Systems and method for determining frequency coefficients of signals
11250103 · 2022-02-15
Assignee
Inventors
Cpc classification
G06F17/142
PHYSICS
G06F17/16
PHYSICS
International classification
Abstract
A system for determining the frequency coefficients of a one or multi-dimensional signal that is sparse in the frequency domain includes determining the locations of the non-zero frequency coefficients, and then determining values of the coefficients using the determined locations. If N is total number of frequency coefficients across the one or more dimension of the signal, and if R is an upper bound of the number of non-zero ones of these frequency coefficients, the systems requires up to (O (R log(R) (N))) samples and has a computation complexity of up to O (R log.sup.2(R) log (N). The system and the processing technique are stable to low-level noise and can exhibit only a small probability of failure. The frequency coefficients can be real and positive or they can be complex numbers.
Claims
1. A method for identifying magnitudes of frequency components of a signal ƒ(x), the method comprising: obtaining at a receiver a first plurality of sets of samples of a signal received by an antenna or a sensor, each set comprising a plurality of samples of the signal ƒ(x) obtained using a respective sampling interval based on a respective shuffling parameter, cardinality of each set being greater than an upper bound (R) of a number of non-zero frequency components of the signal ƒ(x) and less than a number of samples N of the signal ƒ(x) according to a Nyquist rate, wherein obtaining each set of signal samples comprises subsampling by the receiver the signal at a respective rate less than the Nyquist rate, and at least one set of signal samples determines a support set ; and computing by a processor an initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 using the support set
and frequency coefficients of the first plurality of sets of signal samples, the support set
identifying indices of the non-zero frequency coefficients of the signal ƒ(x).
2. The method of claim 1, wherein obtaining the first plurality of sets of signal samples comprises accessing from memory T sets of signal samples, wherein: T is on the order of O(1) or on the order of O(R log.sub.R N); and a t-th set of signal samples, wherein index t ranges from 1 through T, comprises P.sup.(t) signal samples, P.sup.(t) being greater than R and smaller than N.
3. The method of claim 1, wherein obtaining the first plurality of sets of signal samples comprises: determining the number of samples (N) of the signal ƒ(x) according to the Nyquist rate, and obtaining the upper bound (R) of the number of non-zero frequency components of the signal; selecting a number of sets (T), wherein T is on the order of O(1) or on the order of O(R log.sub.R N), and selecting T recovery parameters P.sup.(t), wherein index t ranges from 1 through T; for each recovery parameter P.sup.(t), sampling the signal ƒ(x) at P.sup.(t) distinct locations, providing the first plurality of T sets of signal samples, each sample set having P.sup.(t) samples.
4. The method of claim 1, wherein computing the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 comprises multiplying the first plurality of sets of signal samples by: (i) a discrete Fourier transform (DFT) matrix F comprising T DFT submatrices, each submatrix having a size P.sup.(t), and index t ranging from 1 through T, and (ii) a binary matrix B based on the support set .
5. The method of claim 1, further comprising: generating a set of frequency coefficients {circumflex over (ƒ)} using a binary matrix B based on the support set and the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0.
6. The method of claim 1, further comprising: determining that a norm based on a binary matrix B based on the support set and the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 is not less than a selected threshold; obtaining a second plurality of sets of signal samples, each set comprising a plurality of samples of the signal ƒ(x); and re-computing the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 using the support set
and the second plurality of sets of signal samples.
7. The method of claim 6, further comprising: determining that a norm based on the binary matrix B and the re-computed initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 is less than or equal to the selected threshold; and generating a set of frequency coefficients {circumflex over (ƒ)} using the binary matrix B and the re-computed initial set of frequency coefficients {circumflex over (ƒ)}.sub.0.
8. The method of claim 1, wherein the signal ƒ(x) is received from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
9. A system for identifying magnitudes of frequency components of a signal ƒ(x), the system comprising: a first processor; and a first memory in electrical communication with the first processor, the first memory comprising instructions which, when executed by a processing unit comprising at least one of the first processor and a second processor, and in electronic communication with a memory module comprising at least one of the first memory and a second memory, program the processing unit to: obtain at a receiver a first plurality of sets of samples of a signal received by an antenna or a sensor, each set comprising a plurality of samples of the signal ƒ(x) obtained using a respective sampling interval based on a respective shuffling parameter, cardinality of each set being greater than an upper bound (R) of a number of non-zero frequency components of the signal ƒ(x) and less than a number of samples N of the signal ƒ(x) according to a Nyquist rate, wherein obtaining each set of signal samples comprises subsampling by the receiver the signal at a respective rate less than the Nyquist rate, and at least one set of signal samples determines a support set ; and compute an initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 using a support set
and frequency coefficients of the first plurality of sets of signal samples, the support set
identifying indices of the non-zero frequency coefficients of the signal ƒ(x).
10. The system of claim 9, wherein to obtain the first plurality of sets of signal samples the processing unit is configured to access from the memory module T sets of signal samples, wherein: T is on the order of O(1) or on the order of O(R log.sub.R N); and a t-th set of signal samples, wherein index t ranges from 1 through T, comprises P.sup.(t) signal samples, P.sup.(t) being greater than R and smaller than N.
11. The system of claim 9, wherein to obtain the first plurality of sets of signal samples the processing unit is configured to: determine the number of samples (N) of the signal ƒ(x) according to the Nyquist rate, and obtain the upper bound (R) of the number of non-zero frequency components of the signal; select a number of sets (T), wherein T is on the order of O(1) or on the order of O(R log.sub.R N), and select T recovery parameters P.sup.(t), wherein index t ranges from 1 through T; for each recovery parameter P.sup.(t), configure a signal sampler to sample the signal ƒ(x) at P.sup.(t) distinct locations, providing the first plurality of T sets of signal samples, each sample set having P.sup.(t) samples.
12. The system of claim 9, wherein to compute the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 the processing unit is programmed to: multiply the first plurality of sets of signal samples by: (i) a discrete Fourier transform (DFT) matrix F comprising T DFT submatrices, each submatrix having a size P.sup.(t), and index t ranging from 1 through T, and (ii) a binary matrix B based on the support set .
13. The system of claim 9, wherein the instructions further program the processing unit to: generate a set of frequency coefficients {circumflex over (ƒ)} using a binary matrix B based on the support set S and the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0.
14. The system of claim 9, wherein the instructions further program the processing unit to: determine that a norm based on a binary matrix B based on the support set and the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 is not less than a selected threshold; obtain a second plurality of sets of signal samples, each set comprising a plurality of samples of the signal ƒ(x); and re-compute the initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 using the support set
and the second plurality of sets of signal samples.
15. The system of claim 14, wherein the instructions further program the processing unit to: determine that a norm based on the binary matrix B and the re-computed initial set of frequency coefficients {circumflex over (ƒ)}.sub.0 is less than or equal to the selected threshold; and generate a set of frequency coefficients {circumflex over (ƒ)} using the binary matrix B and the re-computed initial set of frequency coefficients {circumflex over (ƒ)}.sub.0.
16. The system of claim 9, wherein the signal ƒ(x) is received from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
17. A method for identifying frequency components of a signal ƒ(x), the method comprising performing by a processor the steps of: (a) initially designating a current set of candidate support coefficients (.sub.k) as a current set of aliased support coefficients
.sub.k; (b) obtaining at a receiver a plurality of sets of samples comprising a first set of K shuffled samples of the signal ƒ(x), received by an antenna or a sensor and corresponding to a first sampling interval based on a first shuffling parameter, wherein K is a fraction of a number of samples (N) of the signal ƒ(x) according to a Nyquist rate, and wherein obtaining the first set of K shuffled samples comprises subsampling by the receiver the signal at a rate less than the Nyquist rate, at least one set of signal samples determining the set of aliased support coefficients
.sub.k; (c) filtering the shuffled samples in the first set, and computing a first plurality of frequency coefficients of the shuffled samples in the first set; and (d) removing from the current set of aliased support coefficients
.sub.k a subset of candidate support coefficients wherein, for each candidate support coefficient in the subset a value of a corresponding computed frequency coefficient in the first plurality of frequency coefficients is less than a threshold.
18. The method of claim 17, further comprising: obtaining a second set of shuffled samples of the signal ƒ(x), corresponding to a second sampling interval based on a second shuffling parameter; filtering the shuffled samples in the second set, and computing a second plurality of frequency coefficients of the shuffled samples in the second set; and removing from the current set of aliased support coefficients .sub.k a subset of candidate support coefficients wherein, for each candidate support coefficient in the subset a value of a corresponding computed frequency coefficient in the second plurality of frequency coefficients is less than the threshold.
19. The method of claim 18, wherein: the first shuffling parameter is a first coprime of an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); and the second shuffling parameter is a second, different coprime of the index limit (M.sub.k).
20. The method of claim 17, wherein: an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k) is associated with a support set growth factor ρ.sub.k that is a ratio of an index limit (M.sub.k) and the number of samples in the first set of shuffled samples (K).
