Fourier Transforms One May Think of (5) As Arising from (1) by Replacing the Integral by a Discrete (Trapezoid) Approximation

Total Page:16

File Type:pdf, Size:1020Kb

Fourier Transforms One May Think of (5) As Arising from (1) by Replacing the Integral by a Discrete (Trapezoid) Approximation 34 J−1 2 DST: a = U sin(πmj=J); m = 1; 2; : : : ; J − 1 (5) m J j Xj=1 J−1 Inverse DST: Uj = am sin(πmj=J); j = 1; 2; : : : ; J − 1 (6) m=1 X Fourier Transforms One may think of (5) as arising from (1) by replacing the integral by a discrete (trapezoid) approximation. Note that if one included the cases m = 0 and m = J in (5) one would find that a0 = aJ = 0. Hence there is not reason to include these. Similarly, U0 and UJ would necessarily be zero by (6). Hence it is not possible to recover non-zero values of U0 and UJ via the inverse DST and these are excluded. In this chapter I provide a summary of various transform pairs. Notation varies in the literature and I present here a self-consistent treatment. The proof that the above pairs are inverses is easy given the orthogonality relation: J−1 πmj πm0j J sin( ) sin( ) = δ 0 (7) J J 2 mm Xj=1 Sine Transform πmj Note that m and j play exactly the same role in sin( J ) so that the discrete analog of the completeness relation (4) holds as a direct consequence of (7) by relabelling j and m: Given a function u(x) on the interval [0; `], the sine transform and its inverse are given by: J−1 πmj πmj0 J sin( ) sin( ) = δjj0 (8) ` J J 2 2 m=1 Sine Transform: am = u(x) sin(πmx=`)dx (1) X ` 0 Equations (7) and (8) are the same thing. 1Z Inverse Sine Transform: u(x) = am sin(πmx=`) (2) m=1 X Cosine Transform To prove that these are indeed inverses of one another, one uses the orthogonality relation for sine functions. Given a function u(x) on the interval [0; `], the cosine transform and its inverse are given by: ` ` 0 ` 2 sin(πmx=`) sin(πm x=`)dx = δmm0 (3) Cosine Transform: am = u(x) cos(πmx=`)dx (9) 0 2 ` 0 Z Z 1 a Inverse Cosine Transform: u(x) = 0 + a cos(πmx=`) (10) which is easy to prove by direct integration. One can also use the completeness relation: 2 m m=1 1 X 1 0 ` 0 = wmam cos(πmx=`) (11) sin(πmx=`) sin(πmx =`) = δ(x − x ) (4) 2 m=0 m=1 X X where the weight function wm is given by: 1 which is not easy to prove. 2 if j = 0 wj = (12) (1 if j > 0 The proof that these are indeed inverses uses the orthogonality relation for cosine functions. Discrete Sine Transform ` 0 ` cos(πmx=`) cos(πm x=`)dx = δ 0 (13) 2 mm Z0 There is a discrete form of the sine transformation, the discrete sine transform (DST). In this case we are which again is easy to prove by direct integration. These is also a difficult to prove completeness relation: 1 given a set of value Uj for j = 1; : : : ; J − 1 generally thought of as a discrete sampling of a function 0 ` 0 u(x) on [0; `], i.e. U = u(jh), which h = `=J. For the DST the function is sampled only on the interior w cos(πmx=`) cos(πmx =`) = δ(x − x ) (14) j m 2 m=0 j = 1; 2; : : : ; J − 1. Then the discrete sine transform (DST) and its inverse are given by: X 33 Numerical methods for PDES Copyright (C) 2002-2005 Dwight Barkley 35 36 Discrete Cosine Transform One can also use the completeness relation: 1 − 0 0 ei2πmx=`e i2πmx =` = `δ(x − x ) (23) For the discrete cosine transform (DST) we consider a set of value Uj for j = 0; : : : ; J again generally m=−∞ thought of as a discrete sampling of a function u(x) on [0; `]. This time however we sample the function at X the end points j = 0 and j = J. Then the discrete cosine transform (DST) and its inverse are given by: which is not easy to prove. J 2 DCT: a = w U cos(πmj=J) (15) In the case which