.NMF-based Target Source Separation Using Deep Neural Network[J].IEEE Signal Processing Letters,2015,22(2):229-233. [7]FÉVOTTE C,DOBIGEON N.Nonlinear hyperspectral unmixing with robust nonnegative matrix factorization[J].IEEE Trans.Image Processing A Publication of the IEEE Signal Processing Society,2015,24(12):4810. [8]GILLIS N,KUANG D,PARK H.Hierarchical Clustering of Hyperspectral Images Using Rank-Two Nonnegative Matrix Factorization[J].IEEE Transactions on Geoscience & Remote Sensing,2013,53(4):2066-2078. [9]YOKOYA N,CHANUSSOT J,IWASAKI A.Nonlinear Unmi-xing of Hyperspectral Data Using Semi-Nonnegative Matrix Factorization[J].IEEE Transactions on Geoscience & Remote Sensing,2014,52(2):1430-1437. [10]PASCUAL-MONTANO A,CARAZO J M,KOCHI K,et al. Nonsmooth nonnegative matrix factorization (nsNMF)[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2006,28(3):403-415. [11]BUCAK S S,GUNSEL B.Incremental subspace learning via non-negative matrix factorization[J].Pattern Recognition,2009,42(5):788-797. [12]RAJABI R,GHASSEMIAN H.Sparsity Constrained Graph Regularized NMF for Spectral Unmixing of Hyperspectral Data[J].Journal of the Indian Society of Remote Sensing,2014,43(2):269-278. [13]ZHAO R,TAN V Y F.Online nonnegative matrix factorization with outliers[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2016:1-1. [14]YANG H L,HE G P.Online Face Recognition Algorithm via Nonnegative Matrix Factorization[J].Information Technology Journal,2010,9(8):1719-1724. [15]DANG S,CUI Z,CAO Z,et al.SAR target recognition via incremental nonnegative matrix factorization with Lp sparse constraint[J].Science Technology and Engineering,2017,10(3):0530-0534. [16]WU Y,SHEN B,LING H.Visual Tracking via Online Nonne-gative Matrix Factorization[J].IEEE Transactions on Circuits & Systems for Video Technology,2014,24(3):374-383. [17]CHEN R,LI H.Online algorithm for foreground detection based on incremental nonnegative matrix factorization[C]∥International Conference on Control,Automation and Robotics.IEEE,2016. [18]WENG J,ZHANG Y,HWANG W S.Candid Covariance-Free Incremental Principal Component Analysis[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2003,25(8):1034-1040. [19]LEE D D,SEUNG H S.Algorithms for non-negative matrix factorization.In NIPS[J].Advances in Neural Information Processing Systems,2000,13(6):556-562. [20]KIVINEN J,WARMUTH M K.Additive versus exponentiated gradient updates for linear prediction[C]∥Twenty-Seventh ACM Symposium on Theory of Computing.Las Vegas,Nevada,USA,DBLP,1995:209-218. [21]AMARI S I.Natural Gradient Works Efficiently in Learning [M]∥Unsupervised Learning.Bradford Company,1999:251-276. [22]HOYER P O.Non-negative sparse coding[C]∥IEEE Workshop on Neural Networks for Signal Processing.IEEE,2002:557-565. [23]HOYER P O.Non-negative Matrix Factorization with Sparseness Constraints[J].Journal of Machine Learning Research,2004,5(1):1457-1469. [24]BLANKERTZ B,MÜLLER K R,CURIO G,et al.The BCI Competition 2003:progress and perspectives in detection and discrimination of EEG single trials[J].IEEE Transactions on Bio-medical Engineering,2004,51(6):1044. [25]LAHIRI R,RAKSHIT A,KONAR A.Discriminating Motor Imagery EEG signals using an improvised regularised CSP algorithm[C]∥IEEE International Conference on Power Electro-nics,Intelligent Control and Energy Systems.IEEE,2017:1-6. |
[1] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[2] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[3] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[4] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[5] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[6] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[7] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[8] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[9] | FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23. |
[10] | ZHANG Li-qian, LI Meng-hang, GAO Shan-shan, ZHANG Cai-ming. Summary of Computer-assisted Tongue Diagnosis Solutions for Key Problems [J]. Computer Science, 2021, 48(7): 256-269. |
[11] | BAO Yu-xuan, LU Tian-liang, DU Yan-hui, SHI Da. Deepfake Videos Detection Method Based on i_ResNet34 Model and Data Augmentation [J]. Computer Science, 2021, 48(7): 77-85. |
[12] | CHEN Yang, WANG Jin-liang, XIA Wei, YANG Hao, ZHU Run, XI Xue-feng. Footprint Image Clustering Method Based on Automatic Feature Extraction [J]. Computer Science, 2021, 48(6A): 255-259. |
[13] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
[14] | DUAN Fei, WANG Hui-min, ZHANG Chao. Cauchy Non-negative Matrix Factorization for Data Representation [J]. Computer Science, 2021, 48(6): 96-102. |
[15] | LEI Jian-mei, ZENG Ling-qiu, MU Jie, CHEN Li-dong, WANG Cong, CHAI Yong. Reverse Diagnostic Method Based on Vehicle EMC Standard Test and Machine Learning [J]. Computer Science, 2021, 48(6): 190-195. |
|