21. The method of claim 17, further comprising: obtaining a prior set of aliased support coefficients .sub.k−1; and dealiasing the prior set of aliased support coefficients to obtain the current set of candidate support coefficients (
.sub.k).
22. The method of claim 17, further comprising: (e) selecting a next index limit (M.sub.k+1) of a next set of candidate support coefficients (.sub.k+1), wherein the next index limit is greater than a current index limit (M.sub.k) of the current set of candidate support coefficients(
.sub.k); (f) after the step (d), dealiasing the current set of aliased support coefficients (
.sub.k) using the next index limit (M.sub.k+1), to obtain the next set of candidate support coefficients (
.sub.k+1); (g) updating the current set of candidate support coefficients (
.sub.k) by designating the next set of candidate support coefficients (
.sub.k+1) as the current set of candidate support coefficients (
M.sub.k); and (h) repeating the steps (a) through (d) using the updated current set of candidate support coefficients (
.sub.k).
23. The method of claim 22, further comprising: determining that a next index limit (M.sub.k+1) is not less than a number of samples (N) of the signal ƒ(x) according to a Nyquist rate; and after the step (h), designating the current set of aliased support coefficients .sub.k as a final set of aliased support coefficients
.
24. The method of claim 17, wherein obtaining the first set of shuffled samples of the signal ƒ(x) comprises: selecting the first sampling interval using the first shuffling parameter (Q.sub.k.sup.(l)), wherein the first shuffling parameter corresponds to an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); sampling the signal ƒ(x) using the first sampling interval, to obtain a first sampled signal; and shuffling the first sampled signal using the first shuffling parameter and the index limit.
25. The method of claim 17, wherein obtaining the first set of shuffled samples of the signal ƒ(x) comprises: selecting the first shuffling parameter (Q.sub.k.sup.(l)) corresponding to an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); and accessing from memory the first set of shuffled samples corresponding to the first shuffling parameter.
26. The method of claim 17, wherein filtering the shuffled samples in the first set comprises filtering the first set using a Gaussian filter having a standard deviation (σ) that is based on an upper bound of a number of non-zero frequency components (R) of the signal ƒ(x), to obtain a filtered shuffled signal.
27. The method of claim 17, further comprising generating the current set of candidate support coefficients by: selecting a first index limit (M.sub.1), wherein M.sub.1 is less than the number of samples (N) of the signal ƒ(x) according to the Nyquist rate; obtaining a plurality of samples of the signal ƒ(x); determining M.sub.1 frequency coefficients of a signal comprising the plurality of samples; and including each non-zero frequency coefficient from the M.sub.1 frequency coefficients as a respective candidate support coefficient in the current set of candidate support coefficients.
28. The method of claim 27, wherein: a non-zero frequency coefficient comprises a frequency coefficient having a magnitude greater than a specified threshold value; and a frequency coefficient designated as a zero coefficient has a magnitude less than or equal to the specified threshold value.
29. A system for identifying frequency components of a signal ƒ(x), the system comprising: a first processor; and a first memory in electrical communication with the first processor, the first memory comprising instructions which, when executed by a processing unit comprising at least one of the first processor and a second processor, and in electronic communication with a memory module comprising at least one of the first memory and a second memory, program the processing unit to: (a) initially designate a current set of candidate support coefficients (.sub.k) as a current set of aliased support coefficients
.sub.k; (b) obtain a plurality of sets of samples comprising a first set of K shuffled samples of the signal ƒ(x), received by an antenna or a sensor and corresponding to a first sampling interval based on a first shuffling parameter, wherein K is a fraction of a number of samples (N) of the signal ƒ(x) according to a Nyquist rate, wherein obtaining the first set of K shuffled samples comprises subsampling by the receiver the signal at a rate less than the Nyquist rate, at least one set of signal samples determining the set of aliased support coefficients
.sub.k; (c) filter the shuffled samples in the first set, and computing a first plurality of frequency coefficients of the shuffled samples in the first set; and (d) remove from the current set of aliased support coefficients
.sub.k a subset of candidate support coefficients wherein, for each candidate support coefficient in the subset a value of a corresponding computed frequency coefficient in the first plurality of frequency coefficients is less than a threshold.
30. The system of claim 29, wherein the processing unit is further programmed to: obtain a second set of shuffled samples of the signal ƒ(x), corresponding to a second sampling interval based on a second shuffling parameter; filter the shuffled samples in the second set, and computing a second plurality of frequency coefficients of the shuffled samples in the second set; and remove from the current set of aliased support coefficients .sub.k a subset of candidate support coefficients wherein, for each candidate support coefficient in the subset a value of a corresponding computed frequency coefficient in the second plurality of frequency coefficients is less than the threshold.
31. The system of claim 30, wherein: the first shuffling parameter is a first coprime of an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); and the second shuffling parameter is a second, different coprime of the index limit (M.sub.k).
32. The system of claim 29, wherein: an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k) is associated with a support set growth factor ρ.sub.k that is a ratio of an index limit (M.sub.k) and the number of samples in the first set of shuffled samples (K).
33. The system of claim 29, wherein the processing unit is further programmed to: obtain a prior set of aliased support coefficients .sub.k−1; and dealias the prior set of aliased support coefficients to obtain the current set of candidate support coefficients (
.sub.k).
34. The system of claim 29, wherein the processing unit is further programmed to: (e) select a next index limit (M.sub.k+1) of a next set of candidate support coefficients (.sub.k+1), wherein the next index limit is greater than a current index limit (M.sub.k) of the current set of candidate support coefficients (
.sub.k); (f) after performing the operation (d), dealias the current set of aliased support coefficients (
.sub.k) using the next index limit (M.sub.k+1), to obtain the next set of candidate support coefficients (
.sub.k+1); (g) update the current set of candidate support coefficients (
.sub.k) by designating the next set of candidate support coefficients (
.sub.k+1) as the current set of candidate support coefficients (
.sub.k); and (h) repeat the operations (a) through (d) using the updated current set of candidate support coefficients (
.sub.k).
35. The system of claim 34, wherein the processing unit is further programmed to: determine that a next index limit (M.sub.k+1) is not less than a number of samples (N) of the signal ƒ(x) according to a Nyquist rate; and after the operation (h), designate the current set of aliased support coefficients .sub.k as a final set of aliased support coefficients
.
36. The system of claim 29, wherein to obtain the first set of shuffled samples of the signal ƒ(x) the processing unit is programmed to: select the first sampling interval using the first shuffling parameter (Q.sub.k.sup.(l)), wherein the first shuffling parameter corresponds to an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); configure a signal sampler to sample the signal ƒ(x) using the first sampling interval, to obtain a first sampled signal; and shuffle the first sampled signal using the first shuffling parameter and the index limit.
37. The system of claim 29, wherein to obtain the first set of shuffled samples of the signal ƒ(x) the processing unit is programmed to: select the first shuffling parameter (Q.sub.k.sup.(l)) corresponding to an index limit (M.sub.k) of the current set of candidate support coefficients (.sub.k); and access from the memory module the first set of shuffled samples corresponding to the first shuffling parameter.
38. The system of claim 29, wherein to filter the shuffled samples in the first set the processing unit is programmed to filter the first set using a Gaussian function having a standard deviation (σ) that is based on an upper bound of a number of non-zero frequency components (R) of the signal ƒ(x), to obtain a filtered shuffled signal.
39. The system of claim 29, wherein the processing unit is further programmed to generate the current set of candidate support coefficients by: selecting a first index limit (M.sub.1), wherein M.sub.1 is less than the number of samples (N) of the signal ƒ(x) according to the Nyquist rate; obtaining a plurality of samples of the signal ƒ(x); determining M.sub.1 frequency coefficients of a signal comprising the plurality of samples; and including each non-zero frequency coefficient from the M.sub.1 frequency coefficients as a respective candidate support coefficient in the current set of candidate support coefficients.
40. The system of claim 39, wherein: a non-zero frequency coefficient comprises a frequency coefficient having a magnitude greater than a specified threshold value; and a frequency coefficient designated as a zero coefficient has a magnitude less than or equal to the specified threshold value.
41. A method for generating non-zero frequency coefficients of a signal ƒ(x), the method comprising performing by a processor the steps of: obtaining at a receiver a plurality of sets of samples of the signal ƒ(x) received by an antenna or a sensor and comprising a first set corresponding to a first sampling interval and a different second set, wherein obtaining each of the sets of samples comprises subsampling by the receiver the signal at a rate less than a Nyquist rate corresponding to the signal; determining indices of the non-zero frequency coefficients of the signal ƒ(x) using at least the first set, the first sampling interval corresponding to the indices of non-zero frequency coefficients; and determining values of the non-zero frequency coefficients of the signal ƒ(x) using the indices thereof and at least the second set.
42. The method of claim 41, wherein determining the indices of the non-zero frequency coefficients comprises: obtaining: (i) a number of samples (N) of the signal ƒ(x) according to a Nyquist rate, and (ii) an upper bound of a number of non-zero frequency components (R) of the signal ƒ(x); selecting a sample size K, a number of iterations P, a plurality of support set growth factors ρ.sub.k, and a plurality of index limits M.sub.k, each index limit representing an index limit of a respective set of candidate support coefficients .sub.k, wherein M.sub.k=ρ.sub.kK and
.sub.k using the first set of samples of the signal ƒ(x), the first set comprising less than N samples.
