You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

16 May 2024

Weighted Robust Tensor Principal Component Analysis for the Recovery of Complex Corrupted Data in a 5G-Enabled Internet of Things †

,
and
1
Department of Electronic Engineering, Soongsil University, Seoul 06978, Republic of Korea
2
School of Electronic Engineering, Soongsil University, Seoul 06978, Republic of Korea
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2023 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 11–13 October 2023.

Abstract

Technological developments coupled with socioeconomic changes are driving a rapid transformation of the fifth-generation (5G) cellular network landscape. This evolution has led to versatile applications with fast data-transfer capabilities. The integration of 5G with wireless sensor networks (WSNs) has rendered the Internet of Things (IoTs) crucial for measurement and sensing. Although 5G-enabled IoTs are vital, they face challenges in data integrity, such as mixed noise, outliers, and missing values, owing to various transmission issues. Traditional methods such as the tensor robust principal component analysis (TRPCA) have limitations in preserving essential data. This study introduces an enhanced approach, the weighted robust tensor principal component analysis (WRTPCA), combined with weighted tensor completion (WTC). The new method enhances data recovery using tensor singular value decomposition (t-SVD) to separate regular and abnormal data, preserve significant components, and robustly address complex data corruption issues, such as mixed noise, outliers, and missing data, with the globally optimal solution determined through the alternating direction method of multipliers (ADMM). Our study is the first to address complex corruption in multivariate data using the WTRPCA. The proposed approach outperforms current techniques. In all corrupted scenarios, the normalized mean absolute error (NMAE) of the proposed method is typically less than 0.2, demonstrating strong performance even in the most challenging conditions in which other models struggle. This highlights the effectiveness of the proposed approach in real-world 5G-enabled IoTs.

1. Introduction

The appearance of fifth-generation (5G) technology, which is capable of integrated communication, presents an excellent opportunity to promote resource management that is informed, sustainable, and robust. This technology provides real-time data on the environmental impacts of different behaviors, opening new possibilities for in-depth analytics. The ability to monitor and control systems quickly has facilitated the creation of intelligent environments. In this context, the Internet of Things (IoT) is expected to emerge as a vital component of 5G applications, particularly in the sensing and monitoring domains [,]. The IoT is explicitly designed for massive machine-type communication (mMTC) applications [], which emphasizes its significance in the changing world of 5G technologies.
The IoT is crucial in various fields ranging from environmental monitoring [,,] to healthcare systems [,]. These networks offer a cost-effective means of sensing, collecting, and processing environmental information. However, the deployment of IoTs exposes them to potential data corruption resulting from factors such as device failure, signal interference, and adverse environmental conditions []. Consequently, reconstructing corrupt data has become crucial for maintaining the precision and reliability of information collected by IoTs in 5G networks.
A key consideration in addressing the challenges of data reconstruction is gathering real IoT data. Typically, most recently developed WSN appliances utilize sensors with multiple sensing units to detect different variables such as temperature, pressure, O2, and NO2 []. Therefore, sensor nodes often collect data with multiple attributes, resulting in multivariate data. In addition, the collected data exhibited spatiotemporal and multivariate correlations. The correlations among these attributes can be leveraged to enhance data reconstruction performance. Despite this promising direction, only one work has delved into multivariate data reconstruction in the IoT [], with limited success.
Using a tensor structure is beneficial for data reconstruction and demonstrates proficiency in harnessing spatiotemporal correlations, particularly for multivariate data. Consequently, traditional methods such as tensor completion (TC) and the tensor robust principal component analysis (TRPCA) [,] have been widely employed for both univariate and multivariate data reconstruction. However, these approaches have limitations. They often ignore differences in singular values, treating them uniformly. In the context of data reconstruction, this oversight may result in suboptimal performance.
In practice, the challenges associated with data reconstruction are often complex and involve various forms of corruption, including multiple types of noise, outliers, and missing values. However, previous studies mainly focused on individual types of corruption [,]. The corruption of IoT data can occur owing to various factors, including noise, outliers, and missing values. In this study, we consider two types of noise: Gaussian and impulsive. Gaussian noise is a result of hardware imperfections and computational limitations and follows a Gaussian distribution []. By contrast, impulsive noise appears suddenly and disrupts information more intensely []. It can be triggered by external factors, such as power surges, electromagnetic interference, and faults in sensor nodes, resulting in abrupt changes and extreme data values. Outliers are values that deviate significantly from the normal range. They indicate severe errors in measurements, such as sensor malfunctions, inaccurate readings, and unexpected events in the environment. Outliers are considered abnormal and can significantly affect the overall behavior of data []. Missing values are a common issue in IoT data and can occur for various reasons. Sensor nodes may fail to transmit data owing to hardware failures, network problems, or limited energy resources. Environmental conditions, such as signal attenuation or obstacles, can also lead to data loss during transmission []. Detecting and addressing these types of data corruption is crucial for ensuring the accuracy and reliability of information in IoTs. IoT academies must learn how to handle these different types of corruption effectively to provide high-quality data for various applications. Previous research focused only on single types of damage, such as Gaussian noise, outliers, and missing values. However, addressing all types of data corruption is essential to ensuring accurate data reconstruction.
This study proposes a new approach to addressing these challenges and makes significant contributions to the field. To the best of our knowledge, this is the first study to address complex corruption encompassing mixed noise, outliers, and missing values in multivariate sensing data within IoTs operating in 5G environments using a WTRPCA. The primary contributions of this study are as follows:
  • This work presents an enhanced method for multivariate data reconstruction in 5G-operating IoTs. A TRPCA is combined with TC to enhance the method’s ability to handle missing data, noise, or missing values. This unique approach leverages correlations among multiple attributes to improve reconstruction performance.
  • This study introduces a weighted approach to TC and the TRPCA, offering a means of handling singular values. In contrast to traditional methods, the proposed approach uses weighted tensor singular value thresholding (WTSVT) to shrink singular values based on their importance, potentially boosting reconstruction accuracy.
  • The proposed approach effectively tackles complex types of corrupted data, such as mixture noise, outliers, and missing values, and stands out in comparison to other models.
This paper is organized as follows: Section 1 introduces the core concepts related to the study, while Section 2 surveys the existing literature and related works on IoTs, TC, and the TRPCA. Section 3 provides the necessary preliminaries, introducing tensors, TC, and the TRPCA in detail. The methodology is presented in Section 4, in which each step of the proposed model is thoroughly explained. An experimental validation of the model, including dataset descriptions, an understanding of the low-rank structure in the dataset, and a description of the experimental setup, is presented in Section 5. Section 6 concludes the paper, summarizes its contributions, and discusses potential directions for future research.

