{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:29:52Z","timestamp":1729664992039,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/iwobi.2018.8464195","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:48:06Z","timestamp":1536875286000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Objective Operator for Optimal Compression and De-compression of Random Signals"],"prefix":"10.1109","author":[{"given":"Pablo","family":"Soto-Quiros","sequence":"first","affiliation":[]},{"given":"Anatoli","family":"Torokhti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1109\/ICC.2012.6364234","article-title":"Distributed PCA-based anomaly detection in telephone networks through legitimate-user profiling","author":"dusi","year":"2012","journal-title":"IEEE International Conference on Communications (ICC)"},{"journal-title":"Introduction to Statistical Pattern Recognition (2nd ed )","year":"1990","author":"fukunaga","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2011839"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2162954"},{"journal-title":"Linear Algebra ser Dover books on advanced mathematics","year":"1977","author":"shilov","key":"ref37"},{"journal-title":"Introduction to Machine Learning ser Adaptive Computation and Machine Learning","year":"2004","author":"alpaydin","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249039"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248433"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2415-14-110"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JTEHM.2014.2381213"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2007.907926"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-syb.2015.0031"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885449"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(91)90058-Q"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/78.905856"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/78.485932"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719246"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2556714"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2005.1499278"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.837400"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/ASP.2005.3206"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.122112.120165"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2014.03.012"},{"key":"ref5","article-title":"Optimal transforms of random vectors","author":"soto-quiros","year":"2018","journal-title":"Flinders University of South Australia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2014.2357340"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/ng.139"},{"journal-title":"Statistical Signal Processing Detection Estimation and Time Series Analysis ser Addison-Wesley series in electrical and computer engineering","year":"1991","author":"scharf","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2008.923854"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420050035"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/97.681430","article-title":"Generalized Karhunen-Loeve transform","volume":"5","author":"hua","year":"1998","journal-title":"IEEE Signal Processing Letters"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/78.917807"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/82.924074"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018329"},{"key":"ref23","volume":"212","author":"torokhti","year":"2007","journal-title":"Computational Methods for Modelling of Nonlinear Systems ser Mathematics in Science and Engineering"},{"key":"ref26","first-page":"1","article-title":"Widely linear estimation of oscillator phase noise with rank reduction","author":"ishaque","year":"2015","journal-title":"Vehicular Technology Conference (VTC Spring) 2015 IEEE 81st"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839538"}],"event":{"name":"2018 IEEE International Work Conference on Bioinspired Intelligence (IWOBI)","start":{"date-parts":[[2018,7,18]]},"location":"San Carlos","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE International Work Conference on Bioinspired Intelligence (IWOBI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8451008\/8464128\/08464195.pdf?arnumber=8464195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T03:15:41Z","timestamp":1693883741000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8464195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iwobi.2018.8464195","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}