43. The method of claim 41, wherein determining the indices of the non-zero frequency coefficients comprises: performing at least one iteration, comprising: obtaining a current set of candidate support coefficients .sub.k by dealiasing the current set of aliased support coefficients
.sub.k; determining a next set of aliased support coefficients using the current set of candidate support coefficients
.sub.k and at least one set of samples from the plurality of sets of samples of the signal ƒ(x), each one of the at least one set of samples being obtained using a sampling interval based on M.sub.k; and designating the next set of aliased support coefficients as the current set of aliased support coefficients
.sub.k.
44. The method of claim 41, wherein determining the indices of the non-zero frequency coefficients comprises: performing at least one iteration, comprising: obtaining a current set of candidate support coefficients .sub.k by dealiasing the current set of aliased support coefficients
.sub.k; determining a next set of aliased support coefficients using the current set of candidate support coefficients
.sub.k and at least one set of samples from the plurality of sets of samples of the signal ƒ(x), each one of the at least one set of samples being obtained using a sampling interval based on M.sub.k; and designating the next set of aliased support coefficients as final set of aliased support coefficients S, the final set of aliased support coefficients representing the indices of the non-zero frequency coefficients.
45. The method of claim 41, wherein the signal ƒ(x) comprises a one-dimensional signal obtained from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
46. The method of claim 41, further comprising: mapping a multi-dimensional signal y(x) into a one-dimensional signal ƒ(x); and storing an inverse mapping identifying a sample index for y(x) corresponding to a sample index for ƒ(x), wherein obtaining the plurality of sets of samples of the signal ƒ(x) comprises: selecting a plurality of sample indices of ƒ(x); and obtaining samples of y(x) at a plurality of sample indices of y(x), each one being determined via the inverse mapping and a respective selected sample index of ƒ(x).
47. The method of claim 46, wherein the non-zero frequency coefficients of the signal ƒ(x) represent non-zero frequency coefficients of the multi-dimensional signal y(x).
48. The method of claim 46, wherein the multi-dimensional signal y(x) comprises a multi-dimensional signal obtained from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
49. The method of claim 41, wherein: a non-zero frequency coefficient comprises a frequency coefficient having a magnitude greater than a specified threshold value; and a frequency coefficient designated as a zero coefficient has a magnitude less than or equal to the specified threshold value.
50. The method of claim 41, wherein: the step of determining indices of the non-zero frequency coefficients is performed using a first value (N.sub.1) of a number of samples of the signal ƒ(x) according to a Nyquist rate, to obtain a first support set .sup.1; the step of determining indices of the non-zero frequency coefficients is repeated using a second value (N.sub.2) of the number of samples, to obtain a second support set
.sup.2, the method further comprising: generating a final support set as a union of the first and second support sets; and designating coefficients of the final support set as the indices of the non-zero frequency coefficients.
51. A system for generating non-zero frequency coefficients of a signal ƒ(x), the system comprising: a first processor; and a first memory in electrical communication with the first processor, the first memory comprising instructions which, when executed by a processing unit comprising at least one of the first processor and a second processor, and in electronic communication with a memory module comprising at least one of the first memory and a second memory, program the processing unit to: obtain at a receiver a plurality of sets of samples of the signal ƒ(x) received by an antenna or a sensor and comprising a first set corresponding to a first sampling interval and a different second set, wherein obtaining each of the sets of samples comprises subsampling by the receiver the signal at a rate less than a Nyquist rate corresponding to the signal; determine indices of the non-zero frequency coefficients of the signal ƒ(x) using at least the first set, the first sampling interval corresponding to the indices of non-zero frequency coefficients; and determine values of the non-zero frequency coefficients of the signal ƒ(x) using the indices thereof and at least the second set.
52. The system of claim 51, wherein to determine the indices of the non-zero frequency coefficients the processing unit is programmed to: obtain: (i) a number of samples (N) of the signal ƒ(x) according to a Nyquist rate, and (ii) an upper bound of a number of non-zero frequency components (R) of the signal ƒ(x); select a sample size K, a number of iterations P, a plurality of support set growth factors ρ.sub.k, and a plurality of index limits M.sub.k, each index limit representing an index limit of a respective set of candidate support coefficients .sub.k, wherein M.sub.k=ρ.sub.kK and
.sub.k using the first set of samples of the signal ƒ(x), the first set comprising less than N samples.
53. The system of claim 51, wherein to determine the indices of the non-zero frequency coefficients the processing unit is programmed to: perform at least one iteration, comprising: obtaining a current set of candidate support coefficients .sub.k by dealiasing the current set of aliased support coefficients
.sub.k; determining a next set of aliased support coefficients using the current set of candidate support coefficients
.sub.k and at least one set of samples from the plurality of sets of samples of the signal ƒ(x), each one of the at least one set of samples being obtained using a sampling interval based on M.sub.k; and designating the next set of aliased support coefficients as the current set of aliased support coefficients
.sub.k.
54. The system of claim 51, wherein to determine the indices of the non-zero frequency coefficients the processing unit is programmed to: perform at least one iteration, comprising: obtaining a current set of candidate support coefficients .sub.k by dealiasing the current set of aliased support coefficients
.sub.k; determining a next set of aliased support coefficients using the current set of candidate support coefficients
.sub.k and at least one set of samples from the plurality of sets of samples of the signal ƒ(x), each one of the at least one set of samples being obtained using a sampling interval based on M.sub.k; and designating the next set of aliased support coefficients as final set of aliased support coefficients
, the final set of aliased support coefficients representing the indices of the non-zero frequency coefficients.
55. The system of claim 51, wherein the signal ƒ(x) comprises a one-dimensional signal obtained from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
56. The system of claim 51, wherein the processing unit is further programmed to: map a multi-dimensional signal y(x) into a one-dimensional signal ƒ(x); and store an inverse mapping identifying a sample index for y(x) corresponding to a sample index for ƒ(x), wherein to obtain the plurality of sets of samples of the signal ƒ(x) the processing unit is programmed to: select a plurality of sample indices of ƒ(x); and obtain samples of y(x) at a plurality of sample indices of y(x), each one being determined via the inverse mapping and a respective selected sample index of ƒ(x).
57. The system of claim 56, wherein the non-zero frequency coefficients of the signal ƒ(x) represent non-zero frequency coefficients of the multi-dimensional signal y(x).
58. The system of claim 56, wherein the multi-dimensional signal y(x) comprises a multi-dimensional signal obtained from a signal source comprising at least one of a radar, a lidar, an antenna, a sonar, a camera, an infra-red sensor, an electro-magnetic radiation sensor, and an acoustic sensor.
59. The system of claim 51, wherein: a non-zero frequency coefficient comprises a frequency coefficient having a magnitude greater than a specified threshold value; and a frequency coefficient designated as a zero coefficient has a magnitude less than or equal to the specified threshold value.
60. The system of claim 51, wherein the processing unit is programmed to: determine the indices of the non-zero frequency coefficients using a first value (N.sub.1) of a number of samples of the signal ƒ(x) according to a Nyquist rate, to obtain a first support set .sup.1; determine the indices of the non-zero frequency coefficients again, using a second value (N.sub.2) of the number of samples, to obtain a second support set
.sup.2; generate a final support set as a union of the first and second support sets; and designate coefficients of the final support set as the indices of the non-zero frequency coefficients.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) In the following description, various embodiments of the present invention are described with reference to the following drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
DETAILED DESCRIPTION
(14) Statement of the Problem and Preliminaries We introduce the notation used throughout the remainder of the discussion. Unless otherwise stated, we consider a one-dimension (1D) function or signal ƒ(x) of the form:
(15)
for some finite 0<N∈ and noise level 0≤√{square root over (N)}∥{circumflex over (ν)}∥.sub.2≤η. It is further assumed that the vector {circumflex over (ƒ)} has real nonnegative elements, i.e., {circumflex over (ƒ)}.sub.j≥0, ∀j, and that its support:
:={j∈{0,1, . . . ,N−1}:|{circumflex over (ƒ)}.sub.j|≠0}
satisfies 0≤#≤R<N<∞, where # indicates cardinality. In particular, we are interested in the case where R«N. Given some accuracy parameter ϵ above the noise level η, the problem involves computing an R-sparse vector ƒ* such that:
∥ƒ*−{circumflex over (ƒ)}∥.sub.2≤ε∥{circumflex over (ƒ)}∥.sub.2
We shall denote by the Fourier transform (and
* its inverse/adjoint), i.e.,
[{circumflex over (ƒ)}(ξ)](x)=∫
.sub.
where d represents the ambient dimension. The size-N Discrete Fourier Transform (DFT) is defined as:
(16)
A Sparse FFT in 1D
(17) We describe a fast way to compute the one-dimensional DFT of a bandlimited and periodic function ƒ(x) of the form of Eq. (3). Our approach to solving this problem can be broken into two separate steps: in the first step, the support of the vector {circumflex over (ƒ)} is recovered, and in the second step, the nonzero values of {circumflex over (ƒ)} are computed using the knowledge of the recovered support. We describe the algorithm in the noiseless case, followed by a discussion of its stability to noise. Steps of the signal sampling and frequency-coefficient computation processes are provided in Algorithms 1-4.