3. Preliminaries

3.1. Introduction to Tensors

This section briefly introduces the definitions, notation, and tensor operations used in this study. Table 2 lists mathematical symbols, definitions, and commonly used abbreviations.
Table 2. Mathematical notations and definitions.
G R n 1 × n 2 × n 3 . . . × n N represents a multiway array of the Nth order, also referred to as an N-way array or Nth-order tensor. In a specific instance in which N = 3, G R n 1 × n 2 × n 3 is defined as a third-order tensor. A slice is a data partition that occurs when one mode index is fixed, whereas the indices in the other two modes vary. The slices of a third-order tensor are illustrated in Figure 1. Fibers of the third-order tensor were obtained by maintaining all except one dimension constant, as shown in Figure 2.
Figure 1. Slices of third-order tensor G : (a) frontal slices; (b) lateral slices; (c) horizontal slices.
Figure 2. Fibers of third-order tensor G : (a) tube fibers; (b) column fibers; (c) row fibers.
For the tensor G R n 1 × n 2 × n 3 , the ith frontal slices are indicated by G ( i ) , where i ranges from one to n 3 . The operation u n f o l d is described as follows:
u n f o l d ( G ) = G ( 1 ) G ( 2 ) G ( n 3 )
Furthermore, the f o l d operation is as follows:
f o l d G ( 1 ) G ( 2 ) G ( n 3 ) = G
The block circulant matricization operator, denoted by c i r c , was defined in []. This operator reshapes tensor G R n 1 × n 2 × n 3 into a block circulant matrix of size G R n 1 n 3 × n 2 n 3 . The block circulant matricization operator arranges the frontal slices of tensor A in a circulant manner, thereby preserving the temporal relationships across the frontal slices and the multivariate correlations within the frontal slices.
c i r c ( G ) = G ( 1 ) G ( n 3 ) G ( 2 ) G ( 2 ) G ( 1 ) G ( 3 ) G ( n 3 ) G ( n 3 1 ) G ( 1 )
Within the tensor–SVD framework, the tensor product is conceptualized as an extension of the matrix product.
Definition 1. 
The tensor product [] involves two tensors, G R n 1 × n 2 × n 3 and Y R n 1 × n 4 × n 3 . The t-product, represented by G Y , is defined as a tensor of size n 1 × n 4 × n 3 . This is given by
G Y = f o l d ( c i r c ( G ) · ( u n f o l d ( Y ) )
Definition 2. 
A conjugate transpose, as detailed in [], involves a tensor G R n 1 × n 2 × n 3 . The conjugate transpose of this tensor, denoted by G R n 2 × n 1 × n 3 , is obtained by taking the conjugate transpose of each frontal slice and subsequently reversing the order of the transposed frontal slices from 2 to n 3 .
Definition 3. 
An identity tensor  [] is a tensor G R n 1 × n 2 × n 3 . This tensor is characterized by its first frontal slice being an n × n identity matrix, whereas all other frontal slices consist entirely of zeros.
Definition 4. 
A block diagonal matrix  [] with G ^ = f f t ( G ) represents the tensor obtained by executing a fast Fourier transform (FFT) along the third dimension of the tensor G R n 1 × n 2 × n 3 . The block diagonal matrix of G ^ is defined as follows:
G ^ = b l o c k d i a g ( G ^ ) = G ( 1 ) 0 G ( 2 ) 0 G ( n 3 )
Definition 5. 
An orthogonal tensor [] is a tensor G R n 1 × n 1 × n 3 . This tensor is considered orthogonal if it fulfills the following condition:
G G T = G T G = I
Definition 6. 
f diagonal tensor  [] is a tensor G R n 1 × n 1 × n 3 . This tensor is considered orthogonal if it satisfies the following conditions.
Theorem 1. 
Tensor Singular Value Decomposition (t-SVD) [] is a method of decomposing a third-order tensor. It breaks down a tensor G R n 1 × n 2 × n 3 into three components: a core tensor D R n 1 × n 1 × n 3 , an orthogonal tensor on the right U R n 1 × n 1 × n 3 , and an orthogonal tensor on the left V R n 2 × n 2 × n 3 . The decomposition is expressed as follows:
G = U D V T
In the t-SVD process for a third-order tensor, as illustrated in Algorithm 1, tensor G R n 1 × n 2 × n 3 is decomposed into three distinct tensors. U and V are orthogonal tensors, whereas D is an f diagonal core tensor. Each frontal slice of the core tensor D is a diagonal matrix, as shown in Figure 3.
Algorithm 1 Tensor singular value decomposition (t-SVD).
1:
Input:  G R n 1 × n 2 × n 3
2:
P = fft ( G , [ ] , 3 )
3:
for  i = 1 to n 3 do
4:
    [ U , D , V ] = SVD ( G ( : , : , i ) )
5:
   Determine frontal slices of U, D, and V
6:
    U ^ ( : , : , i ) = U
7:
    D ^ ( : , : , i ) = D
8:
    V ^ ( : , : , i ) = V
9:
end for
10:
U = i f f t ( U ^ , [ ] , 3 ) , D = i f f t ( D ^ , [ ] , 3 ) , V = i f f t ( V ^ , [ ] , 3 )
11:
Output: orthogonal tensor U , D and core tensor V
Figure 3. Tensor singular value decomposition (t-SVD).
Definition 7. 
The tubal rank  [] is the count of non-zero singular tubes present in the core tensor D , which is derived from the t-SVD of G R n 1 × n 2 × n 3 .
Definition 8. 
The tensor nuclear norm [], denoted · * of tensor G R n 1 × n 2 × n 3 , is the mean value of the nuclear norm of all frontal slices of the tensor G ^ .   
G * = 1 n 3 G ^ * = 1 n 3 j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j
Definition 9. 
The weighted tensor nuclear norm [], represented as · * , ω of tensor G R n 1 × n 2 × n 3 , is the mean value of the weighted nuclear norm of all frontal slices of tensor G ^ given that ω 0 .
G * , ω = 1 n 3 j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) ω i j σ i j

