Next Article in Journal
Identification and Optimization Study of Cavitation in High Power Torque Converter
Previous Article in Journal
Frequency-Separated Attention Network for Image Super-Resolution
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Weighted Robust Tensor Principal Component Analysis for the Recovery of Complex Corrupted Data in a 5G-Enabled Internet of Things †

1
Department of Electronic Engineering, Soongsil University, Seoul 06978, Republic of Korea
2
School of Electronic Engineering, Soongsil University, Seoul 06978, Republic of Korea
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2023 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 11–13 October 2023.
Appl. Sci. 2024, 14(10), 4239; https://doi.org/10.3390/app14104239
Submission received: 25 April 2024 / Revised: 11 May 2024 / Accepted: 13 May 2024 / Published: 16 May 2024

Abstract

:
Technological developments coupled with socioeconomic changes are driving a rapid transformation of the fifth-generation (5G) cellular network landscape. This evolution has led to versatile applications with fast data-transfer capabilities. The integration of 5G with wireless sensor networks (WSNs) has rendered the Internet of Things (IoTs) crucial for measurement and sensing. Although 5G-enabled IoTs are vital, they face challenges in data integrity, such as mixed noise, outliers, and missing values, owing to various transmission issues. Traditional methods such as the tensor robust principal component analysis (TRPCA) have limitations in preserving essential data. This study introduces an enhanced approach, the weighted robust tensor principal component analysis (WRTPCA), combined with weighted tensor completion (WTC). The new method enhances data recovery using tensor singular value decomposition (t-SVD) to separate regular and abnormal data, preserve significant components, and robustly address complex data corruption issues, such as mixed noise, outliers, and missing data, with the globally optimal solution determined through the alternating direction method of multipliers (ADMM). Our study is the first to address complex corruption in multivariate data using the WTRPCA. The proposed approach outperforms current techniques. In all corrupted scenarios, the normalized mean absolute error (NMAE) of the proposed method is typically less than 0.2, demonstrating strong performance even in the most challenging conditions in which other models struggle. This highlights the effectiveness of the proposed approach in real-world 5G-enabled IoTs.

1. Introduction

The appearance of fifth-generation (5G) technology, which is capable of integrated communication, presents an excellent opportunity to promote resource management that is informed, sustainable, and robust. This technology provides real-time data on the environmental impacts of different behaviors, opening new possibilities for in-depth analytics. The ability to monitor and control systems quickly has facilitated the creation of intelligent environments. In this context, the Internet of Things (IoT) is expected to emerge as a vital component of 5G applications, particularly in the sensing and monitoring domains [1,2]. The IoT is explicitly designed for massive machine-type communication (mMTC) applications [3], which emphasizes its significance in the changing world of 5G technologies.
The IoT is crucial in various fields ranging from environmental monitoring [4,5,6] to healthcare systems [7,8]. These networks offer a cost-effective means of sensing, collecting, and processing environmental information. However, the deployment of IoTs exposes them to potential data corruption resulting from factors such as device failure, signal interference, and adverse environmental conditions [9]. Consequently, reconstructing corrupt data has become crucial for maintaining the precision and reliability of information collected by IoTs in 5G networks.
A key consideration in addressing the challenges of data reconstruction is gathering real IoT data. Typically, most recently developed WSN appliances utilize sensors with multiple sensing units to detect different variables such as temperature, pressure, O2, and NO2 [10]. Therefore, sensor nodes often collect data with multiple attributes, resulting in multivariate data. In addition, the collected data exhibited spatiotemporal and multivariate correlations. The correlations among these attributes can be leveraged to enhance data reconstruction performance. Despite this promising direction, only one work has delved into multivariate data reconstruction in the IoT [11], with limited success.
Using a tensor structure is beneficial for data reconstruction and demonstrates proficiency in harnessing spatiotemporal correlations, particularly for multivariate data. Consequently, traditional methods such as tensor completion (TC) and the tensor robust principal component analysis (TRPCA) [11,12] have been widely employed for both univariate and multivariate data reconstruction. However, these approaches have limitations. They often ignore differences in singular values, treating them uniformly. In the context of data reconstruction, this oversight may result in suboptimal performance.
In practice, the challenges associated with data reconstruction are often complex and involve various forms of corruption, including multiple types of noise, outliers, and missing values. However, previous studies mainly focused on individual types of corruption [11,13]. The corruption of IoT data can occur owing to various factors, including noise, outliers, and missing values. In this study, we consider two types of noise: Gaussian and impulsive. Gaussian noise is a result of hardware imperfections and computational limitations and follows a Gaussian distribution [14]. By contrast, impulsive noise appears suddenly and disrupts information more intensely [15]. It can be triggered by external factors, such as power surges, electromagnetic interference, and faults in sensor nodes, resulting in abrupt changes and extreme data values. Outliers are values that deviate significantly from the normal range. They indicate severe errors in measurements, such as sensor malfunctions, inaccurate readings, and unexpected events in the environment. Outliers are considered abnormal and can significantly affect the overall behavior of data [16]. Missing values are a common issue in IoT data and can occur for various reasons. Sensor nodes may fail to transmit data owing to hardware failures, network problems, or limited energy resources. Environmental conditions, such as signal attenuation or obstacles, can also lead to data loss during transmission [17]. Detecting and addressing these types of data corruption is crucial for ensuring the accuracy and reliability of information in IoTs. IoT academies must learn how to handle these different types of corruption effectively to provide high-quality data for various applications. Previous research focused only on single types of damage, such as Gaussian noise, outliers, and missing values. However, addressing all types of data corruption is essential to ensuring accurate data reconstruction.
This study proposes a new approach to addressing these challenges and makes significant contributions to the field. To the best of our knowledge, this is the first study to address complex corruption encompassing mixed noise, outliers, and missing values in multivariate sensing data within IoTs operating in 5G environments using a WTRPCA. The primary contributions of this study are as follows:
  • This work presents an enhanced method for multivariate data reconstruction in 5G-operating IoTs. A TRPCA is combined with TC to enhance the method’s ability to handle missing data, noise, or missing values. This unique approach leverages correlations among multiple attributes to improve reconstruction performance.
  • This study introduces a weighted approach to TC and the TRPCA, offering a means of handling singular values. In contrast to traditional methods, the proposed approach uses weighted tensor singular value thresholding (WTSVT) to shrink singular values based on their importance, potentially boosting reconstruction accuracy.
  • The proposed approach effectively tackles complex types of corrupted data, such as mixture noise, outliers, and missing values, and stands out in comparison to other models.
This paper is organized as follows: Section 1 introduces the core concepts related to the study, while Section 2 surveys the existing literature and related works on IoTs, TC, and the TRPCA. Section 3 provides the necessary preliminaries, introducing tensors, TC, and the TRPCA in detail. The methodology is presented in Section 4, in which each step of the proposed model is thoroughly explained. An experimental validation of the model, including dataset descriptions, an understanding of the low-rank structure in the dataset, and a description of the experimental setup, is presented in Section 5. Section 6 concludes the paper, summarizes its contributions, and discusses potential directions for future research.

