THE Walsh Hadamard transform (WHT) and discrete



Similar documents
SECRET sharing schemes were introduced by Blakley [5]

A Direct Numerical Method for Observability Analysis

Computation of Forward and Inverse MDCT Using Clenshaw s Recurrence Formula

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

General Framework for an Iterative Solution of Ax b. Jacobi s Method

350 Serra Mall, Stanford, CA

AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC

MOST error-correcting codes are designed for the equal

On an algorithm for classification of binary self-dual codes with minimum distance four

5. Orthogonal matrices

A note on companion matrices

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Publications. Camilla Hollanti Department of Mathematics Aalto University, Finland December 1, 2011

Matrix Factorizations for Reversible Integer Mapping

Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE


A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES

Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices

Implementation of Full -Parallelism AES Encryption and Decryption

A Novel Cryptographic Key Generation Method Using Image Features

6. Cholesky factorization

A comprehensive survey on various ETC techniques for secure Data transmission

Degree Reduction of Interval SB Curves

9700 South Cass Avenue, Lemont, IL URL: fulin

Multiuser Communications in Wireless Networks

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

Big Text Data Clustering using Class Labels and Semantic Feature Based on Hadoop of Cloud Computing

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

Linear Authentication Codes: Bounds and Constructions

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Optimum Frequency-Domain Partial Response Encoding in OFDM System

Multi-factor Authentication in Banking Sector

Continued Fractions and the Euclidean Algorithm

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree of PhD of Engineering in Informatics

Fast Device Discovery for Remote Device Management in Lighting Control Networks

1 A duality between descents and connectivity.

! #! % & % ( )! & +,,.! / 0 1 /) ) % /,,, %778,,9 / 6, : 0 9, 99, 3 +,, 9 9

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Measurement of Multi-Port S-Parameters using Four-Port Network Analyzer

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m

Mobile Network Security Technology Research Center Kyungpook National University

Adaptive Equalization of binary encoded signals Using LMS Algorithm

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Factorization Theorems

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Operation Count; Numerical Linear Algebra

Two classes of ternary codes and their weight distributions

7. LU factorization. factor-solve method. LU factorization. solving Ax = b with A nonsingular. the inverse of a nonsingular matrix

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Fast Fourier Transform: Theory and Algorithms

On the representability of the bi-uniform matroid

Huilan Chang 張 惠 蘭. Associate Professor, Applied Mathematics, National University of Kaohsiung

Zukang Shen Home Address: Work: Kindred Lane Cell:

LU Factorization Method to Solve Linear Programming Problem

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels

Implementation and Design of AES S-Box on FPGA

TEO, Chung Piaw ( 张 俊 标 ) Department of Decision Sciences, NUS Business School bizteocp@nus.edu.sg

Loudspeaker Equalization with Post-Processing

A Network Flow Approach in Cloud Computing

α = u v. In other words, Orthogonal Projection

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm

When is missing data recoverable?

ON THE DEGREES OF FREEDOM OF SIGNALS ON GRAPHS. Mikhail Tsitsvero and Sergio Barbarossa

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

Linear Algebra Review. Vectors

Analysis of SFCL s in DC System with Renewable Energy Sources

Analysis on the Balanced Class-E Power Amplifier for the Load Mismatch Condition

A Wavelet Based Prediction Method for Time Series

Educational Requirement Analysis for Information Security Professionals in Korea

DCT-JPEG Image Coding Based on GPU

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Image Compression through DCT and Huffman Coding Technique

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Wavelet analysis. Wavelet requirements. Example signals. Stationary signal 2 Hz + 10 Hz + 20Hz. Zero mean, oscillatory (wave) Fast decay (let)

A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

A New Generic Digital Signature Algorithm

Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

FFT Algorithms. Chapter 6. Contents 6.1

Sparse Matrix Decomposition with Optimal Load Balancing

Transcription:

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 2741 Fast Block Center Weighted Hadamard Transform Moon Ho Lee, Senior Member, IEEE, Xiao-Dong Zhang Abstract Motivated by the Hadamard transforms center weighted Hadamard transforms, a new class of block center weighted Hadamard transforms (BCWHT) are proposed, which weights the region of midspatial frequencies of the signal more than the Hadamard transform. Based on the Kronecker product, direct sum operations, the identity matrix recursive relations, the proposed one 2-D fast BCWHTs algorithms through sparse matrix factorization are simply obtained. Index Terms Block center weighted Hadamard transform (BCWHT), center weighted Hadamard transform (CWHT), fast algorithm, sparse matrix decomposition. I. INTRODUCTION THE Walsh Hadamard transform (WHT) discrete Fourier transform (DFT) are highly practical value for representing signals, images mobile communications for orthogonal code designs ([1] [4] [5]). With the technology rapid development, communication systems will require more more transmission storage capacities of multilevel cases in cochannels for numerous clients. Recently, variations of WHT DFT called center weighted Hadamard transform (CWHT) ([6], [7]) complex reverse Jacket transform (CRJT) ([8] [10] [11]) have been proposed their applications to image processing communications have been reported. When the center part of data sequences or the middle range of frequency components are more important, the CWHT can offer better quality than the WHT ([2], [3] [4]). In this paper, motivated by the Hadamard transforms CWHTs ([6] [7]), we propose a new block center weighted Hadamard transform (BCWHT) in Section II, which may be applied to multilevel cases in communication. In Section III, based on the Kronecker product direct sum operations, a fast 1-D BCWHT algorithm is proposed. In Section IV, a fast 2-D BCWHT algorithm is presented through sparse matrix factorization the Kronecker product. Finally, in Section V, we make our conclusion. transform a temporal spatial vector by into a transformed vector Let be the 2 2 identity the lowest order Hadamard matrices, respectively,.i.e, Denote by. The lowest order BCWHT matrix of order 8 is defined to be with each block being 2 Since 2 submatrices. Since (1) (2) (3) (4) (5) II. BCWHT For the 1-D BCWHT matrix of order with, which is partitioned to the block matrix, we can Manuscript received August 29, 2006; revised April 18, 2007. This work was supported by the Ministry of information Communication (MIC), Korea, under the IT Foreign Specialist Inviting Program (ITFSIP) supervised by the Institute of Information Technology Assessment (IITA) of the Ministry of Science Technology, Korea. This paper was recommended by Associate Editor S.-M. Phoong. M. H. Lee is with the Institute of Information Communication, Chonbuk National University, Jeonju 561-756, Korea (e-mail: moonho@chonbuk.ac.kr). X.-D. Zhang is with the Department of Mathematics, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: xiaodong@sjtu.edu.cn). Digital Object Identifier 10.1109/TCSI.2007.905655 the inverse of (3) is (6) (7) 1549-8328/$25.00 2007 IEEE

2742 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 Certainly, where denotes the direct sum operator(see [12]). Then we transform the BCWHT of order 8 as (8) This choice of block weighting was indicated, to a large extent, by requirement of digital hardware simplicity. With the aid of Kronecker product Hadamard matrices, the higher order BCWHT matrix is given by the following recursive relation: where is the Kronecker product is the lowest order Hadamard matrix. We are able to show that (9) (10) We can use the induction method to prove this assertion. From (7), (10) holds for. Assume that (10) holds for, i.e., (11) (15) The general permutation matrices are defined to be (16) (17) It is easily checked that both permutation matrices are unitary which satisfy Now we show that (10) holds for. (18) (19) Using the two permutation matrices the definition of BCWHT, the order of BCWHT matrix can be transformed to the following Hence, (10) holds. Therefore, BCWHT is a class of transforms which are simple to calculate easily inverted. Further, the inverse BCWHT can be written as follows: III. FAST 1-D BCWHT ALGORITHM (12) In order to develop the fast 1-D BCWHT algorithm, we first introduce three block permutation matrices, as follows: (20) Hence can be written as (21) shown at the bottom of the next page. Let be the permutation matrix of order 4 as follows: (22) (13) Then (14) (23)