3.2. Tensor Robust Principal Component Analysis with Weighted Tensor Nuclear Norm Minimization

The RPCA is designed to accurately separate a low-rank matrix L and a sparse matrix C from a corrupted matrix G R n 1 × n 2 . A direct solution to this problem is as follows:
min L , C r a n k ( L ) + λ C 0 , s . t . G = L + C ,
Here, the 0 -norm is denoted by · 0 , and the weight-adjusting parameter λ is positive. The rank of the matrix is presented by r a n k ( · ) . Equation (10) represents the matrix rank minimization, which is a non-convex and NP-hard problem. A more feasible approach to the low-rank matrix reconstruction problem is to minimize a weighted linear combination of the matrix nuclear norm and the 1 -norms []. The approach is as follows:
min L , C L * + λ C 1 , s . t . G = L + C
In Equation (11), | | L | | * = i = 1 m i n ( n 1 , n 2 ) σ i is the matrix nuclear norm, and σ i is the i t h singular value of L . The 1 -norm is denoted as · 1 . Introducing the weighted nuclear norm allows different singular values to shrink differently, thereby preserving major data components []. This is expressed as follows:
min L , C L * , ω + λ C 1 , s . t . G = L + C
In Equation (12), | | L | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i is the weighted nuclear norm (WNN), and ω 0 is the weight parameter. Additionally, the RPCA is expanded to handle multi-dimensional data while maintaining the tensor structure via the TRPCA. This technique has been effective in several fields including image processing, background removal, and image reconstruction. It has proven particularly useful in addressing noise damage issues in IoTs. As shown in Figure 4, the TRPCA is used to restore low-rank tensors damaged by sparse noise. The different colors present different columns or attributes in the data tensor.
Figure 4. Decomposition of low-rank and sparse components from corrupted TRPCA observation.
The weighted tensor nuclear norm (WTNN) minimization for the TPRCA [] is given as follows:
min L , C L * , ω + λ C 1 , s . t . G = L + C
where | | L | | * , ω = j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j ω i j , the weight parameters, are arranged such that a more significant singular value is paired with a smaller weight and vice versa. This configuration ensures equal treatment of all singular values within the objective function. Following this, the weight parameters were initialized and fixed in non-decreasing order as follows: 0 ω 1 ω 2 . . . ω m i n ( n 1 , n 2 ) .

3.3. Tensor Completion with Weighted Tensor Nuclear Norm Minimization

The matrix completion (MC) model aims to estimate missing values based on incomplete observations. This model can be represented by the following equation []:
min A r a n k ( A ) , s . t . P Ω ( A ) = P Ω ( B )
In Equation (14), A R n 1 × n 2 represents the matrix, Ω indicates the support set, P Ω is the orthogonal projection onto the span of the matrices, and the values of the matrices disappear outside of Ω . Therefore, the ( i , j ) t h component of P Ω ( A ) equals B i j if the ( i , j ) t h component Ω and is zero otherwise. Given the NP-hard complexity of minimizing the matrix rank, the nuclear norm minimization problem offers an effective approximation of the MC model []:
min A | | A | | * s . t . P Ω ( A ) = P Ω ( B )
In Equation (15), | | A | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i represents the nuclear norm of the matrix, where σ i is the i t h singular value of A. Nevertheless, this approximation does not adequately account for the most and least significant singular values. An improved solution is the weighted nuclear norm, which assigns higher weights to less significant singular values and lower weights to more significant ones []:
min A | | A | | * , ω s . t . P Ω ( A ) = P Ω ( B )
where | | A | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i is the WNN, and ω 0 is the weight parameter. Tensor completion, a multi-dimensional extension of matrix completion, is depicted in Figure 5. The data tensor’s various colors correspond to distinct columns or properties.
Figure 5. Missing and low-rank components of TC.
WTNN minimization for TC was proposed in [] and can be expressed as follows:
min A | | A | | * , ω s . t . P Ω ( A ) = P Ω ( B )

