Learn More
The steady-state excess mean square error (EMSE) of the adaptive filtering under the maximum correntropy criterion (MCC) has been studied. For Gaussian noise case, we establish a fixed-point equation to solve the exact value of the steady-state EMSE, while for non-Gaussian noise case, we derive an approximate analytical expression for the steady-state EMSE,(More)
A novel higher order singular value decomposition (HOSVD)-based image fusion algorithm is proposed. The key points are given as follows: 1) Since image fusion depends on local information of source images, the proposed algorithm picks out informative image patches of source images to constitute the fused image by processing the divided subtensors rather(More)
Passive source localization is one of the issues in array signal processing fields. In some practical applications, the signals received by an array are the mixture of near-field and far-field sources, such as speaker localization using microphone arrays and guidance (homing) systems. To localize mixed near-field and far-field sources, this paper develops a(More)
In this paper, the problem of source localization in distributed multiple-input multiple-output (MIMO) radar using bistatic range measurements, which correspond to the sum of transmitter-to-target and target-to-receiver distances, is addressed. Our solution is based on the Lagrange programming neural network (LPNN), which is an analog neural computational(More)
The topic of probing waveform design has received considerable attention due to its numerous applications in active sensing. Apart from having the desirable property of constant magnitude, it is also anticipated that the designed sequence possesses low sidelobe autocorrelation and/or specified spectral shape. In this paper, the alternating direction method(More)
This paper develops a distributed dictionary learning algorithm for sparse representation of the data distributed across nodes of sensor networks, where the sensitive or private data are stored or there is no fusion center or there exists a big data application. The main contributions of this paper are: 1) we decouple the combined dictionary atom update and(More)
Secure relay and jammer selection for physical-layer security is studied in a wireless network with multiple intermediate nodes and eavesdroppers, where each intermediate node either helps to forward messages as a relay, or broadcasts noise as a jammer. We derive a closed-form expression for the secrecy outage probability (SOP), and we develop two relay and(More)