Next Article in Journal
Analysis of Damage Characteristics for Skarn Subjected to Freeze-Thaw Cycles Based on Fractal Theory
Next Article in Special Issue
Numerical Method for Multi-Dimensional Coupled Forward-Backward Stochastic Differential Equations Based on Fractional Fourier Fast Transform
Previous Article in Journal
Exploring Dynamics and Hopf Bifurcation of a Fractional-Order Bertrand Duopoly Game Model Incorporating Both Nonidentical Time Delays
Previous Article in Special Issue
Unlimited Sampling Theorem Based on Fractional Fourier Transform
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fast Linear Canonical Transform for Nonequispaced Data

School of Mathematics, Jiangsu University, Zhenjiang 212013, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2023, 7(5), 353; https://doi.org/10.3390/fractalfract7050353
Submission received: 18 February 2023 / Revised: 14 April 2023 / Accepted: 18 April 2023 / Published: 26 April 2023
(This article belongs to the Special Issue Recent Advances in Fractional Fourier Transforms and Applications)

Abstract

:
The investigations of the discrete and fast linear canonical transform (LCT) are becoming one of the hottest research topics in modern signal processing and optics. Among them, the fast calculation of LCT for non-uniform data is one of key problems. Focus on this problem, a new fast algorithm of the LCT has been proposed in this paper firstly by interpolation and approximation theory. The proposed algorithms can calculate quickly the LCT of the data, whether the input or output data is uniform. Secondly, the complexity and precision of derived algorithms have been analyzed for different situations. Finally, the experimental results are presented to verify the correctness of the obtained results.

1. Introduction

Linear canonical transform which is generated by second-order differential operators, is a four-parameter class of linear integral transform [1,2],
F A ( u ) = x ( t ) K A ( t , u ) d t , b 0 ( d ) e i c d u 2 2 x ( d u ) , b = 0
where
K A ( t , u ) = 1 i 2 π b e i a 2 b t 2 i t u b + i d 2 b u 2
A = [ a , b ; c , d ] ,   a d b c = 1 ,   F A ( u ) is LCT of the function x ( t ) . The LCT integral kernels are Green functions of quadratic Hamiltonians that can be found in [3]. The research on LCT was first proposed by Collins (1970) and Moshinsky (1971) [1,2]. It includes many special cases, such as, the Fourier transform (FT), the fractional Fourier transform (FRFT), the Fresnel transform, the Lorentz transform and scaling transform. The class of LCTs are important in signal processing [4,5], computational and applied mathematics [6,7], optics [8] and quantum mechanics [9]. Significant applications of LCT in signal processing include radar system analysis, filter design, pattern recognition, image watermarking and so on [10,11]. Basic theories of LCT have been developed that include convolution theorems, sampling theorems, and uncertainty principles [12,13,14]. The numerical approximation of the LCT is of importance in modeling first-order optical systems and many signal processing applications. Therefore, the discrete and fast algorithms of the LCT are one of the most important issues in practical applications.
After the continuous LCT has been introduced, therefore, the definition and fast implementation of the discrete linear canonical transform (DLCT) have been widely considered by many researchers [15,16,17,18,19,20,21,22,23,24,25,26,27,28]. The existing algorithms can be divided into the following categories. The one is the operator decomposition type, which decomposes an arbitrary LCT operator into its special cases that have a fast algorithm [17,18,29]. The second is the eigenvector decomposition type, which computes the LCT of a function by using the eigenfunctions of the LCT [24,27]. The third is split basis algorithm, which decomposes the discrete transform matrix of LCT into smaller matrices iteratively [20,23]. All these algorithms can effectively and rapidly calculate the entire spectrum in the LCT domain. In recent years, the new LCT algorithms have been proposed, which can realize local spectrum analysis of signals [30,31,32]. In addition to the above-mentioned algorithms, various other fast algorithms have been proposed in [33,34,35,36,37,38,39]. These research results provide a good basis for the further development of the DLCT toward meeting the requirements of practical applications. Many aspects of the fast methods of the DLCT still need to be studied. To the best of our knowledge, the existing discrete algorithms are required that both input and output data are uniform sampling. However, for certain applications, the input or output data is nonuniform. In these cases, the fast DLCT will be lost.
For overcome the aforementioned problems, in this paper, we present a set of fast algorithms for computing nonuniform DLCT, namely,
f ( t n ) = 1 i 2 π b m = 0 N 1 α m e i a 2 b t n 2 + i u m t n b i d 2 b u m 2
where n = 0 , 1 , N , f ( t n ) C , α m C , t n [ b π , b π ] , and u m [ N / 2 , N / 2 1 ] . According to the sampling of the t n and u m , we will operate under the following assumptions
  • Uniform samples and non integer frequencies: In Equation (1) the samples are equispaced, i.e., t j = j 2 π | b | / N , and the frequencies u 0 , , u N 1 are non integer. This corresponds to evaluating a generalized linear canonical series at equispaced points.
  • Nonuniform samples and integer frequencies: In Equation (1), t 0 , , t N 1 are nonequispaced points in [ b π , b π ] and the frequencies u 0 , , u N 1 are integers.
  • Nonuniform samples and non-integer frequencies: In Equation (1), t 0 , , t N 1 are nonequispaced points in [ b π , b π ] and the frequencies u 0 , , u N 1  are non-integers. This is the fully nonuniform transform and corresponds to evaluating a generalize linear canonical series at nonequispaced points.
To develop various nonuniform fast LCT(NFLCT) for above issues, one has to exploit a nonzero working precision of 0 < ϵ < 1 and makes careful approximations. The approximation properties of the various approaches may be obtained by considering how they perform on the linear canonical modes.
The rest of the paper is organized as follows: In Section 2, a brief review of the related preliminaries is presented which are used in the design of the algorithms. The Section 3 is main results of this paper. In this section, we give an exact statement of the problem and introduce some notation that is used. The algorithms are derived. Some numerical examples are presented in Section 4 to illustrate the preference of the schemes. Finally, conclusions are drawn in Section 5.