4. The Proposed Model

Many studies regarding IoT data corruption have not taken into account all the different types of corruption that can occur. In this proposed model, we use a combination of the WRTPCA and WTC. The input data for this method comprise a tensor that has been damaged with missing values, mixed noise, and outliers. We apply WTSVT (Algorithm 2) in both WTC and the WRTPCA. WTC (Algorithm 3) results in a new tensor that has no missing values. This new tensor is then input into the WRTPCA (Algorithm 4). After applying this proposed model, we obtain a final tensor that has no missing values, mixture noise, or outliers. Figure 6 provides an overview of this proposed model. Before discussing the details of this method, we present the mathematical foundations of WTC and the WRTPCA.
Figure 6. Flowchart of our model—WRTPCA integrated with WTC.
To recover the missing-value tensor, Equation (17) can be solved to extract the low-rank structure from the incomplete tensor data using the alternating direction method of multipliers (ADMMs) [] as follows:
W ^ i + 1 = arg min W ^ ( | | W ^ | | * , ω β i 2 W ^ A ^ i 1 β i U ^ i F 2 )
A i + 1 = arg min A ( δ Y = P Ω ( X ) + U ( : ) , A ( : ) + β i 2 A W i + 1 F 2 )
U i + 1 = U i + β i ( A i + 1 W i + 1 )
The WRTPCA optimization model, depicted in Equation (13), is frequently resolved by employing the ADMM []. The solution to the low-rank optimization problem can be expressed as follows:
L i + 1 = arg min L ( | | L | | * , ω + μ i 2 L G + C i Y i μ i F 2 )
C i + 1 = arg min C ( λ | | C | | 1 + μ i 2 L i + 1 G + C Y i μ i F 2 )
Y i + 1 = Y i + μ i ( L i + 1 + C i + 1 G )
Algorithm 2 Weighted tensor singular value thresholding method ( WTSVT ).
1:
Input:  M R n 1 × n 2 × n 3 , β , ω
2:
F = fft ( M , [ ] , 3 )
3:
for  i = 1 to n 3  do
4:
    [ U , D , V ] = SVD ( F ( : , : , i ) )
5:
    d i a g D = d i a g ( D ) ω β
6:
    ddiagD = d i a g ( d i a g D )
7:
    U ^ ( : , : , i ) = U
8:
    D ^ ( : , : , i ) = ddiagD
9:
    V ^ ( : , : , i ) = V
10:
end for
11:
U= i f f t ( U ^ , [ ] , 3 ) , D= i f f t ( D ^ , [ ] , 3 ) , V= i f f t ( V ^ , [ ] , 3 )
12:
Output: orthogonal tensor U , D and core tensor V
Weighted tensor singular value thresholding (WTSVT), with a threshold based on the weighted tensor nuclear norm (WTNN), employs t-SVD [], which solves the drawbacks of using a fixed threshold for each singular value. Equations (18) for TC and (21) in the TRPCA are solved using WTSVT. This method helps recover missing values in the TC and minimizes noise and outliers in the TRPCA []. To maintain essential data components, WTSVT is used to optimize the low-rank tensor L . WTSVT calculates the total weighted singular values over all the frontal slices of the tensor data, ensuring that greater singular values decrease less. In Algorithms 3 and 4, the WTSVT operator is used, and it is defined in Algorithm 2. The objective of Algorithm 2 is to break down the input tensor into three tensors, with the middle tensor being a low-rank tensor. The inputs for WTSVT include the input tensor M and the weighted vector ω , and β is the penalty factor. The notation f f t represents the FFT used to compute the discrete Fourier transform (DFT) of a sequence. In contrast, i f f t represents the inverse fast Fourier, which essentially reverses the FFT process. First, the input tensor is transformed using f f t . Next, the loop of Algorithm 2 begins, and each frontal slice of the input tensor is applied ( S V D ). The process S V D breaks down a matrix into three separate matrices—a left singular matrix, a diagonal matrix of singular values, and a matching singular matrix. The d i a g pertains to the diagonal elements of the singular matrix. The operation d i a g ( D ) ω β takes each diagonal component, converts it into a vector, and subtracts it, with each value in vector ω already divided to β . Subsequently, the d i a g ( d i a g D ) converts d i a g D into a diagonal matrix with shrunken singular values. The weight shrinks the diagonal elements in the singular matrix D. After completing S V D for all frontal slices, i f f t is used with the three components to obtain results.
Algorithm 3 Weighted tensor completion.
  • Input:  B R n 1 × n 2 × n 3 with missing values, weighted vector ω
  • Initialize:  A 0 = B , W 0 = B , U 0 = O , ϵ = 1 × 10 8 , ρ = 1.1 , β 0 = 1 × 10 1
  • while not converged do
  •    Update W ^ i + 1 = WTSVT ( A i ^ + U ^ i β i , ω , β i )
  •    Update A i + 1 = W i + 1 1 Z i U i , P Ω ( A i + 1 ) = P Ω ( B )
  •    Update U i + 1 = U i + β i ( A i + 1 W i + 1 )
  •    Update β i + 1 = ρ β i
  •    Check the convergence criteria A i + 1 W i F 2 ϵ or A i A i + 1 F 2 ϵ or W i W i + 1 F 2 ϵ
  • end while
  • Output: low-rank tensor without missing value A
The solution to Equation (18) is obtained through WTSVT (Algorithm 2), and Equation (19) represents the least-squares projection constrained by the problem []. The δ -indicator function maps the elements of a subset of a set to one and all other elements to zero. Following MATLAB R2021a notation, the symbols U ( : ) and G ( : ) signify the tensor-to-vector conversion. To recover the missing values, the ADMM is implemented, the details of which are provided in Algorithm 3. The input to Algorithm 3 includes a tensor with the missing values B and weighted vector ω . First, we initialize the tensors A , W , and U as B , B , and O , respectively. Here, A is the output vector without any missing values, W is the tensor that helps the algorithms ensure the constraint, and U is the dual factor of the ADMM, which represents the augmented Lagrange penalty parameter. The step size is denoted as β . An n 1 × n 2 × n 3 -tensor with all its elements set to zero is denoted as O . The other parameters ϵ and ρ are the threshold stopping algorithm and the degree of increase in the step size β in each iteration, respectively. Starting with the loop in Algorithm 3, W is updated using WTSVT in Algorithm 2. Furthermore, A is updated; however, the constraint P Ω ( A i + 1 ) = P Ω ( B ) must be ensured. The dual factor U and step size β are also updated after that. The algorithm stops updating when A i + 1 W i F 2   ϵ or A i A i + 1 F 2   ϵ or W i W i + 1 F 2   ϵ .
Algorithm 4 Weighted robust tensor principal component analysis integrated with weighted tensor completion.
  • Input:  G R n 1 × n 2 × n 3 with mixed noise, outlier and missing value; weight vector ω
  • Initialize:  L 0 = O , C 0 = O , Y 0 = O , μ 0 = 1 × 10 1 , μ max = 1 × 10 10 , ϵ = 1 × 10 8 , ρ = 1.1 , λ = 1 max ( n 1 , n 2 ) × n 3
  • Reconstruct incompleted G by Algorithm 3
  • while not converged do
  •    Update L i + 1 = WTSVT ( G C k Y i μ i , ω , μ i )
  •    Update C i + 1 = prox l 1 , λ μ i ( G L i + 1 Y i μ i )
  •    Update Y i + 1 = Y i + μ i ( L i + 1 + C i + 1 G )
  •    Update μ i + 1 = min ( ρ μ i , μ max )
  •    Check the convergence criteria L i + 1 L i F   ϵ or C i + 1 C i F   ϵ or G L i + 1 C i + 1 F   ϵ
  • end while
  • Output:  L low-rank tensor without missing values, C sparse mixture noise, and outlier tensor.
To reduce multiple noises, outliers in Equation (21) can be solved using WTSVT (Algorithm 2), and the solution of Equation (22) is a proximal function that shrinks all values. The details of the process for reducing mixture noise and outliers and reconstructing missing values are given in Algorithm 4, which describes WRTPCA integrated with WTC and uses the ADMM to extract low-rank data without missing values and sparse noise tensors from the damaged data tensor. This helps reconstruct missing data and reduce multiple noises and outliers. In Algorithm 4, we initialize the components and parameters. An n 1 × n 2 × n 3 -tensor with all its elements set to zero is denoted as O . L and C are a low-rank tensor present for normal data without missing values, noise, and outliers and a sparse tensor that indicates outlier and mixed noise, respectively. The ADMM updates the dual variable Y , which represents the augmented Lagrange penalty parameter. The step size is denoted by μ , and the maximum step size is μ m a x . ρ is the level of increase in step size μ in each iteration. μ can be set as fixed, but increasing ρ μ i at each iteration helps accelerate convergence. ϵ , λ , and ω are the thresholds of the convergence condition, balance parameter, and weighted vector, respectively. Subsequently, the low-rank tensor L is filled with missing values using Algorithm 3. Subsequently, the loop of Algorithm 4 starts reducing the mixed noise and outliers and starts reconstructing the missing values. In the iteration, the tensor L is updated by applying the WTSVT operator defined in Algorithm 2 to obtain the low rank of L . Next, the operator prox l 1 , λ / μ i ( . ) in Algorithm 4 is applied to update C . For example, with tensor G , the proximal operator of the prox l 1 , λ / μ i ( G ) , given as prox l 1 , λ / μ i ( G ) = max ( | G i j k | λ / μ i ) , 0 · sign ( G i j k ) , is applicable to all elements G i j k within the tensor. The augmented Lagrange penalty parameter Y uses a step size denoted as μ i when updating. The convergence condition of the loop required to bring the ADMM algorithm to a stop is defined as follows: L i + 1 L i F   ϵ , C i + 1 C i F   ϵ , G L i + 1 C i + 1 F   ϵ .