2. Related Work

2.1. Data Reconstruction with Missing Values

The reconstruction of missing data in the IoT is often accomplished using matrix completion algorithms. These algorithms rely on a low-rank matrix to recover missing values by leveraging available spatiotemporal correlations in the data [9,18].
However, these methods have limitations in capturing the complex multivariate relationships inherent in WSN data. These restrictions prevent matrix completion algorithms from fully exploiting multivariate correlations. Utilizing multivariate data enhances the effectiveness of lost data recovery [19,20].
For low-rank data structures, tensor decomposition techniques, particularly tensor singular value decomposition (t-SVD) [21], have been recognized for conserving and leveraging multiattribute correlations. The strength of t-SVD resides in its efficiency, which demands fewer iterations than other decomposition techniques such as CP, Tucker decomposition, and high-order SVD [22,23].
Emerging studies across diverse fields have improved missing data imputation by adopting a unique approach in which the shrinkage of singular values is determined by their importance. This development has been driven by the realization that singular values within the core tensor carry varied importance and should not receive equal treatment during decomposition. Various methodologies have been used to achieve this, including the weighted tensor nuclear norm with t-SVD for TC [24], which is used to restore missing pixels in video and image data. Similarly, the weighted nuclear norm has been applied to unfolded tensors for TC to recover lost data from remote sensing images [25,26]. The weighted tensor nuclear norm for TC uses reconstruction loss data as image data [27].
However, the persistent presence of sparse noise and outliers in data continues to pose a challenge [11]. It is difficult to effectively handle tensor completion because of the effects of sparse noise and outliers. There remains a pressing need for a comprehensive analytical model that focuses on sparse noise and outlier modeling to improve the robustness of IoT data reconstruction address heterogeneously corrupted data complexities.

2.2. Noise and Outlier Reduction Using Robust Principal Component Analysis

At its core, a PCA involves identifying a subspace of a specified dimension that offers an optimal approximation to given data. This is applicable regardless of whether the data are vectors, matrices, or tensors. When applied to data influenced by noise or outliers, the process becomes a robust PCA (RPCA) [28].
Adopting tensor representations and methodologies produces superior results when extracting multidimensional structural features compared with matrix-based approaches. Despite the presence of noise or sparse outliers, this approach to robust tensor data recovery has demonstrated its effectiveness across fields such as SAR imaging [29], hyperspectral image compression [30,31], video sequence background subtraction, image and video denoising [32,33], and wireless communication [34]. With the vast amounts of multi-dimensional data produced by large-scale heterogeneous IoT systems, tensor-based PCAs effectively reveal correlations among multiple attributes. This substantially boosts data reconstruction efficiency in tandem with the recognition of spatiotemporal correlations within individual attributes.
Similar to TC, the TRPCA requires a decomposition method to discover the low-rank structure of data to reduce noise and outliers. Decomposition using t-SVD is computed more efficiently than other methods such as CP decomposition, Tucker decomposition, and high-order SVD (Ho-SVD). Furthermore, t-SVD has been utilized in TRPCAs [23,33].
Similar to TC, discovering the low-rank data structure is essential for reducing noise and outliers in a TRPCA. To achieve this, a decomposition method is required. t-SVD is a more efficient decomposition method than CP decomposition, Tucker decomposition, and Ho-SVD. It is commonly used in TRPCAs [23,33].
It has been observed in various fields that singular values within the RPCA and TRPCA receive weighted shrinkage based on their importance. Several methodologies have been employed to achieve this goal. For instance, a weighted nuclear norm with a truncated SVD was utilized for noise reduction in hyperspectral images [35]. The weighted tensor nuclear norm was used in conjunction with a higher-order RPCA (HoRPCA) for similar purposes [36]. Furthermore, the weighted-tensor p-norm technique, which employs t-SVD, was used to mitigate noise in videos, images [33], and hyperspectral images [37]. These cases highlight the varying shrinkages of singular values based on their importance.
The RPCA and TRPCA aim to recover noise and outliers by identifying low-ranking structures [28]. Therefore, enhancing their ability to manage missing values is essential.

2.3. Primary Challenges in 5G-Enabled IoTs

In the IoT, dealing with noise, outliers, and missing values is a critical area of research. These challenges can have detrimental effects on the accuracy and reliability of collected data. Therefore, it is crucial to investigate and develop solutions to these challenges thoroughly before proceeding with further data exploration. Among the techniques employed to address these challenges, the RPCA can be used often, even though it offers an unsupervised learning approach which is well suited to IoTs. This is primarily because the RPCA does not require labeled data for normal and abnormal classes, a condition that is often challenging to meet in the IoT. However, few recent studies have focused on unsupervised learning, particularly using the RPCA [38].
In addition, research has addressed multivariate data reconstruction, a crucial aspect given the multisensing nature of modern IoT devices [11]. The inclusion of correlations among attributes in multivariate data enhances the accuracy of data reconstruction and anomaly detection, highlighting the need for intensive research in this area [38].
Recent studies have suggested different shrinkages of singular values based on their importance, which is a potential approach for improving data imputation processes [13]. However, a limited number of studies in the literature have exploited this approach for IoTs.
Furthermore, IoTs typically encounter numerous types of noise such as Gaussian and impulsive noise [39,40]. Previous research focused only on a single type of corruption, such as Gaussian noise, outliers, and missing values, without considering other types of corrupted data during data reconstruction. This points to a significant gap in the current knowledge, indicating a strong need for an analytical model to effectively address these complexities.
These challenges highlight the importance of our research on IoTs, which aims to exploit the potential of the RPCA. Our focus includes exploring multivariate data reconstruction, applying different weights to shrink singular values, and addressing a mixed-noise environment encompassing Gaussian noise, impulsive noise, and other corruption types, such as missing values and outliers. This comprehensive approach can significantly boost the robustness and precision of data reconstruction in IoTs.
A summary of research exploring RPCAs, TRPCAs, and our work within the context of noise, outliers, and missing value reconstruction in IoTs is outlined in Table 1. The X in Table 1 indicates that the paper considers the problem.