2. Preliminary

The linear canonical series (LCS) is a generalized form of Fourier series (FS), which can reveal the mixed time and frequency components of signals. The basis function of LCS is defined as [40]
φ A , n ( t ) = i T e i a 2 b t 2 i d 2 b ( n 2 π b / T ) 2 + i t b ( n 2 π b / T )
where n = , , 1 , 0 , 1 , , + . Thus, , φ A , 1 ( t ) , φ A , 0 ( t ) , φ A , 1 ( t ) , construct an orthonormal basis. It can be observed that every basis function is a chirp function with chirp rate a / b , which is an aperiodic function. Therefore, the LCS is only applicable to finite-length function. The LCS expansion of the finite-length function x ( t ) can be written as
x ( t ) = n = C A , n φ A , n ( t ) = n = C A , n i T e i a 2 b t 2 i d 2 b ( n 2 π b / T ) 2 + i t b ( n 2 π b / T )
C A , n = i T T / 2 T / 2 x ( t ) e i a 2 b t 2 + i d 2 b ( n 2 π b / T ) 2 i t b ( n 2 π b / T ) d t
where t [ T / 2 , T / 2 ] and C A , n are called LCS expansion coefficients with the parameter matrix A.The LCS expansion coefficients are computed by the inner product of the function and chirp basis function. The relationship between LCS and LCT is that the LCS expansion coefficients are the sampled values of LCT, by
C A , n = 2 π b T F A [ x ( t ) ] ( n 2 π b T )
The well-known FS is just a special case of LCS for the parameter matrix A = [ 0 , 1 ; 1 , 0 ] . In addition, we also presented some well results to be used in the remainder of the paper [41].
Lemma 1.
For any real α > 0 and complex z,
e α t 2 e z t d t = π α e z 2 / 4 α
Lemma 2.
For any real α > 0 and r > 0 ,
r e α t 2 d t < e α r 2 2 α r
In the next section, the main results will be derived based on above facts.

3. Main Results

3.1. Exact Statement of the Problem and Information Description of the Algorithm

3.1.1. Exact Statement of the Problem

In the reminder of this paper, we will operate under the following assumptions:
1.
u = u 0 , u 1 , , u N 1 and t = t 0 , t 1 , , t N 1 are finite sequences of real numbers.
2.
u m [ N / 2 , N / 2 1 ] for m = 0 , 1 , , N 1 .
3.
t j [ b π , b π ] for j = 0 , 1 , , N 1 .
4.
α = α 0 , , α N 1 , f = f N / 2 , , f N / 2 1 , β = β N / 2 , , β N / 2 1 ,
g = g 0 , g 1 , , g N 1 , γ = γ 0 , , γ N 1 and h 0 , h 1 , , h N 1 are finite sequences of complex numbers.
We will consider the problems of applying and inverting the LCT and its transpose. We are interested in the transformations F , G : C N C N and their inverse defined by  formulate
f j = F ( α ) j = k = 0 N 1 α k e i a 2 b ( 2 b π j N ) 2 + i u k b 2 π j N i d 2 b u k 2
for j = N / 2 , , N / 2 1 , and
g j = G ( g ) j = k = N / 2 N / 2 1 β k e i a 2 b t j 2 + i k t j b i d 2 b k 2
For j = 0 , 1 , , N 1 , we will also consider the more general transformation H : C N C N defined by the formula
h j = H ( γ ) j = k = 0 N 1 γ k e i a 2 b t j 2 + i u k t j b i d 2 b u k 2
More formally, we consider that give α , β , γ to find F A ( α ) , G A ( β ) , H A ( γ ) respectively.

3.1.2. Information Description of the Algorithm

In this section, we give information outlines of algorithms for above problems. The algorithms are based on the following principal steps. Any function e i a / ( 2 b ) t 2 + i β t / b i d / ( 2 b ) β 2 can be accurately represented on any finite interval on the real line using a small number of terms of the e α t 2 e i a / ( 2 b ) t 2 + i k t / b i d / ( 2 b ) k 2 and this number of terms of q is independent of the value β . For the efficient calculation Equations (8)–(10), the following two ways will be used,
  • to approximate each e i a t 2 / 2 b + i u m t / b i d u m 2 / 2 b in term of a q-term LCS;
  • to approximate the value of a LCS at each t n in terms of values at the nearest q uniformly-spaced nodes.
The interpolation between equispaced and nonequispaced sets of points can thus be performed in O ( N q ) operations.