u(x) is a real-valued function, the am will still be complex, but the following symmetry m J j j j=0 holds: X ∗ J a−m = am (24) Inverse DCT: Uj = wmam cos(πmj=J) (16) m=0 where ∗ denotes complex conjugation. Proof: X (17) ∗ ` ` ` ∗ 1 −i2πmx=` 1 ∗ i2πmx=` 1 −i2π(−m)x=` am = u(x)e dx = u (x)e dx = u(x)e dx = a−m where now the weight function is: ` ` ` Z0 Z0 Z0 1 2 if j = 0; J; wj = (18) (1 if 0 < j < J Using this fact, it is possible to re-write the FT pair in such a way that all quantities are real: 1 A One may think of (15) as arising from (9) by replacing the integral by a trapezoid approximation. The actual Inverse Fourier Transform: u(x) = 0 + (A cos(2πmx=`) + B sin(2πmx=`)) 2 m m proof that the above pairs are inverses comes from the following identity. m=1 X J πm0j πmj J with: w w cos( ) cos( ) = δ 0 (19) j m J J 2 mm j=0 2 ` X Fourier Transform: A = 2ar = u(x) cos(2πmx=`)dx m m ` Note that as the the DST, m and j play exactly the same role in this equation so that the discrete analog of Z0 2 ` the completeness relation (14) holds as a direct consequence of (19) by relabelling j and m. B = −2ai = u(x) sin(2πmx=`)dx m m ` Z0 r i r i where am and am are the real and imaginary parts of am: am = am + iam. Fourier Transform Hence the FT of a real-valued function is equivalent to taking both sine and cosine transforms on the interval [0; `] but with argument 2πmx=` rather than πmx=`. Given a function u(x) on the interval [0; `], the Fourier transform (FT) and its inverse are given by: The details are left for the reader, but the first few lines of the derivation are: ` 1 −i2πmx=` Fourier Transform: am = u(x)e dx (20) 1 −∞ ` 0 i2πmx=` i2πmx=` Z1 u(x) = a0 + ame + ame Inverse Fourier Transform: i2πmx=` m=1 m=−1 u(x) = ame (21) X1 X1 −∞ m= i2πmx=` −i2πmx=` X = a0 + ame + a−me m=1 m=1 In this case the function u(x) is often allowed to be complex, but we shall consider only the case of real X1 X u(x). i2πmx=` ∗ −i2πmx=` = a0 + ame + ame m=1 One has the following orthogonality relation for complex exponentials: X ` i2πmx=` −i2πm0x=` e e dx = `δmm0 (22) Discrete Fourier Transform Z0 which as usual is easy to prove by direct integration. For the discrete Fourier transform (DFT) we again consider a set of value Uj for j = 0; : : : ; J thought of as ` ∗ 0 i2πmx=` (Notice that here we have 0 φm(x)φm0 (x)dx = `δmm , where φm(x) = e .) a discrete sampling of a function u(x) on [0; `] including end points j = 0 and j = J. In this case we are Numerical methods for PDESR Copyright (C) 2002-2005 Dwight Barkley Numerical methods for PDES Copyright (C) 2002-2005 Dwight Barkley 37 38 going to consider several forms for the DFT. The first is given by: This is a non-standard form for the DFT. I give it here because it is the form one might guess from the continuous FT (20)-(21). J−1 1 −i2πmj=J DFT: am = Uje ; m = −J=2 + 1; −J=2 + 2; : : : ; J=2; (25) J Probably the most common form for the DFT is given by using the periodicity in am to shift the sum in (26) j=0 X and obtain: J=2 i2πmj=J J−1 Inverse DFT: Uj = ame j = 0; 1; : : : ; J − 1; (26) 1 −i2πmj=J − DFT: am = Uje ; m = 0; 1; : : : ; J − 1; (32) m=XJ=2+1 J Xj=0 where we have assumed J is even. This is the form we shall consider most frequently in this course. J−1 i2πmj=J Inverse DFT: Uj = ame j = 0; 1; : : : ; J − 1; (33) m=0 The proof that the above pairs are inverses comes from the orthogonality of the complex exponentials: X This form has the advantage that both sums are over the same range. However, it has the disadvantages that J−1 −i2πmj=J i2πm0j=J (1) it is not a natural choice given the continuous FT, (2) more importantly, we will consider real Uj and this e e = Jδmm0 (27) form does not make it as obvious that Uj obtained by the inverse transformation will be real. Xj=0 As with the other discrete transforms, this is also equivalent to the completeness relation in the continuous Most libraries that perform discrete Fourier transforms say they compute transforms of type (32)-(33). They case. are all equivalent of course. ∗ Other standard and non-standard forms of the DFT can be derived by noting that if (25) is used to define am Finally, we consider the sine/cosine forms of the DFT. As in the continuous case: Uj real implies a−m = am. for all integer m, then the am are periodic with period J. Similarly, (26) gives periodic Uj with period J. Then (26) gives: J=2 am+kJ = am and Uj+kJ = Uj i2πmj=J Uj = ame (34) − for all integer k. Proof: m=XJ=2+1 J=2−1 −(J=2−1) J−1 i2πmj=J i2πmj=J i2π(J=2)j=J 1 − = a0 + ame + ame + a e (35) a = U e i2π(m+kJ)j=J J=2 m+kJ J j m=1 m=−1 j=0 X X X J=2−1 J−1 i2πmj=J ∗ −i2πmj=J iπj 1 − − = a + a e + a e + a e (36) = U e i2πmj=J e i2πkj 0 m m J=2 J j m=1 j=0 X X J=2−1 J−1 r i 1 − = a + 2a cos(2πmj=J) + (−2a ) sin(2πmj=J) + a cos(πmj=(J=2)) (37) = U e i2πmj=J = a 0 m m J=2 J j m m=1 j=0 X X J=2−1 A AJ=2 = 0 + (A cos(2πmj=J) + B sin(2πmj=J)) + cos(πmj=(J=2)) (38) 2 m m 2 m=1 Using this, the following is an equivalent form for the DFT and its inverse: X So J 1 −i2πmj=J J=2 DFT: am = wjUje ; m = −J=2; −J=2 + 1; : : : ; J=2; (28) J Inverse Fourier Transform: j=0 Uj = (wmAm cos(2πmj=J) + Bm sin(2πmj=J)) X m=0 J=2 X Inverse DFT: U = w^ a ei2πmj=J j = 0; 1; : : : ; J − 1; where j m m (29) 1 m=−J=2 2 if m = 0; J=2; X wm = (39) (1 if 0 < m < J=2 where: 1 and Am and Bm are given by: 2 if j = 0; J; wj = (30) J (1 if 0 < j < J 2 Fourier Transform: A = 2ar = w U cos(2πmj=J) m m J j j and j=0 1 if m = −J=2; J=2; X w^ = 2 J−1 m (31) i 2 (1 if −J=2 < m < J=2 Bm = −2a = Uj sin(2πmj=J) m J j=1 In effect, since U0 = UJ , U0 in (25) can been replaced by (U0 + UJ )=2.
Recommended publications
  • CALIFORNIA STATE UNIVERSITY, NORTHRIDGE Optimized AV1 Inter
    CALIFORNIA STATE UNIVERSITY, NORTHRIDGE Optimized AV1 Inter Prediction using Binary classification techniques A graduate project submitted in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering by Alex Kit Romero May 2020 The graduate project of Alex Kit Romero is approved: ____________________________________ ____________ Dr. Katya Mkrtchyan Date ____________________________________ ____________ Dr. Kyle Dewey Date ____________________________________ ____________ Dr. John J. Noga, Chair Date California State University, Northridge ii Dedication This project is dedicated to all of the Computer Science professors that I have come in contact with other the years who have inspired and encouraged me to pursue a career in computer science. The words and wisdom of these professors are what pushed me to try harder and accomplish more than I ever thought possible. I would like to give a big thanks to the open source community and my fellow cohort of computer science co-workers for always being there with answers to my numerous questions and inquiries. Without their guidance and expertise, I could not have been successful. Lastly, I would like to thank my friends and family who have supported and uplifted me throughout the years. Thank you for believing in me and always telling me to never give up. iii Table of Contents Signature Page ................................................................................................................................ ii Dedication .....................................................................................................................................