3. Preliminaries

3.1. Introduction to Tensors

This section briefly introduces the definitions, notation, and tensor operations used in this study. Table 2 lists mathematical symbols, definitions, and commonly used abbreviations.
G R n 1 × n 2 × n 3 . . . × n N represents a multiway array of the Nth order, also referred to as an N-way array or Nth-order tensor. In a specific instance in which N = 3, G R n 1 × n 2 × n 3 is defined as a third-order tensor. A slice is a data partition that occurs when one mode index is fixed, whereas the indices in the other two modes vary. The slices of a third-order tensor are illustrated in Figure 1. Fibers of the third-order tensor were obtained by maintaining all except one dimension constant, as shown in Figure 2.
For the tensor G R n 1 × n 2 × n 3 , the ith frontal slices are indicated by G ( i ) , where i ranges from one to n 3 . The operation u n f o l d is described as follows:
u n f o l d ( G ) = G ( 1 ) G ( 2 ) G ( n 3 )
Furthermore, the f o l d operation is as follows:
f o l d G ( 1 ) G ( 2 ) G ( n 3 ) = G
The block circulant matricization operator, denoted by c i r c , was defined in [21]. This operator reshapes tensor G R n 1 × n 2 × n 3 into a block circulant matrix of size G R n 1 n 3 × n 2 n 3 . The block circulant matricization operator arranges the frontal slices of tensor A in a circulant manner, thereby preserving the temporal relationships across the frontal slices and the multivariate correlations within the frontal slices.
c i r c ( G ) = G ( 1 ) G ( n 3 ) G ( 2 ) G ( 2 ) G ( 1 ) G ( 3 ) G ( n 3 ) G ( n 3 1 ) G ( 1 )
Within the tensor–SVD framework, the tensor product is conceptualized as an extension of the matrix product.
Definition 1. 
The tensor product [21] involves two tensors, G R n 1 × n 2 × n 3 and Y R n 1 × n 4 × n 3 . The t-product, represented by G Y , is defined as a tensor of size n 1 × n 4 × n 3 . This is given by
G Y = f o l d ( c i r c ( G ) · ( u n f o l d ( Y ) )
Definition 2. 
A conjugate transpose, as detailed in [21], involves a tensor G R n 1 × n 2 × n 3 . The conjugate transpose of this tensor, denoted by G R n 2 × n 1 × n 3 , is obtained by taking the conjugate transpose of each frontal slice and subsequently reversing the order of the transposed frontal slices from 2 to n 3 .
Definition 3. 
An identity tensor  [21] is a tensor G R n 1 × n 2 × n 3 . This tensor is characterized by its first frontal slice being an n × n identity matrix, whereas all other frontal slices consist entirely of zeros.
Definition 4. 
A block diagonal matrix  [41] with G ^ = f f t ( G ) represents the tensor obtained by executing a fast Fourier transform (FFT) along the third dimension of the tensor G R n 1 × n 2 × n 3 . The block diagonal matrix of G ^ is defined as follows:
G ^ = b l o c k d i a g ( G ^ ) = G ( 1 ) 0 G ( 2 ) 0 G ( n 3 )
Definition 5. 
An orthogonal tensor [21] is a tensor G R n 1 × n 1 × n 3 . This tensor is considered orthogonal if it fulfills the following condition:
G G T = G T G = I
Definition 6. 
f diagonal tensor  [21] is a tensor G R n 1 × n 1 × n 3 . This tensor is considered orthogonal if it satisfies the following conditions.
Theorem 1. 
Tensor Singular Value Decomposition (t-SVD) [21] is a method of decomposing a third-order tensor. It breaks down a tensor G R n 1 × n 2 × n 3 into three components: a core tensor D R n 1 × n 1 × n 3 , an orthogonal tensor on the right U R n 1 × n 1 × n 3 , and an orthogonal tensor on the left V R n 2 × n 2 × n 3 . The decomposition is expressed as follows:
G = U D V T
In the t-SVD process for a third-order tensor, as illustrated in Algorithm 1, tensor G R n 1 × n 2 × n 3 is decomposed into three distinct tensors. U and V are orthogonal tensors, whereas D is an f diagonal core tensor. Each frontal slice of the core tensor D is a diagonal matrix, as shown in Figure 3.
Algorithm 1 Tensor singular value decomposition (t-SVD).
1:
Input:  G R n 1 × n 2 × n 3
2:
P = fft ( G , [ ] , 3 )
3:
for  i = 1 to n 3 do
4:
    [ U , D , V ] = SVD ( G ( : , : , i ) )
5:
   Determine frontal slices of U, D, and V
6:
    U ^ ( : , : , i ) = U
7:
    D ^ ( : , : , i ) = D
8:
    V ^ ( : , : , i ) = V
9:
end for
10:
U = i f f t ( U ^ , [ ] , 3 ) , D = i f f t ( D ^ , [ ] , 3 ) , V = i f f t ( V ^ , [ ] , 3 )
11:
Output: orthogonal tensor U , D and core tensor V
Figure 3. Tensor singular value decomposition (t-SVD).
Figure 3. Tensor singular value decomposition (t-SVD).
Applsci 14 04239 g003
Definition 7. 
The tubal rank  [41] is the count of non-zero singular tubes present in the core tensor D , which is derived from the t-SVD of G R n 1 × n 2 × n 3 .
Definition 8. 
The tensor nuclear norm [42], denoted · * of tensor G R n 1 × n 2 × n 3 , is the mean value of the nuclear norm of all frontal slices of the tensor G ^ .   
G * = 1 n 3 G ^ * = 1 n 3 j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j
Definition 9. 
The weighted tensor nuclear norm [24], represented as · * , ω of tensor G R n 1 × n 2 × n 3 , is the mean value of the weighted nuclear norm of all frontal slices of tensor G ^ given that ω 0 .
G * , ω = 1 n 3 j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) ω i j σ i j

3.2. Tensor Robust Principal Component Analysis with Weighted Tensor Nuclear Norm Minimization

The RPCA is designed to accurately separate a low-rank matrix L and a sparse matrix C from a corrupted matrix G R n 1 × n 2 . A direct solution to this problem is as follows:
min L , C r a n k ( L ) + λ C 0 , s . t . G = L + C ,
Here, the 0 -norm is denoted by · 0 , and the weight-adjusting parameter λ is positive. The rank of the matrix is presented by r a n k ( · ) . Equation (10) represents the matrix rank minimization, which is a non-convex and NP-hard problem. A more feasible approach to the low-rank matrix reconstruction problem is to minimize a weighted linear combination of the matrix nuclear norm and the 1 -norms [28]. The approach is as follows:
min L , C L * + λ C 1 , s . t . G = L + C
In Equation (11), | | L | | * = i = 1 m i n ( n 1 , n 2 ) σ i is the matrix nuclear norm, and σ i is the i t h singular value of L . The 1 -norm is denoted as · 1 . Introducing the weighted nuclear norm allows different singular values to shrink differently, thereby preserving major data components [43]. This is expressed as follows:
min L , C L * , ω + λ C 1 , s . t . G = L + C
In Equation (12), | | L | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i is the weighted nuclear norm (WNN), and ω 0 is the weight parameter. Additionally, the RPCA is expanded to handle multi-dimensional data while maintaining the tensor structure via the TRPCA. This technique has been effective in several fields including image processing, background removal, and image reconstruction. It has proven particularly useful in addressing noise damage issues in IoTs. As shown in Figure 4, the TRPCA is used to restore low-rank tensors damaged by sparse noise. The different colors present different columns or attributes in the data tensor.
The weighted tensor nuclear norm (WTNN) minimization for the TPRCA [44] is given as follows:
min L , C L * , ω + λ C 1 , s . t . G = L + C
where | | L | | * , ω = j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j ω i j , the weight parameters, are arranged such that a more significant singular value is paired with a smaller weight and vice versa. This configuration ensures equal treatment of all singular values within the objective function. Following this, the weight parameters were initialized and fixed in non-decreasing order as follows: 0 ω 1 ω 2 . . . ω m i n ( n 1 , n 2 ) .

3.3. Tensor Completion with Weighted Tensor Nuclear Norm Minimization

The matrix completion (MC) model aims to estimate missing values based on incomplete observations. This model can be represented by the following equation [45]:
min A r a n k ( A ) , s . t . P Ω ( A ) = P Ω ( B )
In Equation (14), A R n 1 × n 2 represents the matrix, Ω indicates the support set, P Ω is the orthogonal projection onto the span of the matrices, and the values of the matrices disappear outside of Ω . Therefore, the ( i , j ) t h component of P Ω ( A ) equals B i j if the ( i , j ) t h component Ω and is zero otherwise. Given the NP-hard complexity of minimizing the matrix rank, the nuclear norm minimization problem offers an effective approximation of the MC model [45]:
min A | | A | | * s . t . P Ω ( A ) = P Ω ( B )
In Equation (15), | | A | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i represents the nuclear norm of the matrix, where σ i is the i t h singular value of A. Nevertheless, this approximation does not adequately account for the most and least significant singular values. An improved solution is the weighted nuclear norm, which assigns higher weights to less significant singular values and lower weights to more significant ones [46]:
min A | | A | | * , ω s . t . P Ω ( A ) = P Ω ( B )
where | | A | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i is the WNN, and ω 0 is the weight parameter. Tensor completion, a multi-dimensional extension of matrix completion, is depicted in Figure 5. The data tensor’s various colors correspond to distinct columns or properties.
WTNN minimization for TC was proposed in [24] and can be expressed as follows:
min A | | A | | * , ω s . t . P Ω ( A ) = P Ω ( B )