3.2. Derivation of Algorithms

3.2.1. Relevant Facts from Approximation Theory

The principal tool of this paper is a detailed analysis of the LCS of functions ϕ : [ b π , b π ] C given by the formula
ϕ ( t ) = e α t 2 e i a 2 b t 2 + i β t b i d 2 b β 2
where α > 1 / 2 and β are real numbers. The lemmas and theorems are presented in the  following.
Theorem 1.
The functions ϕ ( t ) = e α t 2 e i a 2 b t 2 + i β t b i d 2 b β 2 , t ( b π , b π ) can be approximated by LCS, the error of the approximation can be obtained by the following inequality
ϕ ( t ) k = ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < e α b 2 π 2 ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1
where k = , ,
ρ A , k = i 2 b π e i d 2 b ( k 2 β 2 ) π α e ( β k ) 2 4 b 2 α
a , b , c , d are linear canonical parameters, α > 1 / 2 and β are any real, q 4 α b 2 π is even integer.
Proof. 
The kth LCS coefficient for ϕ ( t ) is denoted by σ A , k ,
ϕ ( t ) = i 2 b π k = σ A , k e i a 2 b t 2 + i k t b i d 2 b k 2
where t ( b π , b π ) ,
σ A , k = i 2 b π b π b π e i a 2 b t 2 i k t b + i d 2 b k 2 ϕ ( t ) d t
For any real α > 0 and complex z, we have the following equality
e α t 2 e z t d t = π α e z 2 / 4 α
thus
σ A , k = i 2 b π b π b π e α t 2 e i a 2 b t 2 + i β t b i d 2 b β 2 e i a 2 b t 2 i k t b + i d 2 b k 2 d t = i 2 b π e i d 2 b ( k 2 β 2 ) e α t 2 e i ( β k ) t b d t b π e α t 2 e i ( β k ) t b d t b π e α t 2 e i ( β k ) t b d t = i 2 b π e i d 2 b ( k 2 β 2 ) π α e ( β k ) 2 4 b 2 α + i 2 b π e i d 2 b ( k 2 β 2 ) b π e α t 2 e i ( β k ) t b d t b π e α t 2 e i ( β k ) t b d t = ρ A , k i 2 b π e i d 2 b ( k 2 β 2 ) 2 b π e α t 2 cos [ ( β k ) t / b ] d t
Rearranging Equation (17), we obtain
σ A , k ρ A , k = i 2 b π e i d 2 b ( k 2 β 2 ) 2 b π e α t 2 cos [ ( β k ) t / b ] d t
Owing to
2 b π + e α t 2 cos [ ( β k ) t / b ] d t + e α b 2 π 2 b π b π e i ( β k ) t b d t 2 b π + e α t 2 d t + 2 b π e α b 2 π 2 < 2 b π e α b 2 π 2 ( 1 2 α b 2 π 2 + 1 ) < 2 b π e α b 2 π 2 ( 1 b 2 π 2 + 1 )
and integrating by parts, we have
2 b π + e α t 2 cos [ ( β k ) t / b ] d t = 2 b β k e α b 2 π 2 sin [ ( β k ) π ] + 4 α b β k b π + t e α t 2 sin [ ( β k ) t / b ] d t
After rearranging the terms in Equation (20) and integrating by parts again, we obtain
2 b π + e α t 2 cos [ ( β k ) t / b ] d t + 2 b e α b 2 π 2 β k sin [ ( β k ) π ] = 4 b α β k b π + t e α t 2 sin [ ( β k ) t / b ] d t 4 b 2 α ( β k ) 2 b π e α b 2 π 2 + b π + e α t 2 d t + b π + t · 2 α t e α t 2 d t < 4 b 2 α ( β k ) 2 2 b π e α b 2 π 2 + 2 b π + e α t 2 d t < 4 b 2 α e α π 2 b 2 ( β k ) 2 ( 2 b π + 2 2 α b π ) = 8 b 3 π α e α b 2 π 2 ( β k ) 2 ( 1 + 1 b 2 π 2 )
Therefore, we can obtain the following inequalities
2 b π + e α t 2 cos [ ( β k ) t ] d t + e α π 2 b 2 b π b π e i ( β k ) t / b d t < 8 b 3 π α e α b 2 π 2 ( β k ) 2 ( 1 + 1 b 2 π 2 )
Due to Equations (19) and (22), we have the inequalities
σ A , k ρ A , k i 2 b π e i d 2 b ( k 2 β 2 ) · e α π 2 b 2 b π b π e i ( β k ) t / b d t < i 2 b π e i d 2 b ( k 2 β 2 ) · 2 b π e α b 2 π 2 ( 1 b 2 π 2 + 1 ) = 2 b π e α b 2 π 2 ( 1 + 1 b 2 π 2 )
σ A , k ρ A , k i 2 b π e i d 2 b ( k 2 β 2 ) · e α π 2 b 2 b π b π e i ( β k ) t / b d t < 4 b 2 α 2 b π e α b 2 π 2 ( β k ) 2 ( 1 + 1 b 2 π 2 )
for any t ( b π , b π ) , combination of Equations (14), (23), and (24), we have
ϕ ( t ) k = + ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 e α b 2 π 2 e i a 2 b t 2 + i β t b i d 2 b β 2 = k = + ( σ A , k ρ A , k ) i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 e α b 2 π 2 e i a 2 b t 2 + i β t b i d 2 b β 2 < k , β k b π i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 4 b 2 α 2 b π e α b 2 π 2 ( β k ) 2 ( 1 + 1 b 2 π 2 ) + k , β k < b π i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 2 b π e α b 2 π 2 ( 1 + 1 b 2 π 2 ) < k , β k b π 4 b 2 α e α b 2 π 2 ( k β ) 2 ( 1 + 1 b 2 π 2 ) + 2 b π e α b 2 π 2 ( 1 + 1 b 2 π 2 ) < 4 α b 2 e α b 2 π 2 ( 1 + 1 b 2 π 2 ) × 2 k = b π 1 k 2 + 2 ( b π + 1 ) e α b 2 π 2 ( 1 + 1 b 2 π 2 )
Due to
k = b π 1 k 2 < 1 b π 2 + b π 1 t 2 d t = 1 b π 2 + 1 b π < 1 + 4 b 9 b 2
and substituting Equation (26) into Equation (25), we obtain
ϕ ( t ) k = ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d b k 2 e α b 2 π 2 e i a 2 b t 2 + i β t b i d 2 b β 2 < e α b 2 π 2 ( 1 + 1 π 2 b 2 ) [ 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ]
Then, we make use of the triangle inequality and Equation (27) to obtain
ϕ ( t ) k = ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < e α b 2 π 2 ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1