(18) Finding the Support
(19) Referring to the example in
(20) To illustrate, we proceed through an example and refer to , 0<α<1 and
.sub.k,
.sub.k,
.sub.k⊂{0, 1, . . . , N−1}. We define the following: the aliased support
.sub.k at iteration/step k corresponds to the indices of the elements of the true support
modulo M.sub.k; the working support at iteration/step k corresponds to the set
.sub.k:={0, 1, . . . , M.sub.k−1}; a candidate support
at iteration/step k is any set satisfying
.sub.k⊂
⊂
.sub.k of size
(ρR log(R)). Line 0 (
(21)
which contains only 3 positive frequencies (black dots; ={1, 23, 35}). In the beginning, (step k=0) only the fact that
⊂{0, 1, . . . , N−1} is known.
(22) The first step (k=1) is performed as follows: Letting:
(23)
sample the function ƒ(x) at,
(24)
to obtain,
(25)
for n.sub.1∈.sub.1:={0, 1, . . . , M.sub.1−1} defined as the candidate support in the first step.
(26) The samples correspond to a DFT of size M.sub.1 of the vector {circumflex over (ƒ)}.sup.(1) with entries that are an aliased version of those of the original vector {circumflex over (ƒ)}. These can be computed through the FFT in order (M.sub.1 log(M.sub.1))=
(R log.sup.2(R)). In this first step, it is further possible to rapidly identify the aliased support
.sub.1 from the knowledge of {circumflex over (ƒ)}.sup.(1) since the former correspond to the set,
{l∈{0,1, . . . ,M.sub.1−1}:{circumflex over (ƒ)}.sub.l.sup.(1)≠0}
due to the fact that
{circumflex over (ƒ)}.sub.l.sup.(1):=Σ.sub.j:jmodM.sub..sub.1
following the nonnegativity assumption. In our example, M.sub.1=ρ.sub.1K=2.Math.5=10 which leads to.sub.1={1 mod 10,23 mod 10,35 mod 10}={1,3,5}={l∈{0,1, . . . ,9}:{circumflex over (ƒ)}.sub.l.sup.(1)≠0}
.sub.1=
.sub.1={0,1, . . . ,9}.
This is shown on line 1 of .sub.1 is equal to the candidate support
.sub.1.
(27) Then, proceed to the next step (k=2) as follows: let,
(28)
and consider the samples,
(29)
for n.sub.2=0, 1, . . . , M.sub.2−1 as before. Here however, knowledge of .sub.1 is incorporated. Indeed, since M.sub.2 is a multiple of M.sub.1, it follows upon close examination that,
.sub.2⊂∪.sub.k=0.sup.ρ.sup.
.sub.1+kM.sub.1):=
.sub.2.
(30) That is, the set .sub.2, defined as the union of ρ.sub.1=O(1) translated copies of
.sub.1, must itself contain
.sub.2. Furthermore, it is of size
(ρ.sub.1#
.sub.1)=
(ρR log(R)) by construction. It is thus a proper candidate support (by definition). In our example, one obtains
∪.sub.k=0.sup.1(.sub.1+kM.sub.1)={1,3,5}∪{1+10,3+10,5+10}={1,3,5,11,13,15}=
.sub.2,
which contains the aliased support,.sub.2={1 mod 20,23 mod 20,35 mod 20}={1,3,15}
as shown on line 2 of
(31) The working support becomes .sub.2:={0, 1, . . . , 19}. Once again, it is possible to recover
.sub.2 by leveraging the fact that {l∈{0, 1, . . . , M.sub.2−1}:{circumflex over (ƒ)}.sub.l.sup.(2)≠0}=
.sub.2. Here however, the cost is higher since computing {circumflex over (ƒ)}.sup.(2) involves performing an FFT of size M.sub.2=20. Continuing in the fashion of the first step, the cost would increase exponentially with k, so different steps are required to contain the cost. Such steps involve a special kind of shuffling and filtering of the samples followed by an FFT, and we describe this in detail below. Altogether, it is shown that
.sub.k can now be recovered from the knowledge of
.sub.k at any step k using merely
(R log(R)) samples and
(R log.sup.2(R)) computational steps.
(32) Following the rapid recovery of .sub.2, we proceed in a similar fashion until
.sub.k:={0, 1, . . . , N−1} at which point
.sub.k=
. Throughout this process, the size of the aliased support
.sub.k and candidate support
.sub.k remain of order
(R log(R)) while the size of the working support increases exponentially fast; i.e.,
(33)
This therefore implies
(34)
“dealiasing” steps, and thus a total cost of
(35)
samples and
(36)
computational steps to identify .
(37) Thus, with reference to is computed as follows. Line 0: Initialization; (unknown) elements of
correspond to black dots and lie in the grid {0, 1, . . . , N−1}. Line 1: First step; elements of the candidate support
.sub.1 are represented by thin tickmarks and those of the aliased support
.sub.1 by thick tickmarks.
.sub.1 is a subset of
.sub.1 and both lie in the working support {0, 1, . . . , M.sub.1−1}. Line 2: Second step; elements of the candidate support
.sub.2 correspond to thin tickmarks and are obtained through de-aliasing of
.sub.1. Elements of the aliased support
.sub.2 correspond to thick tickmarks. Both lie in the working support {0, 1, . . . , M.sub.2−1}. M.sub.2 is a constant factor/multiple of M.sub.1. Line 3: The final step correspond to the step when the working set is equal to {0, 1, . . . , N−1}. While
(38)
iterations may be performed, where P can be any number such as 1, 5, 8, 10, 30, etc.
(39) The steps of this support-recovery algorithm are described in Algorithm 2, the correctness of which is guaranteed by the following proposition.
(40) Proposition 1. In the noiseless case, Algorithm 2 outputs , the support of the nonnegative R-sparse vector {circumflex over (ƒ)} with probability at least (1−p) using
(41)
samples and
(42)
computational steps.
(43) Proof: Refer to Algorithm 2 and Proposition 5 as well as the above discussion.
(44) From the knowledge of , it is possible to recover the actual values of {circumflex over (ƒ)} rapidly and with few samples. This is the second major step of the sMFFT which we describe below.
(45) Rapid Recovery of .sub.k from Knowledge of
.sub.k
(46) Details are given here as to how to solve the problem of rapidly recovering the aliased support .sub.k from the knowledge of a candidate support
.sub.k. Before proceeding, a few definitions are introduced.
(47) Definition 1 Let 1≤K≤M∈. Then, define the set
(K; M) as,
(48)
Definition 2 Let 0<M∈. Then, we define the set Q(M) as,
Q(M):={q∈[0,M)∩:q⊥M},
where the symbol ⊥ between two integers indicates they are coprime.
(49) Algorithm 3 (.sub.k containing at most R nonzeros are shuffled (according to appropriate random permutation) and subsequently convoluted with a (low-frequency) Gaussian (or another low pass filter function), then the probability that the resulting value at a location m∈
.sub.k.sup.c is of order
(1) is small. If m∈
.sub.k the value at m is of order O(1) with probability 1.
(50) This realization allows us to develop an efficient statistical test to identify .sub.k from the knowledge of
.sub.k. The process is shown schematically in
(51) To illustrate, we once again proceed through an example shown in .sub.k={1,23,35},
.sub.k={1,3,15,21,23,35},
.sub.k={1,2, . . . ,39}
as in step/iteration k=3 shown in Algorithm 2. This alias support is shown at line A of
(52) The first step is to randomly shuffle the elements of .sub.k within
.sub.k by applying a permutation operator Π.sub.Q(⋅) in the sample space:
(53)
for some integer Q∈Q(M.sub.k) ([Q].sub.M.sub.
(54)
Furthermore, Lemma 4 shows that if Q is chosen uniformly at random within Q(M.sub.k), the mapped elements of the candidate support .sub.k will be more or less uniformly distributed within the working support
.sub.k,
(55)
(56) This step is followed by the application of a diagonal Gaussian filtering operator Ψ.sub.σ(⋅) having elements:
(57)
in the sample space (step 2). Instead of a Gaussian filter, any other low-pass filter can be applied. By the properties of the Fourier transform, this is equivalent to a convolution in the frequency space (line C,
(58)
(59) The function is now bandlimited (with bandwidth of order O(K) due to our choice for a, the standard deviation of the Gaussian filter (or a low-pass filter, in general) that is applied, as shown in Algorithm 3, so this expression can be discretized (samples x,
(60)
In particular, we note that if n if of the form
(61)
for j=0, . . . , K−1, the last step can be performed through a small size-K FFT. This corresponds to step 3 of the aliased support recovery algorithm. The knowledge of,
(62)
can be used to recover .sub.k from
.sub.k rapidly, which can be seen as follows.