5. Experiments and Results

5.1. Dataset

The U.S. Climate Normals dataset (https://www.ncdc.noaa.gov/cdo-web/datasets, accessed on 16 June 2023) comprises weather and climate data from over 1100 U.S. stations and territories. It includes hourly, daily, monthly, seasonal, and annual readings of temperature, wind statistics, mean sea level pressure, dew point, and cloud cover. These records undergo thorough quality assurance assessments at the National Centers for Environmental Information (NCEI) of the National Oceanic and Atmospheric Administration (NOAA).
The NDBC-TAO dataset https://tao.ndbc.noaa.gov/tao/data_download (accessed on on 10 June 2023) was collected from sensors in the Tropical Pacific Ocean and sent to the National Oceanic and Atmospheric Administration (NOAA). These sensors measure different attributes including sea surface temperature, wind speed, conductivity, sea level pressure, and salinity.
Details regarding truth data tensors for both the U.S. Climate Normal dataset and the NDBC-TAO dataset are shown in Table 3.
Table 3. Real-world datasets for WNS.

5.2. Low-Rank Structures and Correlation in Multi-Attribute Sensing Data

Through SVD [], the low-rank data and attribute interrelations of the data matrix can be confirmed. t-SVD [] is a potent resource for investigating the interplay among multiple attributes. The low-rank characteristics of both datasets are shown in Figure 7 and were obtained by evaluating the singular values of the block diagonal matrix. In t-SVD, the correlation among numerous attribute surfaces is determined by assessing the core tensor’s block-diagonal matrices’ singular values. The initial singular values primarily influence the energy of the tensor data.
Figure 7. Low-rank structure within sensing data utilizing the singular values of the core tensor’s block diagonal matrices.
In Figure 7, it can be seen that each singular value has a different importance value, and the larger singular values contain more main data information; therefore, it is necessary to shrink different singular values using different weights rather than a fixed weight.

5.3. Experiment Setup

This section outlines a series of experiments conducted to confirm the efficacy of WRTPCA_WTNN, the proposed method. Its performance was compared with that of three other methods: the TRPCA [], WTC [], and the TRPCA combined with TC using the weighted sum tensor nuclear norm (TRPCA_TNN) []. This study used two real-world IoT datasets, namely the U.S. Climate Normal and NDBC-TAO datasets, to analyze their recovery under various conditions, including sparse mixed noise, outliers, and missing values. Various methods were used in these experiments to achieve optimal visual results.
All methods were carefully fine-tuned and tested repeatedly, 20 times in total, for all corrupted cases. The average values were calculated to obtain the results. Data corruption was characterized using four factors: Gaussian noise, impulsive noise, outliers, and missing values.
In extensive experiments, we assessed the performance of our model using different types of corrupted data. For Gaussian noise, we chose a zero mean and investigated ten variance levels ( σ 2 ) ranging from 11 to 20 in increments of one. Impulsive noise was examined at ten percentage levels ( ρ n ) from 0.1 to 0.55, with a step size of 0.05. Outliers were studied at ten magnitudes (k) ranging from 6 to 15 with a step size of 1, each being k times the standard deviation ( σ ) of each attribute. Missing values were explored at ten ratio levels ( ρ m ) from 0.1 to 0.55, with a step size of 0.05. Table 4 presents detailed parameters of the four corruption types.
Table 4. Detail parameters of each corruption type.
In each experimental case, we varied only the type of corruption across the levels and held the other parameters constant. The fixed values for the experiment were a Gaussian noise variance ( σ 2 ) set at 15, an impulsive noise percentage ( ρ n ) set at 0.3, an outlier magnitude (k) set at 15, and a missing ratio ( ρ m ) set at 0.3. For instance, in the Gaussian noise experiment, we altered the Gaussian noise variances ( σ 2 ) from 11 to 20 in steps of 1 while maintaining an impulsive noise percentage ( ρ n ) of 0.3, an outlier magnitude (k) of 15, and a missing ratio ( ρ m ) of 0.3.
Two algorithms, labeled Algorithms 3 and 4, were initialized with different WTSVT weight values. Specifically, ω = ( 1 ; 1.9 ; 2.1 ) was used in Algorithm 4, whereas ω = ( 1 ; 1 ; 1.6 ) was used in Algorithm 3. It was necessary to select appropriate values for μ 0 , μ max , ϵ , and ρ , which were the characteristics of the sensing data. In this study, the values of μ 0 , μ max , ϵ , and ρ were set to 1 × 10 1 , 1 × 10 10 , 1 × 10 8 , and 1.1 , respectively. The experimental results showed promising outcomes.
The experimental results were averaged across 20 replicates. All simulations used MATLAB R2021a on an Intel(R) Core(TM) i7-10700K CPU 3.80 GHz (Intel, Santa Clara, CA, USA).