LEE AND ZHANG: FAST BCWHT 2743 TABLE I COMPUTATIONAL COMPLEXITY OF THE PROPOSED FAST ALGORITHMS FOR 1-D BCWHT TRANSFORM OF ORDER N =2 From (21) (23), we have Based on the matrix identity in [12] (24) Therefore, the proposed fast 1-D BCWHT algorithm is written as From (21) (23), we have where (25) The permutation matrices do not require computation, since they just perform data permutation. The operation requires additions, since it can be performed by butterflies. Since the permutation matrices do not require computation, the operations of is the same as these of. It is known that the Hadamard transform of order requires additions. Thus, the operation requires additions. On the other h, the operation first performs, which is equivalent to direct connections multiplications, then executes an operation which needs additions. Because the direct sum can be independently divided into two parts, the operation requires additions multiplications. Hence, the proposed algorithm depicted in (25) requires, in total, real additions real multiplications for, while the direct computation for the BCWHT transform requires additions multiplications. The results are summed up as the following Table I. Moreover, Fig. 1 presents an example for a fast BCWHT flow graph with. The first, second last steps st for data permutation, while the third fourth steps st for additions multiplications. IV. 2-D FAST ALGORITHM TRANSFORM The 2-D transforms a temporal/spatial matrix into a transformed matrix as (see [12]) (26) (21)

2744 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 Fig. 1. Fast BCWHT flow graph for 82 8. Generally, the linear transform of matrix shown as can be expressed by the transformation of the column-wise stacking vector of as (see [12]) Clearly, is a sparse matrix whose each row each column block is only at most two nonzero blocks. Moreover, by a calculation, we have Thus, the 2-D BCWHT matrix in (26) can be expressed by Clearly, using the properties of Hadamard matrix the Kronecker product, (28) can be rewritten (27) In order to develop the fast 2-D BCWHT algorithm, we start to define a coefficient block matrix by (28) Hence, can be partitioned to an block matrix whose blocks are 2 2 submatrices. It can be shown that is a sparse block matrix with at most two nonzero blocks for each row each column block. In order to prove this assertion, we first start to compute the lowest 4 4 block matrix (30) Since is block symmetric has at most two nonzero blocks in each row each column blocks, is a sparse block matrix with at most two nonzero blocks for each row each column block by using the recursion relation of (30). Further from, (28), the BCWHT transform can be written (31) Based on (27), (28) (31), the 2-D BCWHT transform in (27) can be written as (29)