    [Show full text]
  • Video Compression Optimized for Racing Drones
    Video compression optimized for racing drones Henrik Theolin Computer Science and Engineering, master's level 2018 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Video compression optimized for racing drones November 10, 2018 Preface To my wife and son always! Without you I'd never try to become smarter. Thanks to my supervisor Staffan Johansson at Neava for providing room, tools and the guidance needed to perform this thesis. To my examiner Rickard Nilsson for helping me focus on the task and reminding me of the time-limit to complete the report. i of ii Video compression optimized for racing drones November 10, 2018 Abstract This thesis is a report on the findings of different video coding tech- niques and their suitability for a low powered lightweight system mounted on a racing drone. Low latency, high consistency and a robust video stream is of the utmost importance. The literature consists of multiple comparisons and reports on the efficiency for the most commonly used video compression algorithms. These reports and findings are mainly not used on a low latency system but are testing in a laboratory environment with settings unusable for a real-time system. The literature that deals with low latency video streaming and network instability shows that only a limited set of each compression algorithms are available to ensure low complexity and no added delay to the coding process. The findings re- sulted in that AVC/H.264 was the most suited compression algorithm and more precise the x264 implementation was the most optimized to be able to perform well on the low powered system.
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]
  • An Overview of Emerging Video Coding Standards
    [STANDARDS] Ticao Zhang and Shiwen Mao Dept. Electrical & Computer Engineering, Auburn University Editors: Michelle X. Gong and Shiwen Mao AN OVERVIEW OF EMERGING arious industrial studies and reports have predicted the drastic increase of video traffic VIDEO CODING in the Internet [1] and wireless networks [2]. Today’s popular video coding standards, such as H.264 Advanced video STANDARDS coding (AVC), are widely used in video storage and transmission systems. With the explosive growth of video traffic, it has been Today’s popular video coding standards, such as H.264/AVC, are widely recognized that video coding technology used to encode video into bit streams for storage and transmission. is crucial in providing a more engaging With the explosive growth of various video applications, H.264/AVC experience for users. For users that are often may not fully satisfy their requirements anymore. There is an increasing restricted by a limited data plan and dynamic wireless connections, high-efficiency video demand for high compression efficiency and low complexity video coding standards are essential to enhance coding standards. In this article, we provide an overview of existing their quality of experience (QoE). On the and emerging video coding standards. We review the timeline of the other hand, network service providers (NSP) development of the popular H.26X family video coding standards, and are constrained by the scarce and expensive wireless spectrum, making it challenging introduce several emerging video coding standards such as AV1, VP9 to support emerging data-intensive video and VVC. As for future video coding, considering the success of machine services, such as high-definition (HD) video, learning in various fields and hardware acceleration, we conclude this 4K ultra high definition (UHD), 360-degree article with a discussion of several future trends in video coding.
    [Show full text]
  • State of the Art and Future Trends in Data Reduction for High-Performance Computing
    DOI: 10.14529/jsfi200101 State of the Art and Future Trends in Data Reduction for High-Performance Computing Kira Duwe1, Jakob L¨uttgau1, Georgiana Mania2, Jannek Squar1, Anna Fuchs1, Michael Kuhn1, Eugen Betke3, Thomas Ludwig3 c The Authors 2020. This paper is published with open access at SuperFri.org Research into data reduction techniques has gained popularity in recent years as storage ca- pacity and performance become a growing concern. This survey paper provides an overview of leveraging points found in high-performance computing (HPC) systems and suitable mechanisms to reduce data volumes. We present the underlying theories and their application throughout the HPC stack and also discuss related hardware acceleration and reduction approaches. After intro- ducing relevant use-cases, an overview of modern lossless and lossy compression algorithms and their respective usage at the application and file system layer is given. In anticipation of their increasing relevance for adaptive and in situ approaches, dimensionality reduction techniques are summarized with a focus on non-linear feature extraction. Adaptive approaches and in situ com- pression algorithms and frameworks follow. The key stages and new opportunities to deduplication are covered next. An unconventional but promising method is recomputation, which is proposed at last. We conclude the survey with an outlook on future developments. Keywords: data reduction, lossless compression, lossy compression, dimensionality reduction, adaptive approaches, deduplication, in situ, recomputation, scientific data set. Introduction Breakthroughs in science are increasingly enabled by supercomputers and large scale data collection operations. Applications span the spectrum of scientific domains from fluid-dynamics in climate simulations and engineering, to particle simulations in astrophysics, quantum mechan- ics and molecular dynamics, to high-throughput computing in biology for genome sequencing and protein-folding.