(63) By construction, ϕ.sub.n.sup.(k) can be “large” only if the distance between n and some element belonging to the shuffled and aliased support, i.e., some element of {(lQ) mod M.sub.k}.sub.l∈.sub.
(64)
and the shuffled elements of the aliased support is smaller than O(σ), as well (by the triangle inequality). However, because of the randomness introduced by the shuffling, and because of the particular choice of σ, Proposition 5 shows that for any fixed n∈.sub.k, the probability that a computed element
(65)
is “large” for multiple independent trials is small if n∈.sub.k∩
.sub.k.sup.c and equal to 1 if n∈
.sub.k∩
.sub.k. This fact allows for the construction of an efficient statistical test based on the knowledge of the quantities found in Eq. (9) to discriminate between the points of
.sub.k∩
.sub.k.sup.c and those of
.sub.k∩
.sub.k (step 4). Such a test forms the core of Algorithm 3, and its correctness follows from the Proposition 2.
(66) Proposition 2. In the noiseless case, Algorithm 3 outputs .sub.k, the aliased support of the vector {circumflex over (ƒ)} at step k, with probability at least (1−p) using
(log(p)R log(R)) samples and
(log(p)R log.sup.2(R)) computational steps.
(67) Proof. Refer to Algorithm 3 and Proposition 5 as well as the above discussion.
(68) Thus, according to .sub.k from knowledge of
.sub.k involves receiving
.sub.k (line A)). First, indices are shuffled in sample space leading to a shuffling in frequency space (line B)). A Gaussian or another low pass filter is applied followed by a small FFT (line C)) on a grid G(x). The points of
.sub.k for which the value of the result of the last step at their closest neighbor in G is small are discarded, leaving only the aliased support
.sub.k.
(69) As for the computational cost, the permutation and filtering (multiplication) steps (1 and 2) both incur a cost of (R log(R)) since only the samples for which the filter is of order O(1) are considered (and there are
(K)=
(R log(R)) of them following our choice of σ and K). These are followed by an FFT (step 3) of size O(K) which carries a cost of order
(R log.sup.2(R)). Finally, step 4 involves checking a simple property on each of the M.sub.k elements of
.sub.k incurring a cost of
(R log(R)). This is repeated
(log(p)) times for a probability (1−p) of success. Thus, extracting
.sub.k from
.sub.k requires merely
(log(p)R log(R)) samples and
(log(p)R log.sup.2(R)) computational time for fixed p.
(70) Recovering Values from Knowledge of the Support
(71) Assume a set size O(K) containing the support S has been recovered. We now show how the values of the nonzero Fourier coefficients of {circumflex over (ƒ)} in Eq. (3) can be rapidly computed using this information. For this purpose, assume ƒ(x) can be sampled at locations:
(72)
for t=0, 1, . . . , T, and {P.sup.(t)}.sub.t=1.sup.T are some random prime or co-prime numbers on the order of (R log.sub.R(N)) (see Algorithm 4, shown in
(73)
for t=0, 1, . . . , T. The outer sum is seen to be a DFT of size P.sup.(t) of a shuffled and aliased vector, whereas the inner sum can be expressed as the application of a binary matrix B.sub.q,j.sup.(t) with entries
(74)
to the vector with entries' index corresponding to those of the support of {circumflex over (ƒ)}. In particular, each such matrix is sparse with exactly #S=O(R) nonzero entries.
(75) Eq. (10) can further be written in matrix form as:
(76)
where F.sup.(t) is a standard DFT matrix of size P.sup.(t). Proposition 6 states that if T=O(1) is sufficiently large, then with nonzero probability
(77)
where I is the identity matrix and is a perturbation with 2-norm smaller than ½. When this occurs, one can solve a linear system through the Neumann series, i.e.,
(78)
This forms the core of Algorithm 4. Proposition 3 provides the correctness of this algorithm.
(79) Since each matrix B.sup.(t) contains exactly R nonzero entries, both B and B*B can be applied in order RT=(R log.sub.R (N)) steps. In addition, since F is a block diagonal matrix with T=O(1) blocks consisting of DFT matrices of size
(R log.sub.R(N)), it can be applied in order
(R log(N)) using the FFT computation. Finally, for an accuracy η the Neumann series can be truncated after
(log( )) terms, and the process may be repeated at most log(p) times for a probability p of success. Therefore, the cost of computing the nonzero values of {circumflex over (ƒ)} is bounded by
((log(p)+log(η))R log(N)) and uses at most
((log(p)+log(η))R log.sub.R(N)) samples.
(80) Proposition 3. Given the support of {circumflex over (ƒ)} is known, Algorithm 4 outputs an approximation to the nonzero elements of {circumflex over (ƒ)} with error bounded by η in the
.sup.2-norm, with probability greater than or equal to 1−p using
((log(p)+log(η))R log.sub.R(N)) samples and
((log(p)+log(η))R log(N)) computational steps.
(81) Stability to Low-Level Noise
(82) As discussed previously, the theory underlying Algorithms 1 through 4 has been designed for vectors that are exactly sparse. Here, we discuss the effect of low-level noise. In fact, we show that if the sparse vector of Fourier coefficients takes the form {circumflex over (ƒ)}+{circumflex over (ν)}, where √{square root over (N)}∥{circumflex over (ν)}∥.sub.2<η for some “small” η, an embodiment of the sMFFT technique can recover the support and values of {circumflex over (ƒ)} with the same guarantees as described earlier.
(83) Support Recovery
(84) An important quantity for the fast recovery of the support is the set of frequency coefficients of shuffled and filtered samples, as described in Eq. (9), so in the presence of noise,
(85)
The second term in this expression is the error term and can be uniformly bounded by the following lemma:
(86) Lemma 1. Assuming the noise term {circumflex over (ν)} is such that
(87)
the error term of the computed value in Eq. (12) is uniformly bounded by the error term of the computed value in
(88)
Algorithm 2 tests whether
(89)
in order to discriminate between elements of the candidate and aliased supports. The presence of noise can skew this test in two ways: 1) by bringing the computed value below the threshold when i∈.sub.k, or 2) by bringing the value above the threshold multiple times when i.Math.
.sub.k. Either way, if η is small enough, i.e., such that
(90)
the conclusion of Proposition 5 follows through with similar estimate, by simply replacing δ with
(91)
in the proof.
Recovering Values from Knowledge of the Support
(92) It is quickly observed that the recovery of the values is a well-conditioned problem. Indeed, since
(93)
and
(94)
with high probability by Proposition 6, a simple argument based on the singular value decomposition produces the following corollary,
(95) Corollary 1. Under the hypothesis of Proposition 6,
(96)
exists, and
(97)
with probability greater than or equal to ½.
Therefore, the output of Algorithm 4 is such that
(98)
This, together with Proposition 3, demonstrates the stability of Algorithm 4 in the noisy case.
The Multi-Dimensional Sparse FFT
(99) Whenever dealing with the multidimensional DFT/FFT, it is assumed that the function of interest is both periodic and bandlimited with fundamental period [0,1).sup.d i.e.,
(100)
for some finite M∈ and j∈
.sup.d, up to some rescaling. Computing the Fourier coefficients is then equivalent to computing the d-dimensional integrals,
{circumflex over (ƒ)}.sub.n=∫.sub.[0,1].sub.
and this can be achieved through a “dimension-by-dimension” trapezoid rule
(101)
(102) However, Proposition 4 below shows that it is also possible to re-write the d-dimensional DFT as that of a 1D function with Fourier coefficients equal to those of the original function, but with different ordering.
(103) Proposition 4. (Rank-1 d-dimensional DFT) Assume the function ƒ:[0,1).sup.d.fwdarw. has form (13). Then,
(104)
for all j∈[0, M).sup.d ∩.sup.d, where
(105)
and N=M.sup.d.
Now, the right-hand side of Eq. (14) can be written in two different ways (due to periodicity); namely,
(106)
(107) Geometrically, the left-hand side represents a quadrature rule with points
(108)
distributed (more-or-less uniformly) in [0, 1).sup.d, as shown at points 802 in
(109)
now lie on a line embedded in R.sup.d, as shown at points 806 in
ń:{n∈([0,M)∩).sup.D}.fwdarw.n.Math.g=n.sub.0+n.sub.1M+ . . . +n.sub.D−1M.sup.D−1∈[0,M.sup.D)∩
.sup.D.
(110) We use this sort of sampling to treat of the multidimensional problem, which we first convert to a 1D problem. Then, we address the 1D problem through Algorithms 1 through 4, and then map the result back to its original d-dimensional space. Specifically, the sampling points corresponding to a 1-D signal that is equivalent to the multi-dimensional signal are obtained using Algorithms 1 through 4. Using inverse mapping between the multi-dimensional signal and the 1-D signal, the corresponding points of the multi-dimensional signal are identified and sampled.
(111)
(112) In general, there is no need for the signal's spectrum to reside on a regular grid. Indeed if the signal is sparse in the continuous domain, one can approximate such function on the hypercube by a function which spectrum does lie on a regular grid, and which spectral support correspond to the closest neighbor of the original spectral support within the regular grid. For some error ϵ, a grid with spacing
(113)
containing
(114)
unknowns should suffice.