4. The Proposed Model

Many studies regarding IoT data corruption have not taken into account all the different types of corruption that can occur. In this proposed model, we use a combination of the WRTPCA and WTC. The input data for this method comprise a tensor that has been damaged with missing values, mixed noise, and outliers. We apply WTSVT (Algorithm 2) in both WTC and the WRTPCA. WTC (Algorithm 3) results in a new tensor that has no missing values. This new tensor is then input into the WRTPCA (Algorithm 4). After applying this proposed model, we obtain a final tensor that has no missing values, mixture noise, or outliers. Figure 6 provides an overview of this proposed model. Before discussing the details of this method, we present the mathematical foundations of WTC and the WRTPCA.
To recover the missing-value tensor, Equation (17) can be solved to extract the low-rank structure from the incomplete tensor data using the alternating direction method of multipliers (ADMMs) [24] as follows:
W ^ i + 1 = arg min W ^ ( | | W ^ | | * , ω β i 2 W ^ A ^ i 1 β i U ^ i F 2 )
A i + 1 = arg min A ( δ Y = P Ω ( X ) + U ( : ) , A ( : ) + β i 2 A W i + 1 F 2 )
U i + 1 = U i + β i ( A i + 1 W i + 1 )
The WRTPCA optimization model, depicted in Equation (13), is frequently resolved by employing the ADMM [33]. The solution to the low-rank optimization problem can be expressed as follows:
L i + 1 = arg min L ( | | L | | * , ω + μ i 2 L G + C i Y i μ i F 2 )
C i + 1 = arg min C ( λ | | C | | 1 + μ i 2 L i + 1 G + C Y i μ i F 2 )
Y i + 1 = Y i + μ i ( L i + 1 + C i + 1 G )
Algorithm 2 Weighted tensor singular value thresholding method ( WTSVT ).
1:
Input:  M R n 1 × n 2 × n 3 , β , ω
2:
F = fft ( M , [ ] , 3 )
3:
for  i = 1 to n 3  do
4:
    [ U , D , V ] = SVD ( F ( : , : , i ) )
5:
    d i a g D = d i a g ( D ) ω β
6:
    ddiagD = d i a g ( d i a g D )
7:
    U ^ ( : , : , i ) = U
8:
    D ^ ( : , : , i ) = ddiagD
9:
    V ^ ( : , : , i ) = V
10:
end for
11:
U= i f f t ( U ^ , [ ] , 3 ) , D= i f f t ( D ^ , [ ] , 3 ) , V= i f f t ( V ^ , [ ] , 3 )
12:
Output: orthogonal tensor U , D and core tensor V
Weighted tensor singular value thresholding (WTSVT), with a threshold based on the weighted tensor nuclear norm (WTNN), employs t-SVD [24], which solves the drawbacks of using a fixed threshold for each singular value. Equations (18) for TC and (21) in the TRPCA are solved using WTSVT. This method helps recover missing values in the TC and minimizes noise and outliers in the TRPCA [33]. To maintain essential data components, WTSVT is used to optimize the low-rank tensor L . WTSVT calculates the total weighted singular values over all the frontal slices of the tensor data, ensuring that greater singular values decrease less. In Algorithms 3 and 4, the WTSVT operator is used, and it is defined in Algorithm 2. The objective of Algorithm 2 is to break down the input tensor into three tensors, with the middle tensor being a low-rank tensor. The inputs for WTSVT include the input tensor M and the weighted vector ω , and β is the penalty factor. The notation f f t represents the FFT used to compute the discrete Fourier transform (DFT) of a sequence. In contrast, i f f t represents the inverse fast Fourier, which essentially reverses the FFT process. First, the input tensor is transformed using f f t . Next, the loop of Algorithm 2 begins, and each frontal slice of the input tensor is applied ( S V D ). The process S V D breaks down a matrix into three separate matrices—a left singular matrix, a diagonal matrix of singular values, and a matching singular matrix. The d i a g pertains to the diagonal elements of the singular matrix. The operation d i a g ( D ) ω β takes each diagonal component, converts it into a vector, and subtracts it, with each value in vector ω already divided to β . Subsequently, the d i a g ( d i a g D ) converts d i a g D into a diagonal matrix with shrunken singular values. The weight shrinks the diagonal elements in the singular matrix D. After completing S V D for all frontal slices, i f f t is used with the three components to obtain results.
Algorithm 3 Weighted tensor completion.
  • Input:  B R n 1 × n 2 × n 3 with missing values, weighted vector ω
  • Initialize:  A 0 = B , W 0 = B , U 0 = O , ϵ = 1 × 10 8 , ρ = 1.1 , β 0 = 1 × 10 1
  • while not converged do
  •    Update W ^ i + 1 = WTSVT ( A i ^ + U ^ i β i , ω , β i )
  •    Update A i + 1 = W i + 1 1 Z i U i , P Ω ( A i + 1 ) = P Ω ( B )
  •    Update U i + 1 = U i + β i ( A i + 1 W i + 1 )
  •    Update β i + 1 = ρ β i
  •    Check the convergence criteria A i + 1 W i F 2 ϵ or A i A i + 1 F 2 ϵ or W i W i + 1 F 2 ϵ
  • end while
  • Output: low-rank tensor without missing value A
The solution to Equation (18) is obtained through WTSVT (Algorithm 2), and Equation (19) represents the least-squares projection constrained by the problem [42]. The δ -indicator function maps the elements of a subset of a set to one and all other elements to zero. Following MATLAB R2021a notation, the symbols U ( : ) and G ( : ) signify the tensor-to-vector conversion. To recover the missing values, the ADMM is implemented, the details of which are provided in Algorithm 3. The input to Algorithm 3 includes a tensor with the missing values B and weighted vector ω . First, we initialize the tensors A , W , and U as B , B , and O , respectively. Here, A is the output vector without any missing values, W is the tensor that helps the algorithms ensure the constraint, and U is the dual factor of the ADMM, which represents the augmented Lagrange penalty parameter. The step size is denoted as β . An n 1 × n 2 × n 3 -tensor with all its elements set to zero is denoted as O . The other parameters ϵ and ρ are the threshold stopping algorithm and the degree of increase in the step size β in each iteration, respectively. Starting with the loop in Algorithm 3, W is updated using WTSVT in Algorithm 2. Furthermore, A is updated; however, the constraint P Ω ( A i + 1 ) = P Ω ( B ) must be ensured. The dual factor U and step size β are also updated after that. The algorithm stops updating when A i + 1 W i F 2   ϵ or A i A i + 1 F 2   ϵ or W i W i + 1 F 2   ϵ .
Algorithm 4 Weighted robust tensor principal component analysis integrated with weighted tensor completion.
  • Input:  G R n 1 × n 2 × n 3 with mixed noise, outlier and missing value; weight vector ω
  • Initialize:  L 0 = O , C 0 = O , Y 0 = O , μ 0 = 1 × 10 1 , μ max = 1 × 10 10 , ϵ = 1 × 10 8 , ρ = 1.1 , λ = 1 max ( n 1 , n 2 ) × n 3
  • Reconstruct incompleted G by Algorithm 3
  • while not converged do
  •    Update L i + 1 = WTSVT ( G C k Y i μ i , ω , μ i )
  •    Update C i + 1 = prox l 1 , λ μ i ( G L i + 1 Y i μ i )
  •    Update Y i + 1 = Y i + μ i ( L i + 1 + C i + 1 G )
  •    Update μ i + 1 = min ( ρ μ i , μ max )
  •    Check the convergence criteria L i + 1 L i F   ϵ or C i + 1 C i F   ϵ or G L i + 1 C i + 1 F   ϵ
  • end while
  • Output:  L low-rank tensor without missing values, C sparse mixture noise, and outlier tensor.
To reduce multiple noises, outliers in Equation (21) can be solved using WTSVT (Algorithm 2), and the solution of Equation (22) is a proximal function that shrinks all values. The details of the process for reducing mixture noise and outliers and reconstructing missing values are given in Algorithm 4, which describes WRTPCA integrated with WTC and uses the ADMM to extract low-rank data without missing values and sparse noise tensors from the damaged data tensor. This helps reconstruct missing data and reduce multiple noises and outliers. In Algorithm 4, we initialize the components and parameters. An n 1 × n 2 × n 3 -tensor with all its elements set to zero is denoted as O . L and C are a low-rank tensor present for normal data without missing values, noise, and outliers and a sparse tensor that indicates outlier and mixed noise, respectively. The ADMM updates the dual variable Y , which represents the augmented Lagrange penalty parameter. The step size is denoted by μ , and the maximum step size is μ m a x . ρ is the level of increase in step size μ in each iteration. μ can be set as fixed, but increasing ρ μ i at each iteration helps accelerate convergence. ϵ , λ , and ω are the thresholds of the convergence condition, balance parameter, and weighted vector, respectively. Subsequently, the low-rank tensor L is filled with missing values using Algorithm 3. Subsequently, the loop of Algorithm 4 starts reducing the mixed noise and outliers and starts reconstructing the missing values. In the iteration, the tensor L is updated by applying the WTSVT operator defined in Algorithm 2 to obtain the low rank of L . Next, the operator prox l 1 , λ / μ i ( . ) in Algorithm 4 is applied to update C . For example, with tensor G , the proximal operator of the prox l 1 , λ / μ i ( G ) , given as prox l 1 , λ / μ i ( G ) = max ( | G i j k | λ / μ i ) , 0 · sign ( G i j k ) , is applicable to all elements G i j k within the tensor. The augmented Lagrange penalty parameter Y uses a step size denoted as μ i when updating. The convergence condition of the loop required to bring the ADMM algorithm to a stop is defined as follows: L i + 1 L i F   ϵ , C i + 1 C i F   ϵ , G L i + 1 C i + 1 F   ϵ .