Thus, the proof of the Theorem  1 is complemented.    □
According to Theorem 1, functions e α t 2 e i a 2 b t 2 + i β t b i d 2 b β 2 can be approximated by linear canonical series whose coefficients are given analytically, and the error of the approximation decreases exponentially as α increases.
The coefficients ρ A , k in Equation (13) have a peak at k = [ β ] ( [ ] is the nearest integer to ⋆), and decay exponentially as k ± . We keep only the q + 1 largest coefficients, where the integer q is chosen such as
q 4 α b 2 π
thus
e ( q / 2 ) 2 / 4 b 2 e α b 2 π 2
The following theorem provides a method for approximating functions ϕ ( t ) defined in Equation (11) by a q + 1 term series, and estimates the truncation error under the conditions Equation (29).
Theorem 2.
The functions ϕ ( t ) = e α t 2 e i a 2 b t 2 + i β t b i d 2 b β 2 t ( b π , b π ) can be approximated by q + 1 term linear canpnical series, and the truncation error can be obtained by the following inequality
ϕ ( t ) k = [ β ] q / 2 [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < e α b 2 π 2 ( 1 + 1 b 2 π 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b 2 π ( 1 + 1 π )
where ρ A , k is defined by Equation (13), a , b , c , d are linear canonical parameters, α > 1 / 2 and β are any real, and q is an even integer such that q 4 α b 2 π .
Proof. 
For any t ( b π , b π ) ,
ϕ ( t ) k = [ β ] q / 2 [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < ϕ ( t ) k = ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 + k > [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 + k < [ β ] q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2
Based on Equation (13) and the triangle inequality, we have
k > [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < 1 2 b π k = [ β ] + q / 2 + 1 1 2 b π e i d 2 b ( k 2 β 2 ) π α e ( β k ) 2 4 b 2 α e i a 2 b t 2 + i k t b i d 2 b k 2 = 1 2 b α π k = [ β ] + q / 2 + 1 e ( β k ) 2 4 b 2 α < 1 2 b α π k = q / 2 e k 2 4 b 2 α
k < [ β ] q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < 1 2 b π k = [ β ] q / 2 1 1 2 b π e i d 2 b ( k 2 β 2 ) π α e ( β k ) 2 4 b 2 α e i a 2 b t 2 + i k t b i d 2 b k 2 = 1 2 b α π k = [ β ] q / 2 1 e ( β k ) 2 4 b 2 α < 1 2 b α π k = q / 2 e k 2 4 b 2 α
Because of real α > 0 and r > 0 , we obtain
r e α t 2 d t < e α r 2 2 α r
Thus,
k = q / 2 e k 2 / 4 b 2 α < e ( q / 2 ) 2 / 4 b 2 α + q / 2 e t 2 / 4 b 2 α d t < e α b 2 π 2 ( 1 + 1 π )
Substituting Equation (36) into Equations (33) and (34), we have
k > [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d k 2 2 b + k < [ β ] q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d k 2 2 b < 1 b α π e α b 2 π 2 ( 1 + 1 π )
Substituting Equations (28), (37) into Equation (32), we obtain
ϕ ( t ) k = [ β ] q / 2 [ β ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k t b i d 2 b k 2 < e α b 2 π 2 ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b α π ( 1 + 1 π ) < e α b 2 π 2 ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b 2 π ( 1 + 1 π )
   □
The following corollary describes that the function e i a 2 b t 2 + i β t b i d 2 b β 2 can be approximated by using a series of q + 1 terms.
Corollary 1.
Supposed that the conditions of Theorem 2 are satisfied. Then, multiplying both sides of Equation (31) by e α t 2 , we obtain
e i a 2 b t 2 + i β t b i d 2 b β 2 e α t 2 k = [ β ] q / 2 [ β ] + q / 2 i 2 b π ρ A , k e i a 2 b t 2 + i k t b i d 2 b k 2 < e α b 2 π 2 ( 1 1 / m 2 ) ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b 2 π ( 1 + 1 π )
where t [ b π / m , b π / m ] , m 2 is an integer.
Finally, Theorem 3 makes use of a simple linear scaling to generalize the inequality Equation (39) from [ b π / m , b π / m ] to [ s , s ] ,
Theorem 3.
Let α > 1 / 2 , β, s > 0 be real numbers and let m 2 , q 4 α π be integers. Then, for any t [ s , s ]
e i a 2 b t 2 + i β t b i d 2 b β 2 e α ( b π t m s ) 2 k = [ m s β / b π ] q / 2 [ m s β / b π ] + q / 2 ρ A , k i 2 b π e i a 2 b t 2 + i k π m s t i d k 2 2 b ( b π m s ) 2 < e α b 2 π 2 ( 1 1 / m 2 ) ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b 2 π ( 1 + 1 π )
where
ρ A , k = i 2 b α e i d 2 b ( b π m s ) 2 ( k 2 ( m s β / b π ) 2 ) e ( m s β / b π k ) 2 4 b 2 α
Corollary 2.
If a = d = 0 ,   b = 1 ,   c = 1 in Theorem 3, and the conditions of Theorem 3 are satisfied. Then, for any t [ s , s ]
e i β t e α ( π t m s ) 2 k = [ m s β / π ] q / 2 [ m s β / π ] + q / 2 ρ k i 2 π e i k π m s t < e α π 2 ( 1 1 m 2 ) ( 1 + 1 π 2 ) ( 32 α 9 + 2 π + 2 ) + 1 + 1 2 π ( 1 + 1 π )
where ρ k is defined by
ρ k = i 2 α e ( β m s / π k ) 2 / 4 α