An Example System for Generating Frequency Components of a Signal
(115) With reference to
(116) Using the parameters N and R, one or more of other parameters of the system may be computed or selected. These parameters include an FFT size K, a number of iterations P, an index limit M.sub.k for the candidate support set .sub.k used in the k-th iteration, and a support set growth factor ρ.sub.k. In various implementations, these parameters may be related according to the expressions
(117)
and M.sub.k=Kρ.sub.k=O(R log R). The system 900 may also determine various shuffling parameters Q.sub.k.sup.l, where l ranges from 1 through a parameter L, using the values M.sub.k. In addition, the system 900 may determine, using the values M.sub.k, various value recovery parameters P.sup.(l,t), where l ranges from 1 through the parameter L and t ranges from 1 through a parameter T, discussed above. In some implementations, L=1. The shuffling and value recovery parameters can be used for sampling the signal ƒ(x).
(118) In particular, the system 900 includes a sampling/sub-sampling module 902 and a sampling and shuffling module 904. In some implementations, the shuffling module can be different module. The sampling/sub-sampling module 902 samples the signal ƒ(x) using the parameters M.sub.1 and N, and generates a set of samples ƒ.sup.1(x.sup.1). A Fourier transform of these samples (e.g., an M.sub.1-point FFT) is performed in the module 906 to obtain M.sub.1 frequency coefficients, which are designated as the candidate support set .sub.1. The non-zero coefficients from the set
.sub.1 are selected in the module 908 and designated as the support set
.sub.1.
(119) In a de-aliasing module 910, the value of M.sub.k is used to de-alias a previously generated support set .sub.k−1, as discussed above. For example, the support set
.sub.1 can be de-aliased to obtain the candidate support set
.sub.2. De-aliasing can be performed in the frequency domain, i.e., using indices of the aliased frequency components, and without requiring values of those components or samples of the signal ƒ(x). Thereafter, the significant non-zero coefficients of the candidate support set
.sub.k are selected in the module 912, to obtain the support set S.sub.k. This step requires one or more sets of signal samples, which may have been obtained a priori or may be obtained as needed by the sampling/shuffling module 904. During this process, the index limit M.sub.k of the candidate support set
.sub.k grows according to the growth factor ρ.sub.k.
(120) The operations in the modules 910, 912 are repeated using the new support set S.sub.k if it is determined that M.sub.k<N. These iterations are generally described above with reference to Algorithms 2 and 3. After P iterations, i.e., when M.sub.k is no longer less than N or is equal to N, the support set S.sub.p generated in the last iteration is considered to be the final support set . The values of the frequency components corresponding to the indices in the final support set
are determined at the recovery module 914 according to Algorithm 4 discussed above. The determination of the values also requires one or more sets of samples of the signal ƒ(x). These sample set(s) can be obtained a priori or as needed by the sampling/shuffling module 904.
(121) .sub.1, as discussed above. The sampling/sub-sampling module 902 (
(122) Specifically, the modules 954 use the shuffling parameters Q.sub.k.sup.l, where l ranges from 1 through the parameter L (which can have the value 1), and k ranges from 1 or 2 through the number of iterations P. The values of Q.sub.k.sup.l depend on the values of the index limits M.sub.k, as described above. A distinct set of samples of the signal ƒ(x) may be obtained for each value of Q.sub.k.sup.l. In some implementations, instead of using a different sampler 954 for each Q.sub.k.sup.l, fewer samplers, and as few as a single sampler 954 may be used. One or more samplers 954 may be tunable to perform sampling according to one or more values Q.sub.k.sup.l. In some embodiments, the samplers 954 also include the corresponding shufflers. In other implementations, shuffling, as described above, may be performed in different module(s).
(123) The modules 956 use the recovery parameters P.sup.(l,t), where l ranges from 1 through the parameter L (which can have the value 1), and t ranges from 1 through T, as described above. The values of P.sup.(l,t) depend on the parameters N and/or R, as described above. Here again, a distinct set of samples of the signal ƒ(x) may be obtained for each value of P.sup.(l,t). In some implementations, instead of using a different sampler 956 for each P.sup.(l,t), fewer samplers, and as few as a single sampler 956 may be used. One or more samplers 956 may be tunable to perform sampling according to one or more values P.sup.(l,t). In some embodiments, the samplers 956 also include the corresponding shufflers. In other implementations, shuffling, as described above, may be performed in different module(s).
(124) In some implementations, all the sampling is performed a priori, i.e., before the determination of any or at least some of the support sets .sub.k. The different sample sets are stored in memory and are accessed as needed. In other implementations, the sampling and the computation of the support sets and/or the recovery of the frequency coefficients may be interleaved. In some implementations, a set of samples is obtained by performing sampling only when it is needed for the determination of the support set or for recovery of the frequency coefficient values.
(125) Generalization to General Complex Sparse Vectors
(126) We now describe certain additional steps for transforming the sMFFT for real positive vectors into a reliable process for general complex vectors. To achieve this task, two major hurdles, both associated with the support-recovery portion of the scheme, are overcome; the first one is associated with the initial aliasing of the signal described, as discussed above. As shown in Eq.(5), at each step aliasing implies Fourier coefficients of the form,
{circumflex over (ƒ)}.sub.l.sup.(k)=Σ.sub.j:j mod M.sub.
When the original nonzero coefficients are all strictly positive, this expression is positive if and only if the lattice
(127)
contains one of the original non-zero coefficients. When the non-zero coefficients are complex, however, this is no longer true.
(128) The second potential issue pertains to the resulting filtering step found in Algorithm 3. As described by Eq. (8), the result takes the form,
(129)
which corresponds to the Fourier transform of the aliased signal convoluted with a Gaussian. Once again, the statistical test used in Algorithm 3 relies on this quantity being positive if and only if a point lies in the vicinity of an element of the (shuffled and aliased) support .sub.k. Such statement does not hold true if we allow the coefficients to be general complex numbers (as some elements might cancels out).
(130) It follows from these observations that as a consequence of the lack of positivity, it is possible that elements belonging to .sub.k∩
.sub.k might be wrongfully eliminated in Algorithm 3, i.e., the false negative identification rate is nontrivial. To alleviate these issues, we describe a modified scheme, where we accommodate for the possibility that the output of Algorithm 3 may be missing one or more elements of
.sub.k, by launching multiple independent iterations of the FIND_SUPPORT(⋅) process in Algorithm 1, and by taking the union of the outputs. In this sense, although it is possible to miss an element with a single run, we expect that the probability of a miss over multiple independent run is very small. In one implementation, up to log p independent iterations, using different values of N, are launched.
(131) This modification does not have any effect on the fundamental computational complexity; indeed, close examination shows that these additional steps only increase the algorithmic constant by some small quantity independent of N and/or R. We have implemented this modification and it provided good numerical results in line with our expectation based on the previous discussion, and very similar to those obtained in the real-positive case.
(132) Numerical Results
(133) We have implemented our sMFFT algorithms in MATLAB® and present a few numerical results which exhibit the efficient scaling. All simulations were carried out on a small cluster possessing 4 Intel Xeon E7-4860 v2 processors and 256 GB of RAM, with the MATLAB flag—singleCompThread to ensure fairness through the use of a single computational thread. The numerical experiments presented here fall in two categories: 1) dependence of running time as a function of the total number of unknowns N for a fixed number of nonzero frequencies R, and 2) dependence of running time as a function of the number of nonzero frequencies R for a fixed total number of unknowns N. All experiments were carried out in three dimensions (3D) with additive Gaussian noise with variance r. The nonzero values of {circumflex over (ƒ)} were picked randomly and uniformly at random in [0.5, 1.5], and the remaining parameters were set according to Table 2, shown in
(134) For case 1), we picked R=50 nonzero frequencies distributed uniformly at random on a 3D lattice having N.sup.1/3 elements in each dimension for different values of N∈[10.sup.3, 10.sup.10]. The results are shown in .sup.2-error observed was 9. 3 10.sup.−3 which is on the order of the noise level, as predicted by the theory.
(135) For case 2), we fixed N=O(10.sup.8) and proceeded to compare the sMFFT algorithm with the MATLAB fftn(−) function as before (w/ parameters found in Table 2). The results are shown in .sup.2-error observed was 1.1.Math.10.sup.−2, again on the order of the noise level and in agreement the theory. Finally, the cost of the MATLAB fftn(−) function remains constant as the FFT scales like
(N log(N)) and is oblivious to R.
(136) We have introduced a sparse multidimensional FFT (sMFFT) for computing the DFT of a N×1 sparse, real-positive or complex vector (having R non-zeros) that is stable to low-level noise, that exhibits a sampling complexity of ((R log(R)log(N))) and a computational complexity (
(R log.sup.2(R)log(N))). This technique also has a scaling of
(log(p)) with respect to probability of failure,
(log(η)) with respect to accuracy and O(1) with respect to dimension. We have provided a rigorous theoretical analysis of our approach demonstrating this efficient and accurate computation of the non-zero frequency coefficients of a signal. We have implemented our algorithm and provided numerical examples in 3D successfully demonstrating the benefits of the scaling that can be achieved using implementations of our technique.