5.4. Metrics

Reconstruction accuracy was evaluated using the normalized mean absolute error (NMAE). The NMAE for each of the three features considered in the dataset was determined by comparing the lateral slices of the input data with the reconstructed low-rank tensor.
N M A E = i n 2 L ( : , i , : ) L ^ ( : , i , : ) i n 2 L ( : , i , : )
The original tensor is represented by L , and the reconstructed low-rank tensor is denoted by L ^ . A comparison between the two tensors served as the foundation for the obtained results.

5.5. Results and Analysis

Each subfigure represents the results of the experiments, each involving a specific type of data corruption for a particular attribute within the datasets. The horizontal axis shows the levels of data corruption types, and the vertical axis illustrates the NMAE values of the four models in each case.
For Gaussian and impulsive noise, Figure 8 and Figure 9 illustrate the results of the comparison of our models and others on the NDBC-TAO and U.S. Climate Normal datasets. Across all models, the proposed model consistently outperformed the other methods. In particular, the NMAE values of our method applied to the two datasets consistently fell below 0.1 in most noise cases.
Figure 8. Reconstruction of Gaussian noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Figure 9. Reconstruction of impulsive noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
In addition, the proposed model can handle outliers. The NMAE values of all models in outlier cases are shown in Figure 10 for the two datasets. The results of the other models are worse than those of the proposed model, and the results of our model applied to the two datasets are below 0.1 in most outlier cases.
Figure 10. Reconstruction of outlier cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Finally, the missing values are also reconstructed by our model, and the results of an experiment on the two datasets in the missing-value cases of the proposed model and the three different models are depicted in Figure 11. The experiment shows that the NMAE of the proposed model surpasses the NMAE values of the WTC, TRPCA, and TRPCA-TNN methods and maintains a value below 0.1 when applied to the two datasets in most missing-value cases.
Figure 11. Reconstruction of missing value cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Although each figure shows a comparison of the methods for each type of corruption, the default datasets consistently include a blend of noise, outliers, and missing values. Therefore, the reason the best outcomes were achieved by the proposed model is that it considers all types of corruption by employing WTSVT as a weighted approach for the TRPCA and TC, which shrinks singular values based on their significance and improves the capacity to reduce mixture noise and outliers and reconstruct missing values. Every singular value has distinct importance, as indicated in Section 5.2, and the more significant the data expressed, the greater the singular value. Therefore, we must reduce the distinct singular values using varying weights rather than fixed weights, as in most studies. In contrast, the WTC method consistently underperforms in all corruption cases. The WTC method performs poorly in all cases because it specializes in reconstructing missing values and performs poorly in reducing noise and outliers. The TRPCA method consistently outperforms the WTC method. However, it still requires consideration of the weights of the singular values to enhance its ability to handle mixed noise and outliers. In some cases with high missing value ratios, such as a missing value ratios from 0.4 to 0.55 in the dew attribute of the U.S Climate Normal dataset, the TRPCA performs worse than WTC. The effectiveness of the TRPCA in recovering missing values diminishes at higher missing value ratios because it is specifically designed to address noise and outlier problems, not missing data. The TRPCA is still helpful for some small ratios of missing values because the process extracts low-rank tensors that can recover but perform poorly. In addition, the TRPCA-TNN method performed better than the WTC and TRPCA methods but worse than the proposed model. This method combines the TRPCA, which specializes in noise and outliers, and TC solved using the weighted sum tensor nuclear norm, which specializes in missing values. The TRPCA in the TRPCA-TNN method does not consider the weights of singular values; therefore, the ability to reduce noise and outliers of the TRPCA-TNN method is still inferior to that of the proposed model. This model is still superior to the TRPCA at reducing noise and outliers because, in addition to the TRPCA, it also has a TC process that recovers missing values, which reduces noise and outliers with low accuracy. In the specialized recovery of missing values inthe TRPCA-TNN method, TC using the weighted sum tensor nuclear norm performs worse than TC using the weighted tensor nuclear norm. Owing to these limitations, the TRPCA-TNN method performed worse than the proposed model.
The performance of the U.S. Climate Normal dataset was lower than that of the NDBC-TAO dataset because the attributes in this dataset might have a low correlation as there are many attributes, such as temperature, wind statistics, mean sea level pressure, dew point, and cloud cover. However, we chose only three features, a number equal to the number of features in the NDBC-TAO dataset, to create the experimental dataset. In the NDBC-TAO dataset, the results for all scenarios of all models were consistently under 1.0 NMAE. Meanwhile, in the U.S. Climate Normal dataset, the results of other models in some complicated cases reached an NMAE of 5.0.

6. Conclusions

This study proposes a new technique for recovering multivariable data from 5G-based IoTs by combining TRPCA and TC approaches. The proposed approach can recover missing values, multiple noises, and outlier issues. By using the correlation between multi-attributes and solving problems using tensor data, this method can improve system performance. This uniqueness arises from the incorporation of WTSVT into TC and the TRPCA to handle singular values, which increases reconstruction accuracy by retrieving essential components. This combination overcomes the limitations of other models, such as WTC, the TRPCA, and the TRPCA-TNN, and significantly improves the ability to reduce mixed noise and outliers and reconstruct missing values. The proposed method is highly resistant to data corruption, including mixed noise, outliers, and missing values. Its NMAE consistently outperformed other metrics across two datasets, the NDBC-TAO and U.S. Climate Normal datasets. This method can be useful in various applications, particularly those related to the 5G-based IoT in real-world scenarios. Thus, these findings bridge the gap in the literature regarding better ways to handle extensive data analysis within the IoT environment.
Our objective in the near future is to automate the process of choosing the most appropriate weight for a particular dataset. This will allow us to utilize the most efficient and precise decision-making methods. Furthermore, we will explore situations in which there is a correlation between errors or noise, such as when one type of error is dependent on another. In addition, we will consider ways to reduce the complexity of the proposed algorithm.