5. Experiments and Results

5.1. Dataset

The U.S. Climate Normals dataset (https://www.ncdc.noaa.gov/cdo-web/datasets, accessed on 16 June 2023) comprises weather and climate data from over 1100 U.S. stations and territories. It includes hourly, daily, monthly, seasonal, and annual readings of temperature, wind statistics, mean sea level pressure, dew point, and cloud cover. These records undergo thorough quality assurance assessments at the National Centers for Environmental Information (NCEI) of the National Oceanic and Atmospheric Administration (NOAA).
The NDBC-TAO dataset https://tao.ndbc.noaa.gov/tao/data_download (accessed on on 10 June 2023) was collected from sensors in the Tropical Pacific Ocean and sent to the National Oceanic and Atmospheric Administration (NOAA). These sensors measure different attributes including sea surface temperature, wind speed, conductivity, sea level pressure, and salinity.
Details regarding truth data tensors for both the U.S. Climate Normal dataset and the NDBC-TAO dataset are shown in Table 3.

5.2. Low-Rank Structures and Correlation in Multi-Attribute Sensing Data

Through SVD [13], the low-rank data and attribute interrelations of the data matrix can be confirmed. t-SVD [22] is a potent resource for investigating the interplay among multiple attributes. The low-rank characteristics of both datasets are shown in Figure 7 and were obtained by evaluating the singular values of the block diagonal matrix. In t-SVD, the correlation among numerous attribute surfaces is determined by assessing the core tensor’s block-diagonal matrices’ singular values. The initial singular values primarily influence the energy of the tensor data.
In Figure 7, it can be seen that each singular value has a different importance value, and the larger singular values contain more main data information; therefore, it is necessary to shrink different singular values using different weights rather than a fixed weight.

5.3. Experiment Setup

This section outlines a series of experiments conducted to confirm the efficacy of WRTPCA_WTNN, the proposed method. Its performance was compared with that of three other methods: the TRPCA [22], WTC [24], and the TRPCA combined with TC using the weighted sum tensor nuclear norm (TRPCA_TNN) [11]. This study used two real-world IoT datasets, namely the U.S. Climate Normal and NDBC-TAO datasets, to analyze their recovery under various conditions, including sparse mixed noise, outliers, and missing values. Various methods were used in these experiments to achieve optimal visual results.
All methods were carefully fine-tuned and tested repeatedly, 20 times in total, for all corrupted cases. The average values were calculated to obtain the results. Data corruption was characterized using four factors: Gaussian noise, impulsive noise, outliers, and missing values.
In extensive experiments, we assessed the performance of our model using different types of corrupted data. For Gaussian noise, we chose a zero mean and investigated ten variance levels ( σ 2 ) ranging from 11 to 20 in increments of one. Impulsive noise was examined at ten percentage levels ( ρ n ) from 0.1 to 0.55, with a step size of 0.05. Outliers were studied at ten magnitudes (k) ranging from 6 to 15 with a step size of 1, each being k times the standard deviation ( σ ) of each attribute. Missing values were explored at ten ratio levels ( ρ m ) from 0.1 to 0.55, with a step size of 0.05. Table 4 presents detailed parameters of the four corruption types.
In each experimental case, we varied only the type of corruption across the levels and held the other parameters constant. The fixed values for the experiment were a Gaussian noise variance ( σ 2 ) set at 15, an impulsive noise percentage ( ρ n ) set at 0.3, an outlier magnitude (k) set at 15, and a missing ratio ( ρ m ) set at 0.3. For instance, in the Gaussian noise experiment, we altered the Gaussian noise variances ( σ 2 ) from 11 to 20 in steps of 1 while maintaining an impulsive noise percentage ( ρ n ) of 0.3, an outlier magnitude (k) of 15, and a missing ratio ( ρ m ) of 0.3.
Two algorithms, labeled Algorithms 3 and 4, were initialized with different WTSVT weight values. Specifically, ω = ( 1 ; 1.9 ; 2.1 ) was used in Algorithm 4, whereas ω = ( 1 ; 1 ; 1.6 ) was used in Algorithm 3. It was necessary to select appropriate values for μ 0 , μ max , ϵ , and ρ , which were the characteristics of the sensing data. In this study, the values of μ 0 , μ max , ϵ , and ρ were set to 1 × 10 1 , 1 × 10 10 , 1 × 10 8 , and 1.1 , respectively. The experimental results showed promising outcomes.
The experimental results were averaged across 20 replicates. All simulations used MATLAB R2021a on an Intel(R) Core(TM) i7-10700K CPU 3.80 GHz (Intel, Santa Clara, CA, USA).

5.4. Metrics

Reconstruction accuracy was evaluated using the normalized mean absolute error (NMAE). The NMAE for each of the three features considered in the dataset was determined by comparing the lateral slices of the input data with the reconstructed low-rank tensor.
N M A E = i n 2 L ( : , i , : ) L ^ ( : , i , : ) i n 2 L ( : , i , : )
The original tensor is represented by L , and the reconstructed low-rank tensor is denoted by L ^ . A comparison between the two tensors served as the foundation for the obtained results.