    [Show full text]
  • Appendix a Information Theory
    Appendix A Information Theory This appendix serves as a brief introduction to information theory, the foundation of many techniques used in data compression. The two most important terms covered here are entropy and redundancy (see also Section 2.3 for an alternative discussion of these concepts). A.1 Information Theory Concepts We intuitively know what information is. We constantly receive and send information in the form of text, sound, and images. We also feel that information is an elusive nonmathematical quantity that cannot be precisely defined, captured, or measured. The standard dictionary definitions of information are (1) knowledge derived from study, experience, or instruction; (2) knowledge of a specific event or situation; intelligence; (3) a collection of facts or data; (4) the act of informing or the condition of being informed; communication of knowledge. Imagine a person who does not know what information is. Would those definitions make it clear to them? Unlikely. The importance of information theory is that it quantifies information. It shows how to measure information, so that we can answer the question “how much information is included in this piece of data?” with a precise number! Quantifying information is based on the observation that the information content of a message is equivalent to the amount of surprise in the message. If I tell you something that you already know (for example, “you and I work here”), I haven’t given you any information. If I tell you something new (for example, “we both received a raise”), I have given you some information. If I tell you something that really surprises you (for example, “only I received a raise”), I have given you more information, regardless of the number of words I have used, and of how you feel about my information.
    [Show full text]
  • Towards Prediction Optimality in Video Compression and Networking
    University of California Santa Barbara Towards Prediction Optimality in Video Compression and Networking A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical and Computer Engineering by Shunyao Li Committee in charge: Professor Kenneth Rose, Chair Professor B. S. Manjunath Professor Shiv Chandrasekaran Professor Nikil Jayant March 2018 The Dissertation of Shunyao Li is approved. Professor B. S. Manjunath Professor Shiv Chandrasekaran Professor Nikil Jayant Professor Kenneth Rose, Committee Chair February 2018 Towards Prediction Optimality in Video Compression and Networking Copyright c 2018 by Shunyao Li iii To my beloved family iv Acknowledgements The completion of this thesis would not have been possible without the support from many people. I would like to thank my advisor, Prof. Kenneth Rose, for his guidance and support throughout the entire course of my doctoral research. He always encourages us to think about problems from the fundamental theory of signal processing, and to understand deeply the reasons behind the experiments and observations. He also gives us enough freedom and support so that we can explore the topics that we are interested in. I enjoy every constructive and inspiring discussion with him, and am genuinely grateful for developing a solid, theoretical and critical mindset under his supervision. I would also like to thank Prof. Manjunath, Prof. Chandrasekaran and Prof. Jayant for serving on my doctoral committee and providing constructive suggestions on my research. The research in this dissertation has been partly supported by Google Inc, LG Electronics and NSF. Thanks to our sponsors. I thank all my labmates for the collaborations and discussions.