Author Contributions

Conceptualization, H.H.-P.V.; methodology, H.H.-P.V.; formal analysis, H.H.-P.V.; writing—original draft preparation, H.H.-P.V.; writing—review and editing, M.Y. and T.M.N.; visualization, H.H.-P.V.; supervision, M.Y.; funding acquisition, M.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by MSIT under the Information Technology Research Center (ITRC) Support Program Supervised by IITP under grant IITP-2023-2021-0-02046.

Data Availability Statement

Publicly available datasets were analyzed in this study (Section 5.1). This data can be found here: https://www.ncdc.noaa.gov/cdo-web/datasets, (accessed on 16 June 2023), https://tao.ndbc.noaa.gov/tao/data_download (accessed on on 10 June 2023).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Elsheakh, D.; Shawkey, H. 5G wideband on-chip dipole antenna for WSN soil moisture monitoring. Int. J. RF Microw. Comput.-Aided Eng. 2021, 31, e22556. [Google Scholar] [CrossRef]
  2. Shawkey, H.; Elsheakh, D. Multiband dual-meander line antenna for body-centric networks’ biomedical applications by using UMC 180 nm. Electronics 2020, 9, 1350. [Google Scholar] [CrossRef]
  3. Alliance, N. 5G white paper. In Next Generation Mobile Networks, White Paper; 2015; Volume 1, Available online: https://pub.deadnet.se/Books%20and%20Docs%20on%20Hacking/Networking/Wireless%20LAN/NGMN%205G%20White%20Paper%20V1.0.pdf (accessed on 12 May 2024).
  4. Jaladi, A.R.; Khithani, K.; Pawar, P.; Malvi, K.; Sahoo, G. Environmental monitoring using wireless sensor networks (WSN) based on IOT. Int. Res. J. Eng. Technol. 2017, 4, 1371–1378. [Google Scholar]
  5. Corke, P.; Wark, T.; Jurdak, R.; Hu, W.; Valencia, P.; Moore, D. Environmental wireless sensor networks. Proc. IEEE 2010, 98, 1903–1917. [Google Scholar] [CrossRef]
  6. Alippi, C.; Camplani, R.; Galperti, C.; Roveri, M. A robust, adaptive, solar-powered WSN framework for aquatic environmental monitoring. IEEE Sens. J. 2010, 11, 45–55. [Google Scholar] [CrossRef]
  7. Ko, J.; Lu, C.; Srivastava, M.B.; Stankovic, J.A.; Terzis, A.; Welsh, M. Wireless sensor networks for healthcare. Proc. IEEE 2010, 98, 1947–1960. [Google Scholar] [CrossRef]
  8. Sharma, N.; Kaushik, I.; Bhushan, B.; Gautam, S.; Khamparia, A. Applicability of WSN and biometric models in the field of healthcare. In Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks; IGI Global: Hershey, PA, USA, 2020; pp. 304–329. [Google Scholar]
  9. Xie, K.; Ning, X.; Wang, X.; Xie, D.; Cao, J.; Xie, G.; Wen, J. Recover corrupted data in sensor networks: A matrix completion solution. IEEE Trans. Mob. Comput. 2016, 16, 1434–1448. [Google Scholar] [CrossRef]
  10. Majumder, B.D.; Roy, J.K.; Padhee, S. Recent advances in multifunctional sensing technology on a perspective of multi-sensor system: A review. IEEE Sens. J. 2018, 19, 1204–1214. [Google Scholar] [CrossRef]
  11. Rajesh, G.; Chaturvedi, A. Data reconstruction in heterogeneous environmental wireless sensor networks using robust tensor principal component analysis. IEEE Trans. Signal Inf. Process. Netw. 2021, 7, 539–550. [Google Scholar] [CrossRef]
  12. Zhang, X.; He, J.; Li, Y.; Chi, Y.; Zhou, Y. Recovery of corrupted data in wireless sensor networks using tensor robust principal component analysis. IEEE Commun. Lett. 2021, 25, 3389–3393. [Google Scholar] [CrossRef]
  13. He, J.; Li, Y.; Zhang, X.; Li, J. Missing and Corrupted Data Recovery in Wireless Sensor Networks Based on Weighted Robust Principal Component Analysis. Sensors 2022, 22, 1992. [Google Scholar] [CrossRef] [PubMed]
  14. Xiao, F.; Liu, W.; Li, Z.; Chen, L.; Wang, R. Noise-tolerant wireless sensor networks localization via multinorms regularized matrix completion. IEEE Trans. Veh. Technol. 2017, 67, 2409–2419. [Google Scholar] [CrossRef]
  15. Madi, G.; Sacuto, F.; Vrigneau, B.; Agba, B.L.; Pousset, Y.; Vauzelle, R.; Gagnon, F. Impacts of impulsive noise from partial discharges on wireless systems performance: Application to MIMO precoders. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 186. [Google Scholar] [CrossRef]
  16. Al Samara, M.; Bennis, I.; Abouaissa, A.; Lorenz, P. An efficient outlier detection and classification clustering-based approach for WSN. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  17. Deng, Y.; Han, C.; Guo, J.; Sun, L. Temporal and spatial nearest neighbor values based missing data imputation in wireless sensor networks. Sensors 2021, 21, 1782. [Google Scholar] [CrossRef] [PubMed]
  18. Cheng, J.; Ye, Q.; Jiang, H.; Wang, D.; Wang, C. STCDG: An efficient data gathering algorithm based on matrix completion for wireless sensor networks. IEEE Trans. Wirel. Commun. 2012, 12, 850–861. [Google Scholar] [CrossRef]
  19. Magán-Carrión, R.; Camacho, J.; García-Teodoro, P. Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 672124. [Google Scholar] [CrossRef]
  20. Srindhuna, M.; Baburaj, M. Estimation of missing data in remote sensing images using t-SVD based tensor completion. In Proceedings of the 2020 International Conference for Emerging Technology (INCET), Belgaum, India, 5–7 June 2020; pp. 1–5. [Google Scholar]