(137) Proofs
(138) We present all proofs and accompanying results related to the statements presented in the discussion above.
(139) Lemma 2. Let 0<Q≤N∈, Q⊥N. Then the map,
n∈{0,1, . . . ,N−1}.fwdarw.nQ mod N⊂{0,1, . . . ,N−1}
(140) is an isomorphism.
(141) Proof. Since the range is discrete and a subset of the domain, it suffices to show that the map is injective. Surjectivity will then follow from the pigeon hole principle. To show injectivity, consider i, j∈{0, 1, . . . , N−1}, and assume,
iQ mod N=jQ mod N
(142) This implies (by definition) that there exists some integer p such that,
(i−j)Q=pN
(143) so that N divides (i−j)Q. However, N⊥Q so N must be a factor (i−j). Now, i, j are restricted to {0, 1, . . . , N−1} so,
|i−j|<N,
(144) and the only integer divisible by N that satisfies this equation is 0. Thus,
i−j=0⇔i=j
(145) which demonstrates injectivity.
(146) Lemma 3. Let 0<Q<M be an integer coprime to M and,
(147)
(148) Then,
(149)
(150) where 0<[Q].sub.M.sup.−1<M is the unique integer such that [Q].sub.M.sup.−1 Q mod M=1 mod M.
(151) Proof. Consider
(152)
(153) However,
(154)
(155) where the second equality follows from the fact that m.fwdarw.m[Q].sub.M.sup.−1 mod M is an isomorphism (Lemma 2).
(156) This implies that
(157)
(158) as claimed.
(159) Lemma 4. Let M∈/{0} and let Q be a uniform random variable over Q(M) (Definition 2). Then,
(160)
(161) for all 0<j<M (up to a log(log(M)) factor).
(162) Proof. Fix 0<j, k<M and let γ=gcd(j, M). Consider,
(163)
(164) and note that,
(165)
(166) following bounds on the Euler totient function ϕ(⋅) ([33]), where ζ is the Euler-Mascheroni constant, and since Q is uniformly distributed in Q(M). Therefore,
(167)
(168) We now show that the quantity Σ.sub.q.sub.jq mod M=k(q) is bounded above and below by,
(169)
(170) To see this, first note that this quantity corresponds to the number of integers q which hash to the integer k through the map q.fwdarw.(jq) mod M. Now, assume there exists some q such that
jq mod M≡k, (15)
which implies that
jq+iM=k (16)
(171) for some integer i∈. This is a Diophantine equation which has infinitely many solutions if and only if gcd(j, M)=y divides k. Otherwise, it has no solution. Assuming it does and (q.sub.0, i.sub.0) is a particular solution, all remaining solutions must take the form
(172)
(173) where u∈. However, since 0≤q<M the number of possible solutions must be such that,
(174)
which proves the claim. Thus,
(175)
(176) We can now treat (|jQ mod M|≤C). Before we proceed however, recall that Eq.(15) has a solution if and only if γ|k. We then write,
(177)
(178) from which it follows that,
(179)
(180) since the number of integers in 0≤k≤C that are divisible by γ is bounded above by
(181)
Finally, since this holds regardless of our choice of j, this proves the desired result.
(182) Lemma 5. Consider a function ƒ(x) of the form of Eq.(3) and satisfying a certain constraint. Let
(183)
(184) Finally, let (⋅) and Ψ.sub.σ(⋅) be the operators found in Eq.(9). Then, there exists a constant 1<C<∞ such that if
(185)
(186) the inequality,
(187)
(188) implies that
(189)
(190) and,
(191)
(192) implies that
(193)
(194) for all n∈{0, 1, . . . , K−1}.
(195) Proof. Consider the quantity
(196)
(197) an recall that,
(198)
(199) where
(200)
(Definition 1).
From this expression, it is apparent that there exists some constant 1<C<∞ such that by choosing
(201)
one has,
(202)
(203) Indeed, by the integral test,
(204)
(205) for some positive constants A, B, and where the last inequality follows from estimates on the complementary error function and the fact that
(206)
by assumption. Therefore,
(207)
(208) where
(209)
Now assume:
(210)
Then, the triangle inequality and the previous equation imply that,
(211)
(212) We claim that this cannot occur unless,
(213)
(214) We proceed by contradiction. Assume the opposite holds. Then,
(215)
(216) by assumption. This is a contradiction. Thus, Eq.(21) must indeed hold. This proves the first part of the proposition. For the second part, assume
(217)
(218) holds. Letting j* be such that
(219)
we note that,
(220)
(221) Proposition 5. (Correctness of Algorithm 3) Consider a function ƒ(x) of the form of Eq.(3) and satisfying the nonnegativity hypothesis, and let Π.sub.Q(⋅), Ψ.sub.σ(⋅) and F.sub.K(⋅) be the operators found in Eq.(9) where δ, μ, Δ and, K are as in Lemma 5 and, K satisfies the additional constraint
(222)
and
(223)
(224) for some 0<α<1. Assume further that the integers {Q.sup.(l)}.sub.l=1.sup.L are chosen independently and uniformly at random within Q(M), for some 1≤L∈. Consider
(225)
Then,
(226)
for every i such that (i[Q].sub.M.sup.−1) mod M.Math..sup.c, and
(227)
almost surely for all Q.sup.(l) land every i such that (i[Q].sub.M.sup.−1) mod M∈.
(228) Proof. From independence, the probability in Eq. (25) is equal to,
(229)
(230) So it is sufficient to consider a fixed l. Assume first that i[Q].sub.M.sup.−1 mod M.Math.. As a consequence of Lemma 5 and Lemma 3 we have the inclusion,
(231)
(232) which implies that the probability for each fixed l is bounded by,
(233)
(234) by the union bound, by Lemma 4 (since i[Q].sub.M.sup.−1 mod M≠j) and by assumption. Therefore,
(235)
as claimed. As for the second part of the proposition, note that if i[Q].sub.M.sup.−1 mod M∈ then
(236)
by assumption. By Lemma 5, this implies that
(237)
and since this is true regardless of the value of the random variable Q(1), we conclude that it holds almost surely.
(238) Remark. A careful study of the proof of Lemma 5 and Proposition 5 shows that the order (R √{square root over (log(R))}) size of K arises from the need to bound quantities of the form
(239)
In the worst-case scenario (the case treated by Lemma 5), this requires estimates of the form of Eq.(17), Eq.(18) and Eq.(23) which introduce an extra √{square root over (log(R))} factor in the computational cost (Section 3) relative to the (conjectured) optimal scaling. However, throughout the algorithm the elements of any aliased support .sub.k appearing in the sum are always subject to random shuffling first. Lemma 4 states that the shuffling tends to be more of less uniform. Now, were the elements i.i.d. uniformly distributed, it would be easy to show that these quantities are of order O(1) with high probability, removing the need for the extraneous factor. Unfortunately, our current theoretical apparatus does not allow us to prove the latter. However, following this argument and numerical experiments, we strongly believe that it is possible. In this sense, we believe that through a slight modification of the choice of parameters, our algorithm exhibits an (optimal) O (R log(R)log(N)) computational complexity with the same guarantees of correctness as the current scheme.
(240) Lemma 6. Let {P.sup.(t)}.sub.t=1.sup.T be prime numbers greater than or equal to R∈, and let i, j∈{0, 1, . . . , N−1} such that,
i mod P.sup.(t)=j mod P.sup.(t),t=1,2, . . . ,T.
(241) If T>log.sub.R(N), then i=j.
(242) Proof. Consider {P.sup.(t)}.sub.t=1.sup.T as described above and T>log.sub.R(N), and assume that
i mod P.sup.(t)=j mod P.sup.(t)
(243) for t=0, 1, . . . , T. This implies in particular that
P.sup.(t)|(j−i)
(244) for t=0, 1, . . . , T, and that
lcm({P.sup.(t)}.sub.t=1.sup.T)|(j−i).
(245) However, since the integers {P.sup.(t)}.sub.t=1.sup.T are prime (and therefore coprime),
(246)
(247) This implies that,
|j−i|≥N,
(248) since i≠j, and this is a contradiction since both belong to {0,1,N−1}.
(249) Corollary 2. Let {P.sup.(t)}.sub.t=1.sup.T are as in Lemma 6 and that i≠j, k≠l, i, j, k, l∈{0, 1, N−1} are such that,
i mod P.sup.(t)=j mod P.sup.(t)
k mod P.sup.(t)=l mod P.sup.(t)
(250) for t=1, 2, . . . , T. Then,
(i−j)=(k−l)
(251) Proof. The statement is equivalent to,
(i−j)mod P.sup.(t)=0=(k−l)mod P.sup.(t)
(252) for t=1, 2, . . . T. By Lemma 6, this implies that (j−i)=(k−l).