LEE AND ZHANG: FAST BCWHT 2745 TABLE II COMPUTATIONAL COMPLEXITY OF THE PROPOSED FAST ALGORITHMS FOR 2-D BCWHT TRANSFORM OF ORDER N =2 (32) From (32), The fast algorithm for the 2-D BCWHT transform requires four iterations. It is known that the Hadamard transform of order requires additions. Thus, require additions. Since is a sparse block matrix with at most two nonzero blocks for each row each column block, it is easy to see that requires additions multiplications. Then needs additions multiplications. Therefore, the 2-D fast algorithm for BCWHT transform requires additions multiplications, while the direct computation needs additions multiplications. Table II shows that our proposed algorithm in (32) requires fewer operations. V. CONCLUSION A new nonorthogonal transform, the BCWHT was introduced in this paper. Based on the Kronecker product, direct sum operators sparse matrix factorization, one 2-D fast algorithms for the BCWHT are proposed their inverses are derived. With low complexity highly regular modularity, the proposed one 2-D fast algorithms advance the applicability of the BCWHT for image, signal processing orthogonal code design for mobile communications ([2] [4] [5]). ACKNOWLEDGMENT The authors would like to thank the anonymous referees for valuable comments, corrections suggestions, which results in an improvement of the original manuscript. REFERENCES [1] N. Ahmed K. R. Rao, Orthogonal Transforms for Digital Signal Processing. New York: Springer-Verlag, 1975. [2] D. C. Park, M. H. Lee, E. A. Choi, Revisited DFT matrix via the reverse Jacket transform its applications to communication, in Proc. 22nd Symp. Inf. Theory Appl. (SITA 99), Yuzawa, Niigata, Japan, Nov.-Dec. 30 3, 1999, pp. 427 430. [3] J. Hou M. H. Lee, Enhancing data throughput lower correlations quasi-orthogonal functions for 3G CDMA systems., Int. J. Commun. Syst, to be published. [4] J. Hou M. H. Lee, QPSK differential space time coding on different unitary matrices sets initialization, Int. J. Commun. Syst,to be published. [5] J. Hou M. H. Lee, Construction of the dual OVSF codes with lower correlations, IEICE Trans., to be published. [6] M. H. Lee, The center weighted Hadamard transform, IEEE Trans. Circuits Syst., vol. 36, no. 9, pp. 1247 1249, Sep. 1989. [7] C. P. Fan J. F. Yang, Fast center weighted Hadamard transform algorithms, IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 45, no. 3, pp. 429 432, Mar. 1998. [8] M. H. Lee, A new reverse Jacket tranform its fast algorithm, IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 47, no. 1, pp. 39 47, Jan. 2000. [9] K. Finlayson, M. H. Lee, J. Seberry, M. Yamada, Jacket matrices constructed from Hadamard matrix generalized Hadamard matrices, Australas. J. Combinatorics, vol. 35, no. 1, pp. 83 88, Jun. 2006. [10] K. J. Horadam, A generalised Hadamard transform, in Proc. 2005 IEEE Int. Symp. Inf. Theory (ISIT), Australia, Sep. 4 9, 2005. [11] M. H. Lee J. Hou, Fast block inverse Jacket transform, IEEE Signal Process. Lett., vol. 13, pp. 461 464, Aug. 2006. [12] R. A. Horn C. R. Johnson, Topics in Matrix Analysis. New York: Cambridge Univ. Press, 1991. Moon Ho Lee (S 81 M 85 SM 86) received the Ph.D. degree in electronic engineering from Chonnam National University, Kwangju, Korea in 1984, the University of Tokyo, Tokyo, Japan, in 1990, respectively. From 1970 to 1980, he was a Chief Engineer with Namyang Moonhwa Broadcasting Corp., Jeju, Korea. Since 1980, he was been a Professor in the Department of information Communication at Chonbuk National University, Jeonju, Korea. From 1985 to 1986, he was also with the University of Minnesota as a Post-Doctoral Researcher. He has held visiting positions with the University of Hannover (1990), University of Aachen (1992,1996), University of Munich (1998), University of Kaislerlautern (2001), RMIT (2004), the University of Wollongong, Australia. His research interests include multidimensional source channel coding, mobile communication, heterogeneous network. He has authored 33 books including Digital Communication (Youngil, 1999), 95 SCI international journal papers, 20 patents. Dr. Lee is a Registered Telecommunication Professional Engineer a member of the National Academy of Engineering in Korea. He was recipient of the paper prize award from the Korea Institute of Communication Science in 1986 1997, the Korea Institute of Electronics Engineers in 1987, Chonbuk Province in 1992, Chonbuk National University in 2002, commendation of the Prime Minister (2002) Science Technology Doyak Gold Medal from Korea Government (2007) for the invention of the Jacket matrix, which is widely helpful in communication signal processing, mobile networking, cryptography. He was the Guest Editor of the IEEE Communications MagazineSpecial Issue on the Quality of Service Based Routing Algorithms for Heterogeneous Networks. Xiao-Dong Zhang was born in Jiangsu, China. He received the Master s degree in pure mathematics from Anhui University, Hefei, China in 1992 the Ph.D. degree in applied mathematics from University of Science Technology of China, Hefei, China, in 1998. He is a Professor in the Department of Mathematics at Shanghai JiaoTong University (SJTU), Shanghai, China. Before he joined SJTU in 2002, he took various academic positions at Universitdad de Chile, Kyungpook National University, the Technion-Israel Institute of Technology (Lady Davis Postdoctoral fellowship) Anhui University. His research interests include combinatorics, graph theory, complex network, matrix theory their applications in computer science, digital communication, signal processing. He has authored or coauthored over 50 refereed papers.