5.5. Results and Analysis

Each subfigure represents the results of the experiments, each involving a specific type of data corruption for a particular attribute within the datasets. The horizontal axis shows the levels of data corruption types, and the vertical axis illustrates the NMAE values of the four models in each case.
For Gaussian and impulsive noise, Figure 8 and Figure 9 illustrate the results of the comparison of our models and others on the NDBC-TAO and U.S. Climate Normal datasets. Across all models, the proposed model consistently outperformed the other methods. In particular, the NMAE values of our method applied to the two datasets consistently fell below 0.1 in most noise cases.
In addition, the proposed model can handle outliers. The NMAE values of all models in outlier cases are shown in Figure 10 for the two datasets. The results of the other models are worse than those of the proposed model, and the results of our model applied to the two datasets are below 0.1 in most outlier cases.
Finally, the missing values are also reconstructed by our model, and the results of an experiment on the two datasets in the missing-value cases of the proposed model and the three different models are depicted in Figure 11. The experiment shows that the NMAE of the proposed model surpasses the NMAE values of the WTC, TRPCA, and TRPCA-TNN methods and maintains a value below 0.1 when applied to the two datasets in most missing-value cases.
Although each figure shows a comparison of the methods for each type of corruption, the default datasets consistently include a blend of noise, outliers, and missing values. Therefore, the reason the best outcomes were achieved by the proposed model is that it considers all types of corruption by employing WTSVT as a weighted approach for the TRPCA and TC, which shrinks singular values based on their significance and improves the capacity to reduce mixture noise and outliers and reconstruct missing values. Every singular value has distinct importance, as indicated in Section 5.2, and the more significant the data expressed, the greater the singular value. Therefore, we must reduce the distinct singular values using varying weights rather than fixed weights, as in most studies. In contrast, the WTC method consistently underperforms in all corruption cases. The WTC method performs poorly in all cases because it specializes in reconstructing missing values and performs poorly in reducing noise and outliers. The TRPCA method consistently outperforms the WTC method. However, it still requires consideration of the weights of the singular values to enhance its ability to handle mixed noise and outliers. In some cases with high missing value ratios, such as a missing value ratios from 0.4 to 0.55 in the dew attribute of the U.S Climate Normal dataset, the TRPCA performs worse than WTC. The effectiveness of the TRPCA in recovering missing values diminishes at higher missing value ratios because it is specifically designed to address noise and outlier problems, not missing data. The TRPCA is still helpful for some small ratios of missing values because the process extracts low-rank tensors that can recover but perform poorly. In addition, the TRPCA-TNN method performed better than the WTC and TRPCA methods but worse than the proposed model. This method combines the TRPCA, which specializes in noise and outliers, and TC solved using the weighted sum tensor nuclear norm, which specializes in missing values. The TRPCA in the TRPCA-TNN method does not consider the weights of singular values; therefore, the ability to reduce noise and outliers of the TRPCA-TNN method is still inferior to that of the proposed model. This model is still superior to the TRPCA at reducing noise and outliers because, in addition to the TRPCA, it also has a TC process that recovers missing values, which reduces noise and outliers with low accuracy. In the specialized recovery of missing values inthe TRPCA-TNN method, TC using the weighted sum tensor nuclear norm performs worse than TC using the weighted tensor nuclear norm. Owing to these limitations, the TRPCA-TNN method performed worse than the proposed model.
The performance of the U.S. Climate Normal dataset was lower than that of the NDBC-TAO dataset because the attributes in this dataset might have a low correlation as there are many attributes, such as temperature, wind statistics, mean sea level pressure, dew point, and cloud cover. However, we chose only three features, a number equal to the number of features in the NDBC-TAO dataset, to create the experimental dataset. In the NDBC-TAO dataset, the results for all scenarios of all models were consistently under 1.0 NMAE. Meanwhile, in the U.S. Climate Normal dataset, the results of other models in some complicated cases reached an NMAE of 5.0.

6. Conclusions

This study proposes a new technique for recovering multivariable data from 5G-based IoTs by combining TRPCA and TC approaches. The proposed approach can recover missing values, multiple noises, and outlier issues. By using the correlation between multi-attributes and solving problems using tensor data, this method can improve system performance. This uniqueness arises from the incorporation of WTSVT into TC and the TRPCA to handle singular values, which increases reconstruction accuracy by retrieving essential components. This combination overcomes the limitations of other models, such as WTC, the TRPCA, and the TRPCA-TNN, and significantly improves the ability to reduce mixed noise and outliers and reconstruct missing values. The proposed method is highly resistant to data corruption, including mixed noise, outliers, and missing values. Its NMAE consistently outperformed other metrics across two datasets, the NDBC-TAO and U.S. Climate Normal datasets. This method can be useful in various applications, particularly those related to the 5G-based IoT in real-world scenarios. Thus, these findings bridge the gap in the literature regarding better ways to handle extensive data analysis within the IoT environment.
Our objective in the near future is to automate the process of choosing the most appropriate weight for a particular dataset. This will allow us to utilize the most efficient and precise decision-making methods. Furthermore, we will explore situations in which there is a correlation between errors or noise, such as when one type of error is dependent on another. In addition, we will consider ways to reduce the complexity of the proposed algorithm.

Author Contributions

Conceptualization, H.H.-P.V.; methodology, H.H.-P.V.; formal analysis, H.H.-P.V.; writing—original draft preparation, H.H.-P.V.; writing—review and editing, M.Y. and T.M.N.; visualization, H.H.-P.V.; supervision, M.Y.; funding acquisition, M.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by MSIT under the Information Technology Research Center (ITRC) Support Program Supervised by IITP under grant IITP-2023-2021-0-02046.