(253) Proposition 6. Let 0<R<N∈N. Further let {P.sup.(t)} be random integers uniformly distributed within the set P containing the 4R log.sub.R(N) smallest prime numbers strictly larger than R, and let F and B be defined as in Eq. (11) with these parameters. If T≥4, then,
(254)
(255) Proof. First, note that,
(FB)*(FB)=B*F*FB=B*B
(256) since F is a block-diagonal Fourier matrix, and
(257)
has entries
(258)
(259) Therefore, for any vector x such that ∥x∥.sub.2=1,
(260)
(261) by Chebyshev inequality. Furthermore, thanks to Eq.(26) and independence, the expectation can be written as,
(262)
(263) Now, let τ(i, j) be defined as
τ(i,j):={P.sup.(t)∈:i mod P.sup.(t)=j mod P.sup.(t)}.
(264) The case s≠t is treated as follows,
(265)
(266) since P.sup.(t) is uniformly distributed within a set of cardinality 4R log.sub.R(N), and because,
(267)
(268) by Lemma 6. This leaves us the case s=t. To this purpose, we further split this case into two subcases: that when i−j=k−l and that when i−j≠k−l. When i−j=k−l we obtain,
(269)
(270) since k≠l, following an argument similar to the previous one. This leaves the case s=t, i−j≠k−l. However, thanks to Corollary 2 it follows that the set,
(271)
(272) must be empty. Putting everything together we find that,
(273)
(274) We further note that Σ.sub.i≠j
(275)
(276) Finally, by Cauchy-Schwartz inequality,
|Σ.sub.j
(277) Thus,
(278)
(279) as claimed.
(280) Corollary 3. Under the hypotheses of Proposition 6, the solution to the linear system
FB{circumflex over (ƒ)}=ƒ.sub.0
(281) takes the form,
(282)
(283) with probability at least ½.
(284) Proof. By Proposition 6,
(285)
with probability at least ½. When this is the case we write,
(286)
(287) In this case, it is easy to verify that the Neumann series,
(288)
(289) satisfies this last equation, and that the sum converges exponentially fast.
(290) Proposition 3. Assume the support of {circumflex over (ƒ)} is known. Then Algorithm 4 outputs an approximation to the nonzero elements of {circumflex over (ƒ)} with error bounded by η in the l.sup.2-norm, with probability greater than or equal to 1−p using O ((log(p)+log(η))R log.sub.R(N)) samples and Õ((log(p)+log(η)) R log(N)) computational steps.
(291) Proof. By Proposition 6,
(292)
with probability larger than ½. Thus, if we consider O(log ½(p)) independent realizations of FB, the probability that at least one of them is such is greater than or equal to (1−p). When this occur, Corollary 3 states that the solution is given by the Neumann series. Furthermore,
(293)
(294) by the geometric series and the bound
(295)
(296) Lemma 7. Assuming the noise term {circumflex over (ν)} is such that
(297)
the error term of the computed value in Eq. (12) is uniformly bounded by
(298)
(299) Proof. First, not that since Π.sub.Q(⋅) is an isomorphic permutation operator (for all Q∈Q(M.sub.k)) one has
∥Π.sub.Q∥.sub.∞=1.
(300) Similarly, since the filtering operator Ψ.sub.σ(⋅) is diagonal with nonzero entries ĝ.sub.σ(n), then
(301)
(302) Finally, we get from the triangle inequality that,
(303)
(304) by the Hausdorff-Young inequality. Finally, we note that: ∥{circumflex over (ν)}∥.sub.1≤√{square root over (N)}∥{circumflex over (ν)}∥.sub.2<η by assumption, and recall that K=(R√{square root over (log(R))}). This leads to the desired result.
(305) Proposition 4. (Rank-1 d-dimensional DFT) Assume the function ƒ:[0,1).sup.d.fwdarw. has form (13). Then,
(306)
(307) for all j∈[0,M).sup.d∩.sup.d, where
(308)
(309) Proof First, note that
∫.sub.[0,1]si de.sup.−2πij.Math.xƒ(x)dx={circumflex over (ƒ)}.sub.j.
(310) Then, substitute the samples in the quadrature to obtain
(311)
(312) Since
(313)
(314) Note however that
(315)
(316) which is the Dirichlet kernel and is equal to 0 unless (k−j).Math.g=0 mod N, in which case it is equal to 1. Thus,
(317)
(318) Thus, in order to show that the quadrature is exact, it suffices to show that the remaining sum on the right-hand side of the previous equation is trivial. To see this, note that (k−j)ϵ[−M, M).sup.d∩.sup.d and consider
(319)
where the inequality is strict for any finite MϵN strictly larger than 1. This implies that there cannot be any (k−j) other than 0 in the domain of interest such that (k−j).Math.g mod N≡0. The sum is therefore empty and the result follows.
(320) It is clear that there are many ways to configure the device and/or system components, interfaces, communication links, and methods described herein. The disclosed methods, devices, and systems can be deployed on convenient processor platforms, including network servers, personal and portable computers, and/or other processing platforms. Other platforms can be contemplated as processing capabilities improve, including personal digital assistants, computerized watches, cellular phones and/or other portable devices. The disclosed methods and systems can be integrated with known network management systems and methods. The disclosed methods and systems can operate as an SNMP agent, and can be configured with the IP address of a remote machine running a conformant management platform. Therefore, the scope of the disclosed methods and systems are not limited by the examples given herein, but can include the full scope of the claims and their legal equivalents.
(321) The methods, devices, and systems described herein are not limited to a particular hardware or software configuration, and may find applicability in many computing or processing environments. The methods, devices, and systems can be implemented in hardware or software, or a combination of hardware and software. The methods, devices, and systems can be implemented in one or more computer programs, where a computer program can be understood to include one or more processor executable instructions. The computer program(s) can execute on one or more programmable processing elements or machines, and can be stored on one or more storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), one or more input devices, and/or one or more output devices. The processing elements/machines thus can access one or more input devices to obtain input data, and can access one or more output devices to communicate output data. The input and/or output devices can include one or more of the following: Random Access Memory (RAM), Redundant Array of Independent Disks (RAID), floppy drive, CD, DVD, magnetic disk, internal hard drive, external hard drive, memory stick, or other storage device capable of being accessed by a processing element as provided herein, where such aforementioned examples are not exhaustive, and are for illustration and not limitation.
(322) The computer program(s) can be implemented using one or more high level procedural or object-oriented programming languages to communicate with a computer system; however, the program(s) can be implemented in assembly or machine language, if desired. The language can be compiled or interpreted. Sets and subsets, in general, include one or more members.
(323) As provided herein, the processor(s) and/or processing elements can thus be embedded in one or more devices that can be operated independently or together in a networked environment, where the network can include, for example, a Local Area Network (LAN), wide area network (WAN), and/or can include an intranet and/or the Internet and/or another network. The network(s) can be wired or wireless or a combination thereof and can use one or more communication protocols to facilitate communication between the different processors/processing elements. The processors can be configured for distributed processing and can utilize, in some embodiments, a client-server model as needed. Accordingly, the methods, devices, and systems can utilize multiple processors and/or processor devices, and the processor/processing element instructions can be divided amongst such single or multiple processor/devices/processing elements.
(324) The device(s) or computer systems that integrate with the processor(s)/processing element(s) can include, for example, a personal computer(s), workstation (e.g., Dell, HP), personal digital assistant (PDA), handheld device such as cellular telephone, laptop, handheld, or another device capable of being integrated with a processor(s) that can operate as provided herein. Accordingly, the devices provided herein are not exhaustive and are provided for illustration and not limitation.
(325) References to “a processor”, or “a processing element,” “the processor,” and “the processing element” can be understood to include one or more microprocessors that can communicate in a stand-alone and/or a distributed environment(s), and can thus can be configured to communicate via wired or wireless communication with other processors, where such one or more processor can be configured to operate on one or more processor/processing elements-controlled devices that can be similar or different devices. Use of such “microprocessor,” “processor,” or “processing element” terminology can thus also be understood to include a central processing unit, an arithmetic logic unit, an application-specific integrated circuit (IC), and/or a task engine, with such examples provided for illustration and not limitation.
(326) Furthermore, references to memory, unless otherwise specified, can include one or more processor-readable and accessible memory elements and/or components that can be internal to the processor-controlled device, external to the processor-controlled device, and/or can be accessed via a wired or wireless network using a variety of communication protocols, and unless otherwise specified, can be arranged to include a combination of external and internal memory devices, where such memory can be contiguous and/or partitioned based on the application. For example, the memory can be a flash drive, a computer disc, CD/DVD, distributed memory, etc. References to structures include links, queues, graphs, trees, and such structures are provided for illustration and not limitation. References herein to instructions or executable instructions, in accordance with the above, can be understood to include programmable hardware.
(327) Although the methods and systems have been described relative to specific embodiments thereof, they are not so limited. As such, many modifications and variations may become apparent in light of the above teachings. Many additional changes in the details, materials, and arrangement of parts, herein described and illustrated, can be made by those skilled in the art. Accordingly, it will be understood that the methods, devices, and systems provided herein are not to be limited to the embodiments disclosed herein, can include practices otherwise than specifically described, and are to be interpreted as broadly as allowed under the law.