3.2.2. Implementation of Algorithms

In this subsection, the notations to be used for the detailed algorithm descriptions are introduced. For an integer m 2 and a real number α > 0 , we will define a real number ϵ > 0 by
ϵ = e α b 2 π 2 ( 1 1 / m 2 ) ( 1 + 1 π 2 b 2 ) ( 8 α ( 1 + 4 b ) 9 + 2 b π + 2 ) + 1 + 1 b 2 π ( 1 + 1 π )
and we will denote by q the smallest even natural number such that
q 4 π b 2 α
For an integer m and a set of real number u k , we will denote by μ k the neatest integer to m u k for k = 0 , 1 , , N 1 ,
ρ A , k , n = i 2 b α π e i d 2 b m 2 [ ( μ n + k ) 2 ( m u n ) 2 ] e [ m u n ( μ n + k ) ] 2 4 b 2 α
for n = 0 , 1 , , N 1 , and k = q / 2 , , q / 2 .
Corollary 3.
Setting s = b π in Theorem 3, we obtain that
e i a 2 b t 2 + i u n t b i d 2 b u n 2 e α ( t m ) 2 k = q / 2 q / 2 ρ A , k , n i 2 b π e i a 2 b t 2 + i ( k + μ n ) t m b i d ( μ n + k ) 2 2 b m 2 < ϵ
for any n = 0 , 1 , , N 1 , and any t [ b π , b π ] , where ϵ is defined by Equation (44).
For a given set of complex numbers α n , we will denote by τ l the unique set of complex coefficients such that
n = 0 N 1 α n e i a 2 b t 2 + i u n t b i d 2 b u n 2 = n = 0 N 1 α n e α ( t m ) 2 k = q / 2 q / 2 ρ A , k , n i 2 b π e i a 2 b t 2 + i ( k + μ n ) t m b i d ( μ n + k ) 2 2 b m 2 = e i a 2 b t 2 e α ( t m ) 2 i 2 b π l = m N / 2 m N / 2 1 τ l e i k l t / b m
so that
τ l = n , k , μ n + k = l α n e i d ( μ n + k ) 2 2 b m 2 ρ A , k , n
We denote by T j a set of complex numbers defined by the formula
T j = l = m N / 2 m N / 2 1 τ l e i 2 π l j m N
for j = m N / 2 , , m N / 2 1 . Furthermore, the f j ˜ is denoted by the formula
f j ˜ = e i a 2 b ( 2 b π j N ) 2 e α ( 2 b π j m N ) 2 i 2 b π T j
for j = N / 2 , , N / 2 .
Remark 1.
Combing Equations (47)–(51) with the triangle inequality, we see that
f j f j ˜ < 1 2 b π ϵ n = 0 N 1 α n
for j = N / 2 , , N / 2 , where f j is defined by Equation (8).
Thus, the implements of NFLCT for Equation (8) is Algorithm 1.
Algorithm 1 NFLCT for fast computation of Equation (8).
  • Input parameter A = [ a , b ; c , d ] , the u 0 , u 1 , , u N 1 , α 0 , , α N 1 .
  • Choose precision  ϵ α and q = 4 π b 2 α
  • for n = 0 : N 1
  • Compute μ n , the nearest integer to m u n
  •     for k = q / 2 : q / 2
  • Calculate ρ A , k , n and τ μ n + k according to
  • Equation (46) and Equation (49), respectively      end
  • end
  • Comment: Evaluate τ k Fourier Seres at uniform sampling in [ b m π , b m π ]
  • using inverse FFT of size m N
  • Calculate T j according Equation (50), for j = m N / 2 , , m N / 2 1
  • Comment: Scale the values at those points which lie in [ b π , b π ]
  • for j = N / 2 : N / 2 1
  • f j ˜ = T j e i a / ( 2 b ) ( 2 b π j / N ) 2 e α ( 2 b π j / m N ) 2 i 2 b π T j
  • end
  • Output: Approximate values f j ˜ , j = N / 2 , , N / 2 1 .
  • The total complexity is 2 N q + m N / 2 log N + 3 N
For an integer m and a set of real of numbers t j , we will denote by v j the nearest integer to t j m N / ( 2 π ) for j = 0 , 1 , , N 1 , and by Q j , k a set of real numbers defined by the formula
Q j , k = 1 2 π α e [ t j m N / 2 π ( v j + k ) ] 2 / 4 α
Corollary 4.
Setting s = N / 2 in Corollary 2, we obtain that
e i t j n e α ( 2 π n m N ) 2 k = q / 2 q / 2 Q j , k e i n ( k + v j ) 2 π / N m < ϵ
for j = 0 , 1 , , N 1 and n [ N / 2 , N / 2 ] , where ϵ is defined by
ϵ = e α π 2 ( 1 1 m 2 ) ( 5 α + 28 / 3 )
For a given set of complex numbers β n , the β n is a set of complex numbers defined by the formula
β n = β n e i d 2 b n 2 + α ( 2 π n / m N ) 2
for n = N / 2 , , N / 2 1 , and by U l a set of complex numbers defined by the formula
U l = n = N / 2 N / 2 1 β n e i 2 π n l / m N
for l = m N / 2 , , m N / 2 . Furthermore, taking account of the periodicity of l, we will denote by g j ˜ another set of complex numbers defined by the formula
g j ˜ = e i a 2 b ( b t j ) 2 l = q / 2 q / 2 Q j , l U v j + l
for j = 0 , 1 , , N 1 .
Remark 2.
Combining Equations (54)–(58) with the triangle inequality, we obtain that
g j g j ˜ < ϵ n = 0 N 1 β n
for j = 0 , 1 , , N 1 , where g j are defined by Equation (9).
Thus, the implements of NFLCT for Equation (9) is Algorithm 2.
Algorithm 2 NFLCT for fast computation of Equation (9).
  • Input parameter A = [ a , b ; c , d ] , the N / 2 , , N / 2 1 , β N / 2 , , β N / 2 1 ,
  • t 0 , , t N 1 .
  • Choose precision ϵ α and q = 4 π b 2 α
  • for j = 0 : N 1
  • Compute v j , the nearest integer to t j m N / ( 2 π )
  • Calculate β j N / 2 = β j N / 2 e i d / 2 b ( j N / 2 ) 2 + α [ ( 2 π ( j N / 2 ) ) / ( m N ) ] 2 according to Equation (56)
  •     for k = q / 2 : q / 2
  • Calculate Q j , k according to Equation (53).
  •      end
  • end
  • Comment: Evaluate Fourier series at uniform sampling in [ b m π , b m π ]
  • using inverse FFT of size m N
  • Calculate U l = n = N / 2 N / 2 β n e i 2 π n l / m N , for l = m N / 2 , , m N / 2 1
  • Comment: Calculate approximate values at desired points in terms of the values at
  • equispaced points [ b π , b π ]
  • for j = 0 : N 1
  • for l = −q/2:q/2
  • g j ˜ = g j ˜ + Q j , l U v j + l
  • end
  • Output: Approximate values g j ˜ = e i a / ( 2 b ) ( b t j ) 2 g j ˜ , j = N / 2 , , N / 2 1 .
  • The total complexity is N q + m N / 2 log 2 N + 3 N
Corollary 5.
Setting d = N / 2 in Corollary 2, we obtain that
e i n t j / m e α ( 2 π n N m 2 ) 2 l = q / 2 q / 2 Q j , l e i 2 π n v j + l m 2 N < ϵ
for any j = 0 , 1 , , N 1 , and any n [ m N / 2 , m N / 2 1 ] , ϵ is defined by Equation (44).
For a given set of complex numbers γ k , the v j is the unique set of complex coefficients such that
n = 0 N 1 γ n k = q / 2 q / 2 e α ( t m ) 2 k = q / 2 q / 2 ρ A , k , n i 2 b π e i a 2 b t 2 + i ( k + μ n ) t m b i d ( μ n + k ) 2 2 b m 2 = e i a 2 b t 2 e α ( t m ) 2 i 2 b π l = m N / 2 m N / 2 1 v l e i l t / b m
so that
v l = n , k , η n + k = l γ n e i d ( μ n + k ) 2 2 b m 2 ρ A , k , n
Here, we take t = t / b , then the Equation (61) can be rewritten as
n = 0 N 1 γ n k = q / 2 q / 2 e α ( t m ) 2 k = q / 2 q / 2 ρ A , k , n i 2 b π e i a 2 b t 2 + i ( k + μ n ) t m b i d ( μ n + k ) 2 2 b m 2 = e i a 2 b ( t b ) 2 e α ( t b m ) 2 i 2 b π l = m N / 2 m N / 2 1 v l e i l t / m
where t [ π , π ] . The V l is a set of complex numbers defined by the formula
V l = k = m N / 2 m N / 2 1 v k e α ( 2 π k / m 2 N ) e 2 π i k l / m 2 N
for l = m 2 N / 2 , , m 2 N / 2 1 .
Furthermore, the h j ˜ is another set of complex numbers defined by the formula
h j ˜ = i 2 b π e α ( b t j / m ) 2 e i a 2 b ( t j b ) 2 l = q / 2 q / 2 Q j , l V v j + l
for j = 0 , 1 , , N 1 . Thus, the implement of NFLCT for Equation (10) is Algorithm 3.
Algorithm 3 NFLCT for fast computation of Equation (10).
  • Input parameter A = [ a , b ; c , d ] , the u 0 , u 1 , , u N 1 , α 0 , , α N 1 .
  • Choose precision ϵ α and q = 4 π b 2 α
  • for n = 0 : N 1
  • Compute μ n , the nearest integer to m u n
  •     for k = q / 2 : q / 2
  • Calculate ρ A , k , n and τ μ n + k according to Equation (46) and Equation (49), respectively.
  •      end
  • end
  • Comment: Evaluate τ k Fourier Seres at uniform sampling in [ b m π , b m π ]
  • using inverse FFT of size m N
  • Calculate T j according Equation (50), for j = m N / 2 , , m N / 2 1
  • Comment: Scale the values at those points which lie in [ b π , b π ]
  • for j = N / 2 : N / 2 1
  • f j ˜ = e i a / ( 2 b ) ( 2 b π j / N ) 2 e α ( 2 b π j / m N ) 2 i 2 b π T j
  • end
  • Output: Approximate values f j ˜ , j = N / 2 , , N / 2 1 .
  • The total complexity is 2 N q + m N log N + 3 N