  21. Kilmer, M.E.; Martin, C.D. Factorization strategies for third-order tensors. Linear Algebra Its Appl. 2011, 435, 641–658. [Google Scholar] [CrossRef]
  22. He, J.; Zhou, Y.; Sun, G.; Geng, T. Multi-attribute data recovery in wireless sensor networks with joint sparsity and low-rank constraints based on tensor completion. IEEE Access 2019, 7, 135220–135230. [Google Scholar] [CrossRef]
  23. Li, T.; Ma, J. T-SVD based non-convex tensor completion and robust principal component analysis. In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 6980–6987. [Google Scholar]
  24. Mu, Y.; Wang, P.; Lu, L.; Zhang, X.; Qi, L. Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD. Pattern Recognit. Lett. 2020, 130, 4–11. [Google Scholar] [CrossRef]
  25. Ng, M.K.P.; Yuan, Q.; Yan, L.; Sun, J. An adaptive weighted tensor completion method for the recovery of remote sensing images with missing data. IEEE Trans. Geosci. Remote Sens. 2017, 55, 3367–3381. [Google Scholar] [CrossRef]
  26. Cheng, Q.; Yuan, Q.; Ng, M.K.P.; Shen, H.; Zhang, L. Missing data reconstruction for remote sensing images with weighted low-rank tensor model. IEEE Access 2019, 7, 142339–142352. [Google Scholar] [CrossRef]
  27. Geng, J.; Wang, L.; Xu, Y.; Wang, X. A weighted nuclear norm method for tensor completion. Int. J. Signal Process. Image Process. Pattern Recognit. 2014, 7, 1–12. [Google Scholar] [CrossRef][Green Version]
  28. Candès, E.J.; Li, X.; Ma, Y.; Wright, J. Robust principal component analysis? J. ACM (JACM) 2011, 58, 1–37. [Google Scholar] [CrossRef]
  29. Kang, J.; Wang, Y.; Schmitt, M.; Zhu, X.X. Object-based multipass InSAR via robust low-rank tensor decomposition. IEEE Trans. Geosci. Remote Sens. 2018, 56, 3062–3077. [Google Scholar] [CrossRef]
  30. Zhang, A.; Liu, F.; Du, R. Probability-weighted tensor robust PCA with CP decomposition for hyperspectral image restoration. Signal Process. 2023, 209, 109051. [Google Scholar] [CrossRef]
  31. Ruhan, A.; Mu, X.; He, J. Enhance tensor RPCA-based Mahalanobis distance method for hyperspectral anomaly detection. IEEE Geosci. Remote Sens. Lett. 2022, 19, 6008305. [Google Scholar]
  32. Guyon, C.; Bouwmans, T.; Zahzah, E.H. Robust principal component analysis for background subtraction: Systematic evaluation and comparative analysis. Princ. Compon. Anal. 2012, 10, 223–238. [Google Scholar]
  33. Gao, Q.; Zhang, P.; Xia, W.; Xie, D.; Gao, X.; Tao, D. Enhanced tensor RPCA and its application. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 43, 2133–2140. [Google Scholar] [CrossRef] [PubMed]
  34. Zhang, L.; Tan, T.; Gong, Y.; Yang, W. Fingerprint database reconstruction based on robust PCA for indoor localization. Sensors 2019, 19, 2537. [Google Scholar] [CrossRef]
  35. Liu, X.; Chen, X.; Li, J.; Chen, Y. Nonlocal weighted robust principal component analysis for seismic noise attenuation. IEEE Trans. Geosci. Remote Sens. 2020, 59, 1745–1756. [Google Scholar] [CrossRef]
  36. Chang, Y.; Yan, L.; Zhao, X.L.; Fang, H.; Zhang, Z.; Zhong, S. Weighted low-rank tensor recovery for hyperspectral image restoration. IEEE Trans. Cybern. 2020, 50, 4558–4572. [Google Scholar] [CrossRef]
  37. Mu, X.; He, J.; Zhang, J. Enhance tensor RPCA-LRX anomaly detection algorithm for hyperspectral image. Geocarto Int. 2022, 37, 11976–11997. [Google Scholar]
  38. Chander, B.; Kumaravelan, G. Outlier detection strategies for WSNs: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 5684–5707. [Google Scholar] [CrossRef]
  39. Tay, D.B. Sensor network data denoising via recursive graph median filters. Signal Process. 2021, 189, 108302. [Google Scholar] [CrossRef]
  40. Wilson, A.M.; Panigrahi, T.; Dubey, A. Robust distributed Lorentzian adaptive filter with diffusion strategy in impulsive noise environment. Digit. Signal Process. 2020, 96, 102589. [Google Scholar] [CrossRef]
  41. Kilmer, M.E.; Braman, K.; Hao, N.; Hoover, R.C. Third-order tensors as operators on matrices: A theoretical and computational framework with applications in imaging. SIAM J. Matrix Anal. Appl. 2013, 34, 148–172. [Google Scholar] [CrossRef]
  42. Zhang, Z.; Ely, G.; Aeron, S.; Hao, N.; Kilmer, M. Novel methods for multilinear data completion and de-noising based on tensor-SVD. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 3842–3849. [Google Scholar]
  43. Gu, S.; Xie, Q.; Meng, D.; Zuo, W.; Feng, X.; Zhang, L. Weighted nuclear norm minimization and its applications to low level vision. Int. J. Comput. Vis. 2017, 121, 183–208. [Google Scholar] [CrossRef]
  44. Gao, Q.; Xia, W.; Wan, Z.; Xie, D.; Zhang, P. Tensor-SVD based graph learning for multi-view subspace clustering. In Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; Volume 34, pp. 3930–3937. [Google Scholar]
  45. Candes, E.J.; Plan, Y. Matrix completion with noise. Proc. IEEE 2010, 98, 925–936. [Google Scholar] [CrossRef]
  46. Gu, S.; Zhang, L.; Zuo, W.; Feng, X. Weighted nuclear norm minimization with application to image denoising. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 2862–2869. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.