    [Show full text]
  • Region Based X-Ray Image Retrieval Using Transform Techniques *Dr
    IJRECE VOL. 3 ISSUE 3 JULY-SEPT. 2015 ISSN: 2393-9028 (PRINT) | ISSN: 2348-2281 (ONLINE) Region Based X-Ray Image Retrieval using Transform Techniques *Dr. Ch. Raja *Associate Professor, Department of ECE, MGIT, Hyderabad, India. Abstract - Region Based Medical Image Retrieval (RBMIR) time of the search algorithm while extracting similar became popular aspect in Content Based Medical Image looking images from database [1].Therefore retrieval Retrieval (CBMIR) domain. Locally computed visual algorithm should compute optimal and minimal attributes attributes of a radiographic image has significant role in that better represent the images. This speeds up the retrieval retrieving the similar images from databases when process and results in faster extraction of similar images compared with globally computed features and this is one of from database. the prime aspects in making clinical decisions. Better X-Ray medical images are rich in textural representation, disease identification can be made by finding images of the compared to intensity and shape attributes, texture attributes same modality of an anatomic region. This obviously represent these images in a better way. According to the improves the healthcare system efficiency. X-Ray images survey of [5] and the work done in [2] textural features are best described in textural distributions compared to computed in transformed domain shown superior retrieval shape and intensity. The texture attributes computed from performance over spatially extracted attributes. Based on transformed domains shown superior performance over that in this work features extracted by transforming the spatially computed features. In this paper we proposed a image with Discrete Sine Transform (DST), Discrete Cosine novel approach for RBMIR by computing the region wise Transform (DCT), Discrete Fourier Transform (DFT) and visual attributes from four transformed domains viz.
    [Show full text]
  • Symmetric Trigonometric Transforms to Dual-Root Lattice Fourier–Weyl Transforms
    S S symmetry Article Connecting (Anti)Symmetric Trigonometric Transforms to Dual-Root Lattice Fourier–Weyl Transforms Adam Brus , JiˇríHrivnák and Lenka Motlochová * Department of Physics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical University in Prague, Bˇrehová7, 115 19 Prague, Czech Republic; adam.brus@fjfi.cvut.cz (A.B.); jiri.hrivnak@fjfi.cvut.cz (J.H.) * Correspondence: lenka.motlochova@fjfi.cvut.cz; Tel.: +420-22435-8352 Abstract: Explicit links of the multivariate discrete (anti)symmetric cosine and sine transforms with the generalized dual-root lattice Fourier–Weyl transforms are constructed. Exact identities between the (anti)symmetric trigonometric functions and Weyl orbit functions of the crystallographic root systems A1 and Cn are utilized to connect the kernels of the discrete transforms. The point and label sets of the 32 discrete (anti)symmetric trigonometric transforms are expressed as fragments of the rescaled dual root and weight lattices inside the closures of Weyl alcoves. A case-by-case analysis of the inherent extended Coxeter–Dynkin diagrams specifically relates the weight and normalization functions of the discrete transforms. The resulting unique coupling of the transforms is achieved by detailing a common form of the associated unitary transform matrices. The direct evaluation of the corresponding unitary transform matrices is exemplified for several cases of the bivariate transforms. Keywords: Weyl orbit function; root lattice; symmetric trigonometric function; discrete trigonometric transform 1. Introduction Citation: Brus, A.; Hrivnák, J.; The purpose of this article is to develop an explicit link between the multivari- Motlochová, L. Connecting ate discrete (anti)symmetric trigonometric transforms [1,2] and generalized dual-root (Anti)symmetric Trigonometric lattice Fourier–Weyl transforms [3,4].
    [Show full text]
  • DCT-Only and DST-Only WINDOWED UPDATE ALGORITHMS
    DISCRETE COSINE TRANSFORM-only AND DISCRETE SINE TRANSFORM-only WINDOWED UPDATE ALGORITHMS FOR SHIFTING DATA WITH HARDWARE IMPLEMENTATION by Vikram Karwal A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering Charlotte 2009 Approved by: ____________________________________ Dr. Yogendra P. Kakad ____________________________________ Dr. Barry G. Sherlock ____________________________________ Dr. Farid M. Tranjan ____________________________________ Dr. Stephen M. Bobbio ____________________________________ Dr. Bharat Joshi ____________________________________ Dr. Isaac M. Sonin ii © 2009 Vikram Karwal ALL RIGHTS RESERVED iii ABSTRACT VIKRAM KARWAL. Discrete cosine transform-only and discrete sine transform-only windowed update algorithms for shifting data with hardware implementation. (Under the direction of DR. YOGENDRA P. KAKAD and DR. BARRY G. SHERLOCK) Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST) are widely used in image and data compression applications. To process the DCT or DST of a signal a portion of length N is extracted by windowing. By shifting the window point by point the entire signal can be processed. The algorithms are developed that are capable of updating the DCT and DST independently to reflect the modified window contents i.e. for calculating the DCT of the shifted sequence no DST coefficients are used and similarly for calculating the DST of the shifted sequence no DCT coefficients are used. These algorithms constitute an improvement over previous DCT/DST update algorithms as it establishes independence between the DCT and the DST. The update algorithms used to calculate the transform of the shifted sequence uses less computation as compared to directly evaluating the modified transform via standard fast transform algorithms.