4. Simulations

In this section, some numerical examples are given to support our theoretical analysis in the above section. All tests of numerical examples are implemented in Matlab R2016a. Two measures of precision are selected for each algorithm,
E = max 0 j N 1 f j ˜ f j / j = 0 N 1 α j
E 2 = j = 0 N 1 f j ˜ f j 2 / j = 0 N 1 f j 2
where α is the input data, f is the result of a direct computation, and f j ˜ is the result of computation by proposed methods.
Example 1.
Here we consider the transformation F A : C N C N of Problem 1, as defined Equation (8). In this example, j = N / 2 , , N / 2 1 , u 0 , , u N 1 were randomly distributed on the interval [ N / 2 , N / 2 ] , and α 0 , , α N 1 were generated randomly on the unit square in the complex plane defined as
0 R e ( z ) 1 ,
We take a = 2 ,   b = 1 ,   c = 3 ,   d = 2 ; α = 0.5993 , q = 14 .
We applied Algorithm 1 and direct method to this problem respectively. For different N, we loop Algorithm 1 20 times, the error mean are presented in Table 1. The results show that the precision is almost independent the length of input data.
Example 2.
The Problem 2 as defined Equation (9) is considered for j = 0 , , N 1 . In this example, t 0 , , t N 1 were randomly distributed on the interval [ b π , b π ] , and β k = e i 2 k 2 + i 3 m k , k = N / 2 , , N / 2 1 , m k were distributed randomly on the interval [ N / 2 , N / 2 1 ] .
We take the parameters a = 2 , b = 1 , c = 7 , d = 4 , the interpolate factors m = 2 , the terms of LCS q = 10 , α = 0.646 . For N = 64 , we loop our algorithm 20 times, the results are presented in Figure 1. It shows that the Algorithm 2 has almost the same effective as the direct method. For different N, the results of E and E 2 are showed in Table 2. It suggested that the precision of the Algorithm 2 is independent N. For different α and q, the errors are presented in Table 3. It shows that the lager α and q is, the more accuracy of the Algorithm 2 is, and the rate of accuracy improvement is decreasing. The complexity of the Algorithm 2 dependents q and N. For m = 2 and different q, the calculation is plotted in Figure 2. Therefore, we should not choose too big q according to the accuracy and complexity.
Example 3.
Here we consider the transformation G : C N C N of the Problem 3 as defined Equation (10). In this example, t 0 , , t N 1 were randomly distributed on the interval [ b π , b π ] , u 0 , , u N 1 were randomly distributed on the interval [ N / 2 , N / 2 ] , and
γ k = 2 e i 0.4 u k 2 + i 2 u k + e i 0.4 u k 2 + i 4 u k + e i 0.4 u k 2 i 4 u k
where k = 0 , 1 , N 1 , a = 0.234 ,   b = 1.5 ,   c = 0.5835 ,   d = 0.5333 ; interpolation factor m = 2 ; the terms of the linear canonical series q = 8 and the constant α = 0.245 .
For N = 512 , the Figure 3 shows the amplitude and error for this problem by direct summation Equation (10) and Algorithm 3, respectively. It suggested that the Algorithm 3 has the almost same performance as the direct method. For different N, the Table 4 shows the error E and E 2 between direct method and Algorithm 3 by cyclic algorithms 20 times. The results show that the precision of Algorithm 3 is almost independent of the length of input data.
From the above three examples, the errors produced by Algorithms 1–3 are comparable with those produced by the corresponding direct methods. we can see that the numerical results coincide with the theoretical analyses which show the high efficiency of the new method.
The results of this paper can be generalized in the following ways: the algprithms of 1, 2 and 3 will allow the efficient application of linear transform F 1 , G 1 , H 1 : C N C M defined by
F 1 ( α ) j = k = 0 N 1 α k e i a 2 b ( 2 b π j N ) 2 + i u k b 2 π j N i d 2 b u k 2
for j = M / 2 , , M / 2 1 , and
G 1 ( g ) j = k = N / 2 N / 2 1 β k e i a 2 b t j 2 + i k t j b i d 2 b k 2
For j = 0 , 1 , , M 1 , we will also consider the more general transformation H : C N C N defined by the formula
H 1 ( γ ) j = k = 0 N 1 γ k e i a 2 b t j 2 + i u k t j b i d 2 b u k 2
The algorithms ofthis paper also assume that  u k ( N / 2 , N / 2 ) ,   t j ( b π , b π ) . Other distributions can be handle by partitioning the vectors u and t,treating each partition separately and finally combining the results.

5. Conclusions

In this paper, we have described three algorithms for computing DLCT for nonequispaced data based on the interpolation formulae and approximation theory, which transform a function values from equispace to nonequispaced points. The complexity and precision of derived algorithms are also presented. The simulation shows that the derived approach is effective for computing nonuniform DLCT. The proposed algorithm can be viewed as generalizations of discrete linear canonical transform, and will have a broad range of applications in many branches of mathematics, science and engineering.

