22,095 research outputs found
Complex Independent Component Analysis of Frequency-Domain Electroencephalographic Data
Independent component analysis (ICA) has proven useful for modeling brain and
electroencephalographic (EEG) data. Here, we present a new, generalized method
to better capture the dynamics of brain signals than previous ICA algorithms.
We regard EEG sources as eliciting spatio-temporal activity patterns,
corresponding to, e.g., trajectories of activation propagating across cortex.
This leads to a model of convolutive signal superposition, in contrast with the
commonly used instantaneous mixing model. In the frequency-domain, convolutive
mixing is equivalent to multiplicative mixing of complex signal sources within
distinct spectral bands. We decompose the recorded spectral-domain signals into
independent components by a complex infomax ICA algorithm. First results from a
visual attention EEG experiment exhibit (1) sources of spatio-temporal dynamics
in the data, (2) links to subject behavior, (3) sources with a limited spectral
extent, and (4) a higher degree of independence compared to sources derived by
standard ICA.Comment: 21 pages, 11 figures. Added final journal reference, fixed minor
typo
Solutions to Detect and Analyze Online Radicalization : A Survey
Online Radicalization (also called Cyber-Terrorism or Extremism or
Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing
concern to the society, governments and law enforcement agencies around the
world. Research shows that various platforms on the Internet (low barrier to
publish content, allows anonymity, provides exposure to millions of users and a
potential of a very quick and widespread diffusion of message) such as YouTube
(a popular video sharing website), Twitter (an online micro-blogging service),
Facebook (a popular social networking website), online discussion forums and
blogosphere are being misused for malicious intent. Such platforms are being
used to form hate groups, racist communities, spread extremist agenda, incite
anger or violence, promote radicalization, recruit members and create virtual
organi- zations and communities. Automatic detection of online radicalization
is a technically challenging problem because of the vast amount of the data,
unstructured and noisy user-generated content, dynamically changing content and
adversary behavior. There are several solutions proposed in the literature
aiming to combat and counter cyber-hate and cyber-extremism. In this survey, we
review solutions to detect and analyze online radicalization. We review 40
papers published at 12 venues from June 2003 to November 2011. We present a
novel classification scheme to classify these papers. We analyze these
techniques, perform trend analysis, discuss limitations of existing techniques
and find out research gaps
TMS-evoked long-lasting artefacts: A new adaptive algorithm for EEG signal correction
OBJECTIVE:
During EEG the discharge of TMS generates a long-lasting decay artefact (DA) that makes the analysis of TMS-evoked potentials (TEPs) difficult. Our aim was twofold: (1) to describe how the DA affects the recorded EEG and (2) to develop a new adaptive detrend algorithm (ADA) able to correct the DA.
METHODS:
We performed two experiments testing 50 healthy volunteers. In experiment 1, we tested the efficacy of ADA by comparing it with two commonly-used independent component analysis (ICA) algorithms. In experiment 2, we further investigated the efficiency of ADA and the impact of the DA evoked from TMS over frontal, motor and parietal areas.
RESULTS:
Our results demonstrated that (1) the DA affected the EEG signal in the spatiotemporal domain; (2) ADA was able to completely remove the DA without affecting the TEP waveforms; (3). ICA corrections produced significant changes in peak-to-peak TEP amplitude.
CONCLUSIONS:
ADA is a reliable solution for the DA correction, especially considering that (1) it does not affect physiological responses; (2) it is completely data-driven and (3) its effectiveness does not depend on the characteristics of the artefact and on the number of recording electrodes.
SIGNIFICANCE:
We proposed a new reliable algorithm of correction for long-lasting TMS-EEG artifacts
Simultaneous diagonalisation of the covariance and complementary covariance matrices in quaternion widely linear signal processing
Recent developments in quaternion-valued widely linear processing have
established that the exploitation of complete second-order statistics requires
consideration of both the standard covariance and the three complementary
covariance matrices. Although such matrices have a tremendous amount of
structure and their decomposition is a powerful tool in a variety of
applications, the non-commutative nature of the quaternion product has been
prohibitive to the development of quaternion uncorrelating transforms. To this
end, we introduce novel techniques for a simultaneous decomposition of the
covariance and complementary covariance matrices in the quaternion domain,
whereby the quaternion version of the Takagi factorisation is explored to
diagonalise symmetric quaternion-valued matrices. This gives new insights into
the quaternion uncorrelating transform (QUT) and forms a basis for the proposed
quaternion approximate uncorrelating transform (QAUT) which simultaneously
diagonalises all four covariance matrices associated with improper quaternion
signals. The effectiveness of the proposed uncorrelating transforms is
validated by simulations on both synthetic and real-world quaternion-valued
signals.Comment: 41 pages, single column, 10 figure
Scheduling Policies in Time and Frequency Domains for LTE Downlink Channel: A Performance Comparison
A key feature of the Long-Term Evolution (LTE) system is that the packet scheduler can make use of the channel quality information (CQI), which is periodically reported by user equipment either in an aggregate form for the whole downlink channel or distinguished for each available subchannel. This mechanism allows for wide discretion in resource allocation, thus promoting the flourishing of several scheduling algorithms, with different purposes. It is therefore of great interest to compare the performance of such algorithms under different scenarios. Here, we carry out a thorough performance analysis of different scheduling algorithms for saturated User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) traffic sources, as well as consider both the time- and frequency-domain versions of the schedulers and for both flat and frequency-selective channels. The analysis makes it possible to appreciate the difference among the scheduling algorithms and to assess the performance gain, in terms of cell capacity, users' fairness, and packet service time, obtained by exploiting the richer, but heavier, information carried by subchannel CQI. An important part of this analysis is a throughput guarantee scheduler, which we propose in this paper. The analysis reveals that the proposed scheduler provides a good tradeoff between cell capacity and fairness both for TCP and UDP traffic sources
- …