The Sparse Fourier Transform. Haitham Hassanieh
Чтение книги онлайн.
Читать онлайн книгу The Sparse Fourier Transform - Haitham Hassanieh страница 13
Lemma 3.2 Define
Proof The proof can be found in Appendix A.2 ■
3.2.2 Non-Iterative Sparse Fourier Transform
Our SFT 1.0 algorithm shown in Algorithm 3.1 is parameterized by ∊ and δ. It runs L = O(log n) iterations of the inner loop, with parameters
Lemma 3.3 The algorithm runs in time
Proof To analyze this algorithm, note that
or |I′| ≤ 2dkn/B. Therefore, the running time of both the location and estimation inner loops is
Theorem 3.1 Running the algorithm with parameters ∊, δ < 1 gives x̂′ satisfying
with probability 1 − 1/n and running time
Proof Define
Lemma 3.2 says that in each location iteration r, for any i with |x̂i| ≥ 4E,
Thus, E[si] ≥ 3L/4, and each iteration is an independent trial, so by a Chernoff bound the chance that si < L/2 is at most 1/2Ω(L) < 1/n3. Therefore by a union bound, with probability at least 1 − 1/n2, i ∈ I′ for all i with |x̂i| ≥ 4E.
Next, Lemma 3.1 says that for each estimation iteration r and index i,
Therefore, with probability
Since real
By a union bound over I′, with probability at least 1 − 1/n2 we have
Rescaling ∊ and δ gives our theorem. ■
3.2.3 Extension
In this section, we present an extension of the SFT 1.0 algorithm which adds a heuristic to improve the runtime. We refer to this new algorithm as SFT 2.0 and it is shown in Algorithm 3.2. The idea of the heuristic is to apply the aliasing filter to restrict the locations of the large coefficients. The algorithm is parameterized by M that divides n. It performs the aliasing filter as a preprocessing step to SFT 1.0 and uses its output to restrict the frequency locations in the set Ir outputted by the location loops, as shown in Algorithm 3.2.
Observe that
This means that the filter is very efficient, in that it has no leakage at all. Also, it is simple to compute. Unfortunately, it cannot be “randomized” using Pσ, τ, b: after permuting by σ and b, any two colliding elements j and j′ (i.e., such that j = j′ mod M) continue to collide. Nevertheless, if x̂j is large, then j mod M is likely to lie in T—at least heuristically on random input.
SFT 2.0 assumes that all “large” coefficients j have j mod M in T. That is, we restrict our sets Ir to contain only coordinates