Author Contributions

Conceptualization, Y.S.; methodology, Y.S.; validation, Y.S. and W.Q.; formal analysis, Y.S. and W.Q.; investigation, Y.S. and W.Q.; writing—original draft preparation, Y.S.; writing—review and editing, Y.S. and W.Q.; funding acquisition, Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, no.62001193.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Moshinsky, M. Linear canonical transformations and their unitary representations. J. Math. Phys. 1971, 12, 1772–1780. [Google Scholar] [CrossRef]
  2. Collins, S.A. Lens-System Diffraction Integral Written in Terms of Matrix Optics. J. Opt. Soc. Am. 1970, 60, 1168–1177. [Google Scholar] [CrossRef]
  3. Gbur, G. Simulating fields of arbitrary spatial and temporal coherence. Opt. Express 2006, 14, 7567–7578. [Google Scholar] [CrossRef] [PubMed]
  4. Ozaktas, H.M.; Kutay, M.A.; Zalevsky, Z. The Fractional Fourier Transform with Applications in Optics and Signal Processing; John Wiley and Sons: Hoboken, NJ, USA, 1995. [Google Scholar]
  5. Yan, F.J.; Li, B.Z. Windowed fractional Fourier transform on graphs: Properties and fast algorithm. Digit. Signal Process. 2021, 118, 103210. [Google Scholar] [CrossRef]
  6. Healy, J.J.; Kutay, M.A.; Haldun, M.; Ozaktas, H.M.; Sheridan, J.T. Linear Canonical Transforms Theory and Applications; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
  7. Davies, B. Intergral Transforms and Their Applications; Springer: New York, NY, USA, 1978. [Google Scholar]
  8. Ozaktas, H.M.; Hesselink, L. Fast and accurate algorithms for quadratic phase integrals in optics and signal processing. Proc. Spie 2011, 8043, 1–12. [Google Scholar]
  9. Moshinsky, M. Canonical transformations and Quantum mechanics. SIAM J. Appl. Math. 1973, 25, 193–212. [Google Scholar] [CrossRef]
  10. Huang, X.; Zhang, L.R.; Li, S.; Zhao, Y. Radar high speed small target detection based on keystone transform and linear canonical transform. Digit. Signal Process. 2018, 82, 203–215. [Google Scholar] [CrossRef]
  11. Guo, Y.; Li, B.Z. Blind image watermarking method based on linear canonical wavelet transform and QR decomposition. IET Image Process. 2016, 10, 773–786. [Google Scholar] [CrossRef]
  12. Zhao, J.; Tao, R.; Li, Y.L.; Wang, Y. Uncertainty Principles for Linear Canonical Transform. IEEE Trans. Signal Process. 2009, 57, 2856–2858. [Google Scholar] [CrossRef]
  13. Zhang, Z.C. Uncertainty principle for linear canonical transform using matrix decomposition of absolute spread matrix—ScienceDirect. Digit. Signal Process. 2019, 89, 145–154. [Google Scholar] [CrossRef]
  14. Tao, Z.C.Z.; Li, B.Z.; Wang, Y.; Aggrey, G.K. Jittered Sampling in Linear Canonical Domain. IEEE Commun. Lett. 2020, 24, 1529–1533. [Google Scholar]
  15. Pei, S.C.; Ding, J.J. Closed-form discrete fractional and affine Fourier transforms. IEEE Trans. Signal Process. 2000, 48, 1338–1353. [Google Scholar]
  16. Zhao, J.; Tao, R.; Wang, Y. Sampling rate conversion for linear canonical transform. Signal Process. 2008, 88, 2825–2832. [Google Scholar] [CrossRef]
  17. Koc, A.; Ozaktas, H.M.; Candan, C.; Kutay, M.A. Digital Computation of Linear Canonical Transforms. IEEE Trans. Signal Process. 2008, 56, 2383–2394. [Google Scholar] [CrossRef]
  18. Oktem, F.S.; Ozaktas, H.M. Exact Relation Between Continuous and Discrete Linear Canonical Transforms. IEEE Signal Process. Lett. 2009, 16, 727–730. [Google Scholar] [CrossRef]
  19. Pei, S.C.; Huang, S.G. Fast Discrete Linear Canonical Transform Based on CM-CC-CM Decomposition and FFT. IEEE Trans. Signal Process. 2016, 64, 855–866. [Google Scholar] [CrossRef]
  20. Hennelly, B.M.; Sheridan, J.T. Fast numerical algorithm for the linear canonical transform. J. Opt. Soc. Am. Opt. Image Sci. Vis. 2005, 22, 928–937. [Google Scholar] [CrossRef]
  21. Healy, J.J.; Sheridan, J.T. Sampling and discretization of the linear canonical transform. Signal Process. 2009, 89, 641–648. [Google Scholar] [CrossRef]
  22. Stern, A. Why is the Linear Canonical Transform so little known? AIP Conf. Proc. 2006, 860, 225–234. [Google Scholar]
  23. Healy, J.J.; Sheridan, J.T. Fast linear canonical transforms. J. Opt. Soc. Am. Opt. Image Sci. Vis. 2010, 27, 21–30. [Google Scholar] [CrossRef] [PubMed]
  24. Zhang, W.L.; Li, B.Z.; Cheng, Q.Y. A New Discretization Algorithm of Linear Canonical Transform. Procedia Eng. 2012, 29, 930–934. [Google Scholar] [CrossRef]
  25. Zhang, F.; Tao, R.; Wang, Y. Discrete linear canonical transform computation by adaptive method. Opt. Express 2013, 21, 18138–18151. [Google Scholar] [CrossRef] [PubMed]
  26. Healy, J.J.; Sheridan, J.T. Reevaluation of the direct method of calculating Fresnel and other linear canonical transforms. Opt. Lett. 2010, 35, 947–949. [Google Scholar] [CrossRef] [PubMed]
  27. Pei, S.C.; Lai, Y.C. Discrete linear canonical transforms based on dilated Hermite functions. J. Opt. Soc. Am. Opt. Image Sci. Vis. 2011, 28, 1695–1708. [Google Scholar] [CrossRef] [PubMed]
  28. Wei, D.Y.; Yang, J. Non-Uniform Sparse Fourier Transform and Its Applications. IEEE Trans. Signal Process. 2022, 70, 4468–4482. [Google Scholar] [CrossRef]
  29. Campos, R.G.; Figueroa, J. A fast algorithm for the linear canonical transform. Signal Process. 2011, 91, 1444–1447. [Google Scholar] [CrossRef]