Data Availability Statement

Publicly available datasets were analyzed in this study (Section 5.1). This data can be found here: https://www.ncdc.noaa.gov/cdo-web/datasets, (accessed on 16 June 2023), https://tao.ndbc.noaa.gov/tao/data_download (accessed on on 10 June 2023).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Elsheakh, D.; Shawkey, H. 5G wideband on-chip dipole antenna for WSN soil moisture monitoring. Int. J. RF Microw. Comput.-Aided Eng. 2021, 31, e22556. [Google Scholar] [CrossRef]
  2. Shawkey, H.; Elsheakh, D. Multiband dual-meander line antenna for body-centric networks’ biomedical applications by using UMC 180 nm. Electronics 2020, 9, 1350. [Google Scholar] [CrossRef]
  3. Alliance, N. 5G white paper. In Next Generation Mobile Networks, White Paper; 2015; Volume 1, Available online: https://pub.deadnet.se/Books%20and%20Docs%20on%20Hacking/Networking/Wireless%20LAN/NGMN%205G%20White%20Paper%20V1.0.pdf (accessed on 12 May 2024).
  4. Jaladi, A.R.; Khithani, K.; Pawar, P.; Malvi, K.; Sahoo, G. Environmental monitoring using wireless sensor networks (WSN) based on IOT. Int. Res. J. Eng. Technol. 2017, 4, 1371–1378. [Google Scholar]
  5. Corke, P.; Wark, T.; Jurdak, R.; Hu, W.; Valencia, P.; Moore, D. Environmental wireless sensor networks. Proc. IEEE 2010, 98, 1903–1917. [Google Scholar] [CrossRef]
  6. Alippi, C.; Camplani, R.; Galperti, C.; Roveri, M. A robust, adaptive, solar-powered WSN framework for aquatic environmental monitoring. IEEE Sens. J. 2010, 11, 45–55. [Google Scholar] [CrossRef]
  7. Ko, J.; Lu, C.; Srivastava, M.B.; Stankovic, J.A.; Terzis, A.; Welsh, M. Wireless sensor networks for healthcare. Proc. IEEE 2010, 98, 1947–1960. [Google Scholar] [CrossRef]
  8. Sharma, N.; Kaushik, I.; Bhushan, B.; Gautam, S.; Khamparia, A. Applicability of WSN and biometric models in the field of healthcare. In Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks; IGI Global: Hershey, PA, USA, 2020; pp. 304–329. [Google Scholar]
  9. Xie, K.; Ning, X.; Wang, X.; Xie, D.; Cao, J.; Xie, G.; Wen, J. Recover corrupted data in sensor networks: A matrix completion solution. IEEE Trans. Mob. Comput. 2016, 16, 1434–1448. [Google Scholar] [CrossRef]
  10. Majumder, B.D.; Roy, J.K.; Padhee, S. Recent advances in multifunctional sensing technology on a perspective of multi-sensor system: A review. IEEE Sens. J. 2018, 19, 1204–1214. [Google Scholar] [CrossRef]
  11. Rajesh, G.; Chaturvedi, A. Data reconstruction in heterogeneous environmental wireless sensor networks using robust tensor principal component analysis. IEEE Trans. Signal Inf. Process. Netw. 2021, 7, 539–550. [Google Scholar] [CrossRef]
  12. Zhang, X.; He, J.; Li, Y.; Chi, Y.; Zhou, Y. Recovery of corrupted data in wireless sensor networks using tensor robust principal component analysis. IEEE Commun. Lett. 2021, 25, 3389–3393. [Google Scholar] [CrossRef]
  13. He, J.; Li, Y.; Zhang, X.; Li, J. Missing and Corrupted Data Recovery in Wireless Sensor Networks Based on Weighted Robust Principal Component Analysis. Sensors 2022, 22, 1992. [Google Scholar] [CrossRef] [PubMed]
  14. Xiao, F.; Liu, W.; Li, Z.; Chen, L.; Wang, R. Noise-tolerant wireless sensor networks localization via multinorms regularized matrix completion. IEEE Trans. Veh. Technol. 2017, 67, 2409–2419. [Google Scholar] [CrossRef]
  15. Madi, G.; Sacuto, F.; Vrigneau, B.; Agba, B.L.; Pousset, Y.; Vauzelle, R.; Gagnon, F. Impacts of impulsive noise from partial discharges on wireless systems performance: Application to MIMO precoders. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 186. [Google Scholar] [CrossRef]
  16. Al Samara, M.; Bennis, I.; Abouaissa, A.; Lorenz, P. An efficient outlier detection and classification clustering-based approach for WSN. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  17. Deng, Y.; Han, C.; Guo, J.; Sun, L. Temporal and spatial nearest neighbor values based missing data imputation in wireless sensor networks. Sensors 2021, 21, 1782. [Google Scholar] [CrossRef] [PubMed]
  18. Cheng, J.; Ye, Q.; Jiang, H.; Wang, D.; Wang, C. STCDG: An efficient data gathering algorithm based on matrix completion for wireless sensor networks. IEEE Trans. Wirel. Commun. 2012, 12, 850–861. [Google Scholar] [CrossRef]
  19. Magán-Carrión, R.; Camacho, J.; García-Teodoro, P. Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 672124. [Google Scholar] [CrossRef]
  20. Srindhuna, M.; Baburaj, M. Estimation of missing data in remote sensing images using t-SVD based tensor completion. In Proceedings of the 2020 International Conference for Emerging Technology (INCET), Belgaum, India, 5–7 June 2020; pp. 1–5. [Google Scholar]
  21. Kilmer, M.E.; Martin, C.D. Factorization strategies for third-order tensors. Linear Algebra Its Appl. 2011, 435, 641–658. [Google Scholar] [CrossRef]
  22. He, J.; Zhou, Y.; Sun, G.; Geng, T. Multi-attribute data recovery in wireless sensor networks with joint sparsity and low-rank constraints based on tensor completion. IEEE Access 2019, 7, 135220–135230. [Google Scholar] [CrossRef]
  23. Li, T.; Ma, J. T-SVD based non-convex tensor completion and robust principal component analysis. In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 6980–6987. [Google Scholar]
  24. Mu, Y.; Wang, P.; Lu, L.; Zhang, X.; Qi, L. Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD. Pattern Recognit. Lett. 2020, 130, 4–11. [Google Scholar] [CrossRef]
  25. Ng, M.K.P.; Yuan, Q.; Yan, L.; Sun, J. An adaptive weighted tensor completion method for the recovery of remote sensing images with missing data. IEEE Trans. Geosci. Remote Sens. 2017, 55, 3367–3381. [Google Scholar] [CrossRef]
  26. Cheng, Q.; Yuan, Q.; Ng, M.K.P.; Shen, H.; Zhang, L. Missing data reconstruction for remote sensing images with weighted low-rank tensor model. IEEE Access 2019, 7, 142339–142352. [Google Scholar] [CrossRef]
  27. Geng, J.; Wang, L.; Xu, Y.; Wang, X. A weighted nuclear norm method for tensor completion. Int. J. Signal Process. Image Process. Pattern Recognit. 2014, 7, 1–12. [Google Scholar] [CrossRef]
  28. Candès, E.J.; Li, X.; Ma, Y.; Wright, J. Robust principal component analysis? J. ACM (JACM) 2011, 58, 1–37. [Google Scholar] [CrossRef]
  29. Kang, J.; Wang, Y.; Schmitt, M.; Zhu, X.X. Object-based multipass InSAR via robust low-rank tensor decomposition. IEEE Trans. Geosci. Remote Sens. 2018, 56, 3062–3077. [Google Scholar] [CrossRef]
  30. Zhang, A.; Liu, F.; Du, R. Probability-weighted tensor robust PCA with CP decomposition for hyperspectral image restoration. Signal Process. 2023, 209, 109051. [Google Scholar] [CrossRef]
  31. Ruhan, A.; Mu, X.; He, J. Enhance tensor RPCA-based Mahalanobis distance method for hyperspectral anomaly detection. IEEE Geosci. Remote Sens. Lett. 2022, 19, 6008305. [Google Scholar]
  32. Guyon, C.; Bouwmans, T.; Zahzah, E.H. Robust principal component analysis for background subtraction: Systematic evaluation and comparative analysis. Princ. Compon. Anal. 2012, 10, 223–238. [Google Scholar]
  33. Gao, Q.; Zhang, P.; Xia, W.; Xie, D.; Gao, X.; Tao, D. Enhanced tensor RPCA and its application. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 43, 2133–2140. [Google Scholar] [CrossRef] [PubMed]
  34. Zhang, L.; Tan, T.; Gong, Y.; Yang, W. Fingerprint database reconstruction based on robust PCA for indoor localization. Sensors 2019, 19, 2537. [Google Scholar] [CrossRef]