    [Show full text]
  • An Optimized Template Matching Approach to Intra Coding in Video/Image Compression
    An Optimized Template Matching Approach to Intra Coding in Video/Image Compression Hui Su, Jingning Han, and Yaowu Xu Chrome Media, Google Inc., 1950 Charleston Road, Mountain View, CA 94043 ABSTRACT The template matching prediction is an established approach to intra-frame coding that makes use of previously coded pixels in the same frame for reference. It compares the previously reconstructed upper and left boundaries in searching from the reference area the best matched block for prediction, and hence eliminates the need of sending additional information to reproduce the same prediction at decoder. In viewing the image signal as an auto-regressive model, this work is premised on the fact that pixels closer to the known block boundary are better predicted than those far apart. It significantly extends the scope of the template matching approach, which is typically followed by a conventional discrete cosine transform (DCT) for the prediction residuals, by employing an asymmetric discrete sine transform (ADST), whose basis functions vanish at the prediction boundary and reach maximum magnitude at far end, to fully exploit statistics of the residual signals. It was experimentally shown that the proposed scheme provides substantial coding performance gains on top of the conventional template matching method over the baseline. Keywords: Template matching, Intra prediction, Transform coding, Asymmetric discrete sine transform 1. INTRODUCTION Intra-frame coding is a key component in video/image compression system. It predicts from previously recon- structed neighboring pixels to largely remove spatial redundancies. A codec typically allows various prediction directions1{3 , and the encoder selects the one that best describes the texture patterns (and hence rendering minimal rate-distortion cost) for block coding.
    [Show full text]
  • On the Distribution of the Sample Autocorrelation Coefficients
    On the distribution of the sample autocorrelation coefficients Raymond Kana,*, Xiaolu Wangb aJoseph L. Rotman School of Management, University of Toronto, Toronto, Ontario, Canada M5S 3E6 bJoseph L. Rotman School of Management, University of Toronto, Toronto, Ontario, Canada M5S 3E6 Abstract Sample autocorrelation coefficients are widely used to test the randomness of a time series. Despite its unsatisfactory performance, the asymptotic normal distribution is often used to approximate the distribution of the sample autocorrelation coefficients. This is mainly due to the lack of an efficient approach in obtaining the exact distribution of sample autocorre- lation coefficients. In this paper, we provide an efficient algorithm for evaluating the exact distribution of the sample autocorrelation coefficients. Under the multivariate elliptical dis- tribution assumption, the exact distribution as well as exact moments and joint moments of sample autocorrelation coefficients are presented. In addition, the exact mean and variance of various autocorrelation-based tests are provided. Actual size properties of the Box-Pierce and Ljung-Box tests are investigated, and they are shown to be poor when the number of lags is moderately large relative to the sample size. Using the exact mean and variance of the Box-Pierce test statistic, we propose an adjusted Box-Pierce test that has a far superior size property than the traditional Box-Pierce and Ljung-Box tests. JEL Classification: C13, C16 Keywords: Sample autocorrelation coefficient; Finite sample distribution; Rank one update *Corresponding author. Joseph L. Rotman School of Management, University of Toronto, Toronto, Ontario M5S 3E6, Canada, Phone: (416)978-4291, Fax: (416)978-5433. E-mail address: [email protected] 1.
    [Show full text]