  30. Sun, Y.N.; Li, B.Z. Digital computation of linear canonical transform for local spectra with flexible resolution ability. Sciece China. Inf. Sci. 2019, 62, 49301. [Google Scholar] [CrossRef]
  31. Sun, Y.N.; Li, B.Z. Sliding Discrete Linear Canonical Transform. IEEE Trans. Signal Process. 2018, 66, 4553–4563. [Google Scholar] [CrossRef]
  32. Sun, Y.N.; Li, B.Z. Segmented fast linear canonical transform. J. Opt. Soc. Am. Opt. Image Sci. Vis. 2018, 35, 1346–1355. [Google Scholar] [CrossRef]
  33. Koc, A.; Ozaktas, H.M. Operator theory-based computation of linear canonical transforms. Signal Process. 2021, 189, 108291. [Google Scholar] [CrossRef]
  34. Wei, D.Y.; Shen, Y. Discrete Complex Linear Canonical Transform Based on Super-differential Operators. Opt. Int. J. Light Electron Opt. 2021, 230, 166343. [Google Scholar] [CrossRef]
  35. Koç, A.; Ozaktas, H.M.H.L. Fast and accurate computation of two-dimensional non-separable quadratic-phase integrals. J. Opt. Soc. Am. Opt. Image Sci. Vis. 2010, 27, 1288–1302. [Google Scholar] [CrossRef] [PubMed]
  36. Wei, D.Y.; Hu, H. Sparse Discrete Linear Canonical Transform and Its Applications. Signal Process. 2021, 183, 108046. [Google Scholar] [CrossRef]
  37. Zhao, W.K.; Kintak, U.; Luo, H. Adaptive non-uniform partition algorithm based on linear canonical transform. Chaos Solitons Fractals 2022, 163, 112561. [Google Scholar] [CrossRef]
  38. Koç, A.; Bartan, B.; Ozaktas, H.M. Discrete Linear Canonical Transform Based on Hyperdifferential Operators. IEEE Trans. Signal Process. 2019, 67, 2237–2248. [Google Scholar] [CrossRef]
  39. Zhang, Y.; Li, B.Z. Discrete linear canonical transform on graphs. Digit. Signal Process. 2023, 135, 103934. [Google Scholar] [CrossRef]
  40. Li, C.P.; Li, B.Z.; Xu, T.Z. Approximating bandlimited signals associated with the LCT domain from nonuniform samples at unknown locations. Signal Process. 2012, 92, 1658–1664. [Google Scholar] [CrossRef]
  41. Wimp, J.; Gradshteyn, I.S.; Ryzhik, I.M.; Jeffrey, A. Table of Integrals, Series and Products. Am. Math. Mon. 1997, 104, 373. [Google Scholar]
Figure 1. Twenty independent experiments. Amplitude (a) obtained by directly summation Equation (10); (b) obtained by Algorithm 2. Error of amplitude between the direct summation and Algorithm 2 (c) E ; (d) E 2 .
Figure 1. Twenty independent experiments. Amplitude (a) obtained by directly summation Equation (10); (b) obtained by Algorithm 2. Error of amplitude between the direct summation and Algorithm 2 (c) E ; (d) E 2 .
Fractalfract 07 00353 g001
Figure 2. When m = 2 , N = 526 , complexity comparison between Algorithm 2 and direct summation for different q.
Figure 2. When m = 2 , N = 526 , complexity comparison between Algorithm 2 and direct summation for different q.
Fractalfract 07 00353 g002
Figure 3. Twenty independent experiments. Amplitude (a) obtained by directly summation Equation (10); (b) obtained by Algorithm 3. Error of amplitude between the direct summation and Algorithm 3 (c) E ; (d) E 2 .
Figure 3. Twenty independent experiments. Amplitude (a) obtained by directly summation Equation (10); (b) obtained by Algorithm 3. Error of amplitude between the direct summation and Algorithm 3 (c) E ; (d) E 2 .
Fractalfract 07 00353 g003
Table 1. For different N, the error comparison between direct method and Algorithm 1.
Table 1. For different N, the error comparison between direct method and Algorithm 1.
N641282565121024
E 0.0149 0.0084 0.0037 0.0024 9.7624 × 10 4
E 2 0.0536 0.0433 0.0271 0.0253 0.0141
Table 2. Errorcomparison between the direct summation Equation (9) and the Algorithm 2 in case of difference N.
Table 2. Errorcomparison between the direct summation Equation (9) and the Algorithm 2 in case of difference N.
N64128256512
E 2.1569 × 10 6 2.0019 × 10 6 2.1367 × 10 6 2.0761 × 10 6
E 2 2.1113 × 10 6 2.2353 × 10 6 2.2271 × 10 6 2.0740 × 10 6
Table 3. For fixed N = 64 , error comparison between the direct summation Equation (9) and the Algorithm 2 in case of difference α and q.
Table 3. For fixed N = 64 , error comparison between the direct summation Equation (9) and the Algorithm 2 in case of difference α and q.
( α , q ) (0.246, 4)(0.446, 6)(0.646, 10)(0.846, 12)
E 0.0016 2.8818 × 10 4 2.4913 × 10 6 1.0767 × 10 6
E 2 0.0023 2.5009 × 10 4 2.2433 × 10 6 1.1986 × 10 6
Table 4. The error E and E 2 between direct method and Algorithm 3 by cyclic algorithms 20 times.
Table 4. The error E and E 2 between direct method and Algorithm 3 by cyclic algorithms 20 times.
N641282565121024
E 0.0089 0.0033 0.0025 0.0014 0.0014
E 2 0.0343 0.0166 0.0162 0.0067 0.0102
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sun, Y.; Qian, W. Fast Linear Canonical Transform for Nonequispaced Data. Fractal Fract. 2023, 7, 353. https://doi.org/10.3390/fractalfract7050353

AMA Style

Sun Y, Qian W. Fast Linear Canonical Transform for Nonequispaced Data. Fractal and Fractional. 2023; 7(5):353. https://doi.org/10.3390/fractalfract7050353

Chicago/Turabian Style

Sun, Yannan, and Wenchao Qian. 2023. "Fast Linear Canonical Transform for Nonequispaced Data" Fractal and Fractional 7, no. 5: 353. https://doi.org/10.3390/fractalfract7050353

Article Metrics

Back to TopTop