  35. Liu, X.; Chen, X.; Li, J.; Chen, Y. Nonlocal weighted robust principal component analysis for seismic noise attenuation. IEEE Trans. Geosci. Remote Sens. 2020, 59, 1745–1756. [Google Scholar] [CrossRef]
  36. Chang, Y.; Yan, L.; Zhao, X.L.; Fang, H.; Zhang, Z.; Zhong, S. Weighted low-rank tensor recovery for hyperspectral image restoration. IEEE Trans. Cybern. 2020, 50, 4558–4572. [Google Scholar] [CrossRef]
  37. Mu, X.; He, J.; Zhang, J. Enhance tensor RPCA-LRX anomaly detection algorithm for hyperspectral image. Geocarto Int. 2022, 37, 11976–11997. [Google Scholar]
  38. Chander, B.; Kumaravelan, G. Outlier detection strategies for WSNs: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 5684–5707. [Google Scholar] [CrossRef]
  39. Tay, D.B. Sensor network data denoising via recursive graph median filters. Signal Process. 2021, 189, 108302. [Google Scholar] [CrossRef]
  40. Wilson, A.M.; Panigrahi, T.; Dubey, A. Robust distributed Lorentzian adaptive filter with diffusion strategy in impulsive noise environment. Digit. Signal Process. 2020, 96, 102589. [Google Scholar] [CrossRef]
  41. Kilmer, M.E.; Braman, K.; Hao, N.; Hoover, R.C. Third-order tensors as operators on matrices: A theoretical and computational framework with applications in imaging. SIAM J. Matrix Anal. Appl. 2013, 34, 148–172. [Google Scholar] [CrossRef]
  42. Zhang, Z.; Ely, G.; Aeron, S.; Hao, N.; Kilmer, M. Novel methods for multilinear data completion and de-noising based on tensor-SVD. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 3842–3849. [Google Scholar]
  43. Gu, S.; Xie, Q.; Meng, D.; Zuo, W.; Feng, X.; Zhang, L. Weighted nuclear norm minimization and its applications to low level vision. Int. J. Comput. Vis. 2017, 121, 183–208. [Google Scholar] [CrossRef]
  44. Gao, Q.; Xia, W.; Wan, Z.; Xie, D.; Zhang, P. Tensor-SVD based graph learning for multi-view subspace clustering. In Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; Volume 34, pp. 3930–3937. [Google Scholar]
  45. Candes, E.J.; Plan, Y. Matrix completion with noise. Proc. IEEE 2010, 98, 925–936. [Google Scholar] [CrossRef]
  46. Gu, S.; Zhang, L.; Zuo, W.; Feng, X. Weighted nuclear norm minimization with application to image denoising. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 2862–2869. [Google Scholar]
Figure 1. Slices of third-order tensor G : (a) frontal slices; (b) lateral slices; (c) horizontal slices.
Figure 1. Slices of third-order tensor G : (a) frontal slices; (b) lateral slices; (c) horizontal slices.
Applsci 14 04239 g001
Figure 2. Fibers of third-order tensor G : (a) tube fibers; (b) column fibers; (c) row fibers.
Figure 2. Fibers of third-order tensor G : (a) tube fibers; (b) column fibers; (c) row fibers.
Applsci 14 04239 g002
Figure 4. Decomposition of low-rank and sparse components from corrupted TRPCA observation.
Figure 4. Decomposition of low-rank and sparse components from corrupted TRPCA observation.
Applsci 14 04239 g004
Figure 5. Missing and low-rank components of TC.
Figure 5. Missing and low-rank components of TC.
Applsci 14 04239 g005
Figure 6. Flowchart of our model—WRTPCA integrated with WTC.
Figure 6. Flowchart of our model—WRTPCA integrated with WTC.
Applsci 14 04239 g006
Figure 7. Low-rank structure within sensing data utilizing the singular values of the core tensor’s block diagonal matrices.
Figure 7. Low-rank structure within sensing data utilizing the singular values of the core tensor’s block diagonal matrices.
Applsci 14 04239 g007
Figure 8. Reconstruction of Gaussian noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Figure 8. Reconstruction of Gaussian noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Applsci 14 04239 g008aApplsci 14 04239 g008b
Figure 9. Reconstruction of impulsive noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Figure 9. Reconstruction of impulsive noise cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Applsci 14 04239 g009
Figure 10. Reconstruction of outlier cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Figure 10. Reconstruction of outlier cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Applsci 14 04239 g010
Figure 11. Reconstruction of missing value cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Figure 11. Reconstruction of missing value cases. (a) Temperature attribute of NDBC-TAO dataset; (b) density attribute of NDBC-TAO dataset; (c) salinity attribute of NDBC-TAO dataset; (d) dew attribute of U.S. Climate Normal dataset; (e) temperature attribute of U.S. Climate Normal dataset; (f) wind attribute of U.S. Climate Normal dataset.
Applsci 14 04239 g011
Table 1. Recent works on RPCA in IoTs.
Table 1. Recent works on RPCA in IoTs.
PaperYearMultivariateUnivariateCorrupted TypeWeightedMethod
Missing ValueNoiseOutlier
GaussianImpulsive
[11]2021 XXX TRPCA
[12]2021X X X TRPCA-TNN
[13]2022 XXX XWRPCA
Our2024X XXXXXWRTPCA-WTNN
Table 2. Mathematical notations and definitions.
Table 2. Mathematical notations and definitions.
NotationDefinition
g, g, G, G scalar, vector, matrix, and tensor formats
σ i ith singular value
G ( i , : , : ) , G ( : , i , : ) , G ( : , : , i ) ith horizontal slice, ith lateral slice, and ith frontal slice
G ( i ) G ( i ) = G ( , : , : i ) , ith frontal slice
G ^ Fourier transformation of G , G ^ = f f t ( G , [ ] , 3 )
| | G | | F Frobenius norm | | G | | F = i , j G ( i , j ) 2
| | G | | * nuclear norm | | G | | * = i = 1 m i n ( n 1 , n 2 ) σ i
| | G | | * , ω weighted nuclear norm | | G | | * , ω = i = 1 m i n ( n 1 , n 2 ) σ i ω i
| | G | | F tensor Frobenius norm | | G | | F = i , j , k G ( i , j , k ) 2
| | G | | * tensor nuclear norm G * = j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j
| | G | | * , ω weighted tensor nuclear norm | | G | | * , ω = j = 1 n 3 i = 1 m i n ( n 1 , n 2 ) σ i j ω i j
r a n k ( G ) rank of matrix G
r a n k ( G ) tubal rank of tensor G
t-SVDtensor singular value decomposition
ADMMalternative direction method of multipliers
WTNNweighted tensor nuclear norm
Ω position of missing elements in G
P Ω projection on Ω
Table 3. Real-world datasets for WNS.
Table 3. Real-world datasets for WNS.
NDBC-TAOU.S. Climate Normal
No. of nodes889
Period of observation1 October 2020 00:00:00
–3 October 2020 23:50:00
1 December 2022 00:00:00
–15 December 2022 23:00:00
Measured attributeTemperature, density, and salinityDew, temperature, and wind
Sampling period10 min1 h
Tensor dimension8 × 3 × 43289 × 3 × 360
Table 4. Detail parameters of each corruption type.
Table 4. Detail parameters of each corruption type.
Corruption TypeParameterRangeStep Size
Gaussian noise σ 2 11 to 201
Impulsive noise ρ n 0.1 to 0.550.05
Outlierk6 to 151
Missing value ρ m 0.1 to 0.550.05
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Vo, H.H.-P.; Nguyen, T.M.; Yoo, M. Weighted Robust Tensor Principal Component Analysis for the Recovery of Complex Corrupted Data in a 5G-Enabled Internet of Things. Appl. Sci. 2024, 14, 4239. https://doi.org/10.3390/app14104239

AMA Style

Vo HH-P, Nguyen TM, Yoo M. Weighted Robust Tensor Principal Component Analysis for the Recovery of Complex Corrupted Data in a 5G-Enabled Internet of Things. Applied Sciences. 2024; 14(10):4239. https://doi.org/10.3390/app14104239

Chicago/Turabian Style

Vo, Hanh Hong-Phuc, Thuan Minh Nguyen, and Myungsik Yoo. 2024. "Weighted Robust Tensor Principal Component Analysis for the Recovery of Complex Corrupted Data in a 5G-Enabled Internet of Things" Applied Sciences 14, no. 10: 4239. https://doi.org/10.3390/app14104239

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop