Next Article in Journal / Special Issue
A Bivariate Beta from Gamma Ratios for Determining a Potential Variance Change Point: Inspired from a Process Control Scenario
Previous Article in Journal
On the Convergence of the Damped Additive Schwarz Methods and the Subdomain Coloring
Previous Article in Special Issue
The Generalized Odd Linear Exponential Family of Distributions with Applications to Reliability Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Prony Method for Two-Generator Sparse Expansion Problem

1
School of Engineering, Math and Technology Navajo Technical University, Lowerpoint Rd State Hwy 371, Crownpoint, NM 87313, USA
2
Department of Computer Science, University of Missouri, St. Louis, MO 63121, USA
*
Author to whom correspondence should be addressed.
Math. Comput. Appl. 2022, 27(4), 60; https://doi.org/10.3390/mca27040060
Submission received: 23 March 2022 / Revised: 4 July 2022 / Accepted: 11 July 2022 / Published: 15 July 2022
(This article belongs to the Special Issue Computational Mathematics and Applied Statistics)

Abstract

:
In data analysis and signal processing, the recovery of structured functions from the given sampling values is a fundamental problem. Many methods generalized from the Prony method have been developed to solve this problem; however, the current research mainly deals with the functions represented in sparse expansions using a single generating function. In this paper, we generalize the Prony method to solve the sparse expansion problem for two generating functions, so that more types of functions can be recovered by Prony-type methods. The two-generator sparse expansion problem has some special properties. For example, the two sets of frequencies need to be separated from the zeros of the Prony polynomial. We propose a two-stage least-square detection method to solve this problem effectively.

1. Introduction

The Prony method is a popular tool used to recover the functions represented in sparse expansions using one generating function. For example, the function with the following form
f ( x ) = j = 1 M c j e i x ϕ j
can be recovered from 2 M equispaced sampling values f ( l h ) , l = 0 , . . . , 2 M 1 for an appropriate positive constant h; however, in many real-world applications, we need to deal with the functions represented by more than one generating functions. For example, the harmonic signals with the form
f ( x ) = j = 1 M c j cos ( ϕ j x ) + d j sin ( β j x ) ,
are generated by two generating functions (or simply generators): cos ( ϕ x ) and sin ( β x ) , where ϕ and β are generic parameters used as the placeholders for the real parameters { ϕ j } j = 1 M and { β j } j = 1 M to generate the specific terms in the expansion. In this system, we have two sets of coefficients { c j } j = 1 M and { d j } j = 1 M and two sets of frequencies { ϕ j } j = 1 M and { β j } j = 1 M . Analogous to the original Prony method, we expect to use 4 M equispaced sampling values f ( l h ) , l = 0 , . . . , 4 M 1 to recover those four sets of parameters.
There are some existing methods to solve this problem. The first one is to convert it to a single-generator problem by the following formulas
cos x = 1 2 ( e i x + e i x ) and sin x = 1 2 i ( e i x e i x ) ,
which results in problem (1) (see [1]). Another way using the same idea is based on the even/odd properties for cos x and sin x (see [2]) as follows
f ( x ) + f ( x ) = 2 j = 1 M c j cos ( ϕ j x ) .
However, this approach is very restrictive, because the chance that one can make this kind of conversion is very small. In this paper, we are interested in solving the general two-generator sparse expansion problem by a new way of generalized Prony method. More specifically, we study the functions with the following two-generator sparse expansion
f ( x ) = j = 1 M 1 c j u ( ϕ j x ) + l = 1 M 2 d l v ( β l x ) ,
where u ( ϕ x ) and v ( β x ) are two different functions used as the generators. In order to make the Prony method work, we need a critical condition for our special technique: There exists a linear operator, such that u ( ϕ x ) and v ( β x ) are both eigenfunctions of this operator.
Another situation that could lead to the two-generator expansion problem is when we apply some special transforms on a sparse expansion. For example, when we apply the short time Fourier transform (STFT), i.e.,
STFT { f ( x ) } ( ω , τ ) = f ( x ) w ( x τ ) e i ω x d x
using the Gaussian window function w ( x ) = 1 2 π e x 2 2 σ 2 on the sparse cosine expansion
f ( x ) = j = 1 M c j cos ( ϕ j x ) ,
we would obtain a two-generator sparse expansion as follows,
f ( x ) = j = 1 M c j e β ( ϕ j x ) 2 + j = 1 M c j e β ( ϕ j + x ) 2 .
In this example, the two generators are e β ( ϕ x ) 2 and e β ( ϕ + x ) 2 with β 0 . Actually, the original single-generator problem (6) can be solved directly. For example, one can convert cos ( ϕ x ) to 1 2 ( e i ϕ x + e i ϕ x ) (see [1]), or use a method based on the Chebyshev polynomials (see [3]). When we solve problem (6) directly, we use the sampling values in the time domain; when we solve the problem in the form of (7), we use the sampling values in the frequency domain. (See [4] for a discussion on sampling values in the frequency domain.) In this paper, we use this example to study the special properties of the two-generator sparse expansion problem.
Since the signals could take various forms, not necessarily in the exponential form studied in the classical Prony method, many researchers generalized the Prony method to handle different types of signals. For example, many results in [1,3,5,6,7,8,9,10,11,12] have been developed over the last few years. In particular, Peter and Plonka in [1,8] generalized the Prony method to reconstruct M-sparse expansions in terms of eigenfunctions of some special linear operators. In [3], Plonka and others reconstructed different signals by exploiting the generalized shift operator. These results provide us the building blocks for our method in this paper.
We organize our presentation in the remaining sections as follows. In Section 2, we quickly review the classical Prony method and one of its generalizations for the Gaussian generating function to establish the foundation of our method. In Section 3, we describe the details of our method using the example with two generators: cosine and sine functions. In Section 4, we apply our method on two different types of Gaussian generating functions, so that we can study an interesting property: When the Hankel matrix for finding the coefficients of the Prony polynomial is singular, what does it really mean? In Section 5, we show two examples that correspond to the two problems solved in Section 3 and Section 4, respectively. Finally, we make conclusions in Section 6 and describe two related research problems to be solved in the future.

2. Review of the Prony Method and One of Its Generalizations

Our method is built on top of the Prony method and one of its generalizations. Before we present our technique, we review these basic methods.

2.1. Classical Prony Method

Let f ( x ) be a function in the form of
f ( x ) = j = 1 M c j e i x ϕ j
with M 1 . Then the coefficients { c j } 1 M and the frequencies { ϕ j } 1 M can be recovered from the sampling values f ( l h ) , l = 0 , . . . , 2 M 1 , where h is some positive constant. To solve this problem, a special polynomial called the Prony polynomial can help us convert the relatively hard non-linear problem (8) to two linear problems and a simple non-linear problem (finding zeros of a polynomial). The Prony polynomial for (8) is defined as
Λ ( z ) = j = 1 M ( z e i h ϕ j ) = l = 0 M λ l z l ,
where λ l , l = 0 , . . . , M are the coefficients of the monomial terms in (9) with the leading coefficient λ M = 1 . The technique is based on the following critical property:
l = 0 M λ l f ( h ( l + m ) ) = l = 0 M λ l j = 1 M c j e i h ( l + m ) ϕ j = j = 1 M c j e i h m ϕ j l = 0 M λ l e i h l ϕ j = 0 = 0
for any m = 0 , 1 , , M 1 , which can be written as the following linear system
f ( h ( l + m ) ) l , m = 0 M 1 λ 0 λ M 1 = f ( h M ) f ( h ( 2 M 1 ) ) .
The coefficient vector λ = λ 0 , λ 1 , , λ M 1 T can be calculated from the 2 M sampling values f ( l h ) , l = 0 , . . . , 2 M 1 . The linear system (11) is guaranteed to have a unique solution under the condition that all ϕ j ’s are distinct in ( K , K ) R for some K > 0 (with h in the range 0 < h < π K ), and c 1 , , c M are nonzero in C , which is a natural requirement for problem (8). This property is a direct result of the following matrix factorization
f ( h ( l + m ) ) l , m = 0 M 1 = V T d i a g ( c 1 , . . . , c M ) V ,
where V : = [ e i l h ϕ j ] l = 0 , j = 1 l = M 1 , j = M is a Vandermonde matrix, which is non-singular for distinct ϕ j ’s and h ϕ j ( π , π ] for j = 1 , . . . , M . The frequencies can be extracted from the zeros of Λ ( z ) (in the form of z j = e i h ϕ j ) using the formula
ϕ j = Im ( ln ( z j ) ) h , j = 1 , . . . , M .
Finally, the coefficients c j , j = 1 , . . . , M can be determined by solving the following overdetermined linear system (with M unknowns and 2 M equations)
f ( l h ) = j = 1 M c j e i l h ϕ j , l = 0 , . . . , 2 M 1 .
The redundant equations in this overdetermined linear system will play a critical role in our two-generator method to help us separate the frequencies associated with the two generators (see Section 3).

2.2. Sparse Expansions on Shifted Gaussian

In order to solve the two-generator sparse expansion problem (7), we need to apply the technique presented in [3], which solves a single-generator sparse expansion problem with the following form
f ( x ) = j = 1 M c j e β ( x ϕ j ) 2 ,
where β C { 0 } . The technique relies on the following generalized shift operator
S K , h f ( x ) = K ( x , h ) f ( x + h ) ,
where h 0 , and K ( · , · ) has the property
K ( x , h 1 + h 2 ) = K ( x , h 1 ) K ( x + h 1 , h 2 ) = K ( x , h 2 ) K ( x + h 2 , h 1 ) .
The K ( x , h ) function in (16) is chosen to be e β h ( 2 x + h ) , so that we have the following critical property
( S K , h e β ( ϕ · ) 2 ) ( x ) = e 2 β ϕ h e β ( ϕ x ) 2 ,
which means that e β ( ϕ j x ) ’s are eigenfunctions of S K , h for all ϕ j R .
The sparse expansion f ( x ) in (15) can be reconstructed using 2 M sampling values f ( x 0 + h k ) , k = 0 , . . . , 2 M 1 , and x 0 is an arbitrary real number. If Re β 0 , then h R { 0 } ; while if Re β = 0 , then 0 < h π 2 | Im β | L with ϕ j ( L , L ) for j = 1 , . . . , M for some given L . (See [3].) The Prony polynomial for the problem in (15) can be defined as:
Λ ( z ) : = j = 1 M ( z e 2 h β ϕ j ) = l = 0 M λ l z l
with λ M = 1 . Then, we have the following linear system
l = 0 M 1 λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) f ( x 0 + h ( l + m ) ) = e β h ( m + M ) ( 2 x 0 + h ( m + M ) ) f ( x 0 + h ( m + M ) )
for m = 0 , 1 , . . . , M 1 , which can be represented as an inhomogeneous system
H λ = G ,
where G : = ( S K , ( M + m ) h f ) ( x 0 ) m = 0 M 1 , and H : = ( S K , ( l + m ) h f ) ( x 0 + ( l + m ) h ) l , m = 0 M 1 . This H matrix is a Hankel matrix, and it has the following structure
H : = ( S K , ( l + m ) h f ) ( x 0 + ( l + m ) h ) l , m = 0 M 1 = K ( x 0 , ( l + m ) h ) f ( x 0 + ( l + m ) h ) l , m = 0 M 1 = V d i a g ( c j e β ( ϕ j x 0 ) 2 ) V T ,
with the Vandermonde matrix
V : = 1 1 1 e 2 β h ϕ 1 e 2 β h ϕ 2 e 2 β h ϕ M e 2 ( M 1 ) β h ϕ 1 e 2 ( M 1 ) β h ϕ 2 e 2 ( M 1 ) β h ϕ M .
Thus, H is invertible for distinct ϕ j ’s in ( L , L ) R for L > 0 , and the vector of the coefficients λ : = [ λ 0 , . . . , λ M 1 ] T are obtained by solving the system (20), which can be used to calculate the parameters { ϕ j } ’s.
Finally, the coefficients c j ’s in the expansion (15) can be computed by solving the following overdetermined linear system:
f ( x 0 + l h ) = j = 1 M c j e β ( x 0 ϕ j + l h ) 2 , l = 0 , . . . , 2 M 1 .

3. The Sparse Expansion Problem with Two Generators: Cosine and Sine

In this section, we present our method for solving the two-generator sparse expansion problem in the following form
f ( x ) = j = 1 M 1 c j cos ( ϕ j x ) + l = 1 M 2 d l sin ( β l x )
through a modified Prony method. We present our method in the following theorem.
Theorem 1.
Assume that a function f ( x ) has the two-generator sparse expansion form of(23), where the number of terms for two generators M 1 and M 2 are known, but the two sets of coefficients in { c 1 , , c M 1 } and { d 1 , , d M 2 } and the two sets of frequencies in { ϕ 1 , , ϕ M 1 } and { β 1 , , β M 2 } are unknown. If 4 ( M 1 + M 2 ) 1 equispaced sampling values of the form f ( x 0 + k h ) for k = 2 ( M 1 + M 2 ) + 1 , , 1 , 0 , 1 , , 2 ( M 1 + M 2 ) 1 are provided, then the original function f ( x ) can be uniquely reconstructed under the following conditions:
1 All the coefficients { c 1 , , c M 1 , d 1 , , d M 2 } are nonzero in C .
2 All the frequencies { ϕ 1 , , ϕ M 1 , β 1 , , β M 2 } are distinct in a range [ 0 , K ) R for some K > 0 . Furthermore, h is selected from the range 0 < h < π K .
3 The value of x 0 R is selected to make the ( M 1 + M 2 ) numbers cos ( ϕ 1 x 0 ) , , cos ( ϕ M 1 x 0 ) ,
sin ( β 1 x 0 ) , , sin ( β M 2 x 0 ) nonzero.
Proof. 
First, we choose an appropriate linear operator, such that our two generating functions cos ( ϕ x ) and sin ( β x ) in (23) are both the eigenfunctions of this operator. We consider the symmetric shift operator (see [3])
S h , h f ( x ) : = S h + S h 2 f ( x ) = f ( x h ) + f ( x + h ) 2 .
When we apply this operator on cos ( ϕ x ) and sin ( β x ) , we obtain
( S h , h ) cos ( ϕ x ) = cos ( ϕ h ) cos ( ϕ x ) , ( S h , h ) sin ( β x ) = cos ( β h ) sin ( β x ) ,
where cos ( ϕ h ) and cos ( β h ) are the eigenvalues. Now we define the Prony polynomial for problem (23) using all the eigenvalues { cos ( ϕ j h ) } j = 1 M 1 and { cos ( β l h ) } l = 1 M 2 as follows:
Λ ( z ) = j = 1 M 1 z cos ( h ϕ j ) l = 1 M 2 z cos ( h β l ) ,
which can be written in terms of the Chebyshev polynomials as
Λ ( z ) = k = 0 M 1 + M 2 λ k T k ( z ) ,
where T k ( z ) : = cos ( k cos 1 ( z ) ) . (See [3] for more information on this technique.) Since the leading coefficient of the Chebyshev polynomial T k ( z ) is 2 k 1 , we choose λ M 1 + M 2 = 2 1 ( M 1 + M 2 ) , so that Λ ( z ) in (27) has the leading coefficient 1. This Prony polynomial has the following critical property:
k = 0 M 1 + M 2 λ k T k ( cos ( ϕ j h ) ) = 0 and k = 0 M 1 + M 2 λ k T k ( cos ( β l h ) ) = 0
for j = 1 , 2 , , M 1 and l = 1 , 2 , , M 2 , respectively, which is essential to help us derive the following linear system.
To derive a linear system for { λ k } k = 0 M 1 + M 2 1 , we need to calculate the following expression
k = 0 M 1 + M 2 λ k S k h , k h S m h , m h f ( x 0 ) ,
which can be shown to be zero. That is,
1 4 k = 0 M 1 + M 2 λ k f ( x 0 + ( m + k ) h ) + f ( x 0 ( m + k ) h ) + f ( x 0 + ( m k ) h ) + f ( x 0 ( m k ) h ) = 0
for m = 0 , 1 , , M 1 + M 2 1 . Indeed, using the right-hand-side expression in (23) for f ( x ) in (28) and for a fixed m { 0 , 1 , , M 1 + M 2 1 } , we obtaining
1 4 k = 0 M 1 + M 2 λ k j = 1 M 1 2 c j cos ( ϕ j ( x 0 + m h ) ) + cos ( ϕ j ( x 0 m h ) ) cos ( ϕ j k h ) + 1 4 k = 0 M 1 + M 2 λ k l = 1 M 2 2 d l sin ( β l ( x 0 + m h ) ) + sin ( β l ( x 0 m h ) ) cos ( β l k h ) = j = 1 M 1 c j cos ( ϕ j x 0 ) cos ( ϕ j m h ) k = 0 M 1 + M 2 λ k cos ( ϕ j k h ) + l = 1 M 2 d l sin ( β l x 0 ) cos ( β l m h ) k = 0 M 1 + M 2 λ k cos β l ( k h ) = j = 1 M 1 c j cos ( ϕ j x 0 ) cos ( ϕ j m h ) k = 0 M 1 + M 2 λ k T k ( cos ( ϕ j h ) ) = 0 + l = 1 M 2 d l sin ( β l x 0 ) cos ( β l m h ) k = 0 M 1 + M 2 λ k T k ( cos ( β l h ) ) = 0 = 0 .
We can reformulate the system (28) as
k = 0 ( M 1 + M 2 ) 1 λ k f ( x 0 + ( m + k ) h ) + f ( x 0 ( m + k ) h ) + f ( x 0 + ( m k ) h ) + f ( x 0 ( m k ) h ) = 2 1 ( M 1 + M 2 ) ( f ( x 0 + ( ( M 1 + M 2 ) + m ) h ) + f ( x 0 ( ( M 1 + M 2 ) + m ) h ) + f ( x 0 + ( ( M 1 + M 2 ) m ) h ) + f ( x 0 ( ( M 1 + M 2 ) m ) h ) )
for m = 0 , 1 , , M 1 + M 2 1 . To solve this system, we need 4 ( M 1 + M 2 ) 1 sampling values in the form of f ( x 0 + k h ) for k = 2 ( M 1 + M 2 ) + 1 , , 1 , 0 , 1 , , 2 ( M 1 + M 2 ) 1 .
In order to see that the linear system in (29) has a unique solution, we study the ( M 1 + M 2 ) × ( M 1 + M 2 ) coefficient matrix in (29), which we denote as H . As in the classical Prony method, we can factorize H in the following structure
H : = f ( x 0 + ( m + k ) h ) + f ( x 0 ( m + k ) h ) + f ( x 0 + ( m k ) h ) + f ( x 0 ( m k ) h ) m , k = 0 ( M 1 + M 2 ) 1 = 4 j = 1 M 1 c j cos ( ϕ j x 0 ) cos ( ϕ j m h ) cos ( ϕ j k h ) + l = 1 M 2 d l sin ( β l x 0 ) cos ( β l m h ) cos ( β l k h ) m , k = 0 ( M 1 + M 2 ) 1 = 4 V h D V h T ,
where the Vandermonde Block matrix V h can be written as
V h : = A | B ,
with
A : = 1 1 T 1 ( cos ϕ 1 h ) T 1 ( cos ϕ M 1 h ) T ( M 1 + M 2 ) 1 ( cos ϕ 1 h ) T ( M 1 + M 2 ) 1 ( cos ϕ M 1 h ) ( M 1 + M 2 ) × M 1
and
B : = 1 1 T 1 ( cos β 1 h ) T 1 ( cos β M 2 h ) T ( M 1 + M 2 ) 1 ( cos β 1 h ) T ( M 1 + M 2 ) 1 ( cos β M 2 h ) ( M 1 + M 2 ) × M 2 ,
and the diagonal block matrix D can be written as
D : = D 1 0 0 D 2
where
D 1 : = c 1 cos ( ϕ 1 x 0 ) c M 1 cos ( ϕ M 1 x 0 )
and
D 2 : = d 1 sin ( β 1 x 0 ) d M 2 sin ( β M 2 x 0 ) .
Thus, H is guaranteed to be invertible by the conditions 2 and 3 of the theorem. Then, we can find the unique solution for { λ k } k = 0 M 1 + M 2 1 from the linear system (29).
With these λ k values for Λ ( z ) as in (26), we can determine ϕ j ’s and β l ’s from the zeros of Λ ( z ) ; however, this step is non-trivial, because we do not know what zeros correspond to ϕ j ’s and what zeros correspond to β l ’s. In order to resolve this ambiguity, we consider all the possible cases: Among M 1 + M 2 zeros of Λ ( z ) , M 1 of them correspond to ϕ j ’s. Thus, there are a total M 1 + M 2 M 1 possible choices for ϕ j ’s, among which there is exactly one choice for the solution; however, how do we select the right one? We need to go to the next overdetermined linear system for the answer.
When we determine the coefficients c j ’s and d l ’s in (23), we have the following linear system
f ( x 0 + h n ) = j = 1 M 1 c j cos ( ϕ j ( x 0 + h n ) ) + l = 1 M 2 d l sin ( β l ( x 0 + h n ) )
for n = 2 ( M 1 + M 2 ) + 1 , , 1 , 0 , . . . , 2 ( M 1 + M 2 ) 1 corresponding to all the sampling values, which has 4 ( M 1 + M 2 ) 1 equations and M 1 + M 2 unknowns. This overdetermined linear system gives us the extra information we need to select the true-solution case from the remaining non-solution cases.
Our method is based on an observation: The sampling values { f ( x 0 + n h ) } n = 2 ( M 1 + M 2 ) + 1 2 ( M 1 + M 2 ) 1 are calculated using the original ϕ j ’s and β l ’s (corresponding to the true-solution case), which means that all the 4 ( M 1 + M 2 ) 1 equations in (36) are completely satisfied for the true-solution case. In other words, the least-square solution of (36) for the true-solution case should have this property: Its error term is zero theoretically (or very close to zero due to rounding errors in computation). While the least-square solution for any non-solution case would have a significant (with respect to the rounding errors) nonzero error term, which makes the true solution stand out clearly. □
Our experiments have verified this phenomenon. Based on this observation, we develop a two-stage least-square detection method to minimize the computing cost, and in Section 5, we demonstrate the effectiveness of this method using a simple example.
Remark 1.
The overdetermined linear system (36) plays an important role in determining the true solution from certain number of possible cases. Typically, this situation happens in the multi-generator sparse expansion problem. For the single-generator case, we can select same number of linearly independent equations from the overdetermined system as the number of unknowns to find the solution; however, for the multi-generator case, the redundant equations are very useful in the least-square method.

4. The Sparse Expansion Problem with Two Gaussian Generators

In this section, we solve another two-generator sparse expansion problem as in (7) that uses the two Gaussian generating functions, e β ( ϕ x ) 2 and e β ( ϕ + x ) 2 , in the form of
f ( x ) = j = 1 M c j e β ( ϕ j x ) 2 + j = 1 M c j e β ( ϕ j + x ) 2
for some constant β C { 0 } . In order to recover the coefficients c j C { 0 } and the parameters ϕ j ’s, we need 4 M sampling values f ( x 0 + k h ) , k = 0 , . . . , 4 M 1 , where x 0 R , and h satisfies the same condition as in Section 2.2.
This two-generator sparse expansion problem has a special property: When ϕ j 0 = 0 for some j 0 { 1 , . . . , M } , the two functions e β ( ϕ j 0 x ) 2 and e β ( ϕ j 0 + x ) 2 are the same. This property would cause some problem for our method presented in the previous section. In order to make the discussion easier, we separate these two cases, and consider the case that ϕ j R { 0 } for all j = 1 , . . . , M first.
Theorem 2.
Assume that a function f ( x ) has the two-generator sparse expansion form of (37), where the number of terms M and the constant β C { 0 } are known, but the coefficients in { c 1 , , c M } and the parameters in { ϕ 1 , , ϕ M } are unknown. If 4 M equispaced sampling values of the form f ( x 0 + k h ) for k = 0 , 1 , , 4 M 1 are provided, then the original function f ( x ) can be uniquely reconstructed under the following conditions:
1 The coefficients { c 1 , , c M } are nonzero in C .
2 The parameters { ϕ 1 , , ϕ M } are nonzero in ( L , L ) R for some L > 0 , and they are distinct.
3 If Re β 0 , then h R { 0 } ; while if Re β = 0 , then 0 < h π 2 | Im β | L .
Proof. 
Our method relies on existence of some critical linear operator, such that both generating functions are its eigenfunctions. Here we use the operator S K , h as defined in (16) with K ( x , h ) : = e β h ( 2 x + h ) , which has the following properties:
( S K , h e β ( ϕ · ) 2 ) ( x ) = e 2 β ϕ h e β ( ϕ x ) 2 , ( S K , h e β ( ϕ + · ) 2 ) ( x ) = e 2 β ϕ h e β ( ϕ + x ) 2 .
Clearly e β ( ϕ j · ) 2 and e β ( ϕ j + · ) 2 are eigenfunctions of S K , h for all ϕ j R { 0 } with corresponding eigenvalues e 2 β ϕ j h and e 2 β ϕ j h , respectively, for j = 1 , . . . , M . Hence we can define the Prony polynomial using all these eigenvalues:
Λ ( z ) = j = 1 M ( z e 2 h β ϕ j ) j = 1 M ( z e 2 h β ϕ j ) = l = 0 2 M λ l z l
with λ 2 M = 1 . Since the real number ϕ j 0 , we can assume that ϕ j > 0 for all j = 1 , . . . , M based on the structure in (37) to improve the certainty without loss of generality.
Then for m = 0 , 1 , . . . , 2 M 1 , we calculate
l = 0 2 M λ l ( S K , ( l + m ) h f ) ( x 0 ) = l = 0 2 M λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) f ( x 0 + h ( l + m ) ) = l = 0 2 M λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) j = 1 M c j e β ( ϕ j ( x 0 + h ( l + m ) ) ) 2 + l = 0 2 M λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) j = 1 M c j e β ( ϕ j + ( x 0 + h ( l + m ) ) ) 2 = j = 1 M c j e β ( x 0 + h m ϕ j ) 2 e β h m ( 2 x 0 + h m ) l = 0 2 M λ l e 2 β h l ϕ j = 0 + j = 1 M c j e β ( x 0 + h m + ϕ j ) 2 e β h m ( 2 x 0 + h m ) l = 0 2 M λ l e 2 β h l ϕ j = 0 = 0 ,
which can be written as the following linear system
l = 0 2 M 1 λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) f ( x 0 + h ( l + m ) ) = e β h ( m + 2 M ) ( 2 x 0 + h ( m + 2 M ) ) f ( x 0 + h ( m + 2 M ) )
for m = 0 , 1 , . . . , 2 M 1 . To solve this system, we need 4 M sampling values: f ( x 0 + k h ) for = 0 , 1 , , 4 M 1 . To study existence of the solution for this linear system, we would like to simplify it with respect to the unknown vector λ : = [ λ 0 , . . . , λ 2 M 1 ] T as follows,
H λ = G ,
with G : = ( S K , ( M + m ) h f ) ( x 0 ) m = 0 2 M 1 and
H : = ( S K , ( l + m ) h f ) ( x 0 ) l , m = 0 2 M 1 .
The invertibility of H can be seen from the following matrix factorization:
H = K ( x 0 , h ( l + m ) ) f ( x 0 + h ( l + m ) ) l , m = 0 2 M 1 = j = 1 M c j e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) e β ( ϕ j ( x 0 + h ( l + m ) ) ) 2 + j = 1 M c j e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) e β ( ϕ j + ( x 0 + h ( l + m ) ) ) 2 l , m = 0 2 M 1 = j = 1 M c j e β ( ϕ j x 0 ) 2 e 2 β h ( l + m ) ϕ j + j = 1 M c j e β ( ϕ j + x 0 ) 2 e 2 β h ( l + m ) ϕ j l , m = 0 2 M 1 = V h d i a g c j e β ( ϕ j x 0 ) 2 + c j e β ( ϕ j + x 0 ) 2 V h T = V h D V h T
where the Vandermonde block matrix V h has the following form
V h : = A | B
with
A : = 1 1 e 2 β h ϕ 1 e 2 β h ϕ M e 2 ( 2 M 1 ) β h ϕ 1 e 2 ( 2 M 1 ) β h ϕ M ( 2 M ) × M
and
B : = 1 1 e 2 β h ϕ 1 e 2 β h ϕ M e 2 ( 2 M 1 ) β h ϕ 1 e 2 ( 2 M 1 ) β h ϕ M ( 2 M ) × M ,
and the diagonal block matrix D is given by
D : = D 1 0 0 D 2
with
D 1 : = c 1 e β ( ϕ 1 x 0 ) 2 c M e β ( ϕ M x 0 ) 2
and
D 2 : = c 1 e β ( ϕ 1 + x 0 ) 2 c M e β ( ϕ M + x 0 ) 2 .
From this structure, we can see that the Vandermonde matrix V h in (44) is invertible by conditions 2 and 3 of the theorem, and hence H in (42) is also invertible by condition 1 , which results in the unique solution for λ .
With all the λ l values found from the above linear system, we can find all the ϕ j values by calculating the zeros of the Prony polynomial of (39). In this case, we do not need to deal with the ambiguity that we encountered in the previous section due to the special structure of the pairs ( ϕ j , ϕ j ) ’s. Finally, the coefficients c j ’s of the sparse expansion (37) can be computed by solving the following overdetermined linear system:
f ( x 0 + l h ) = j = 1 M c j e β ( ϕ j + x 0 l h ) 2 + e β ( ϕ j + x 0 + l h ) 2
for l = 0 , . . . , 4 M 1 . □
Remark 2.
Our method above only works for the case when ϕ j 0 for all j in { 1 , 2 , , M } ; however, in the real-world situation, when we solve a problem of (37) using 4 M sampling values, how do we know if there exists any ϕ j = 0 in it or not? We need a detection method to tell us if all the ϕ j ’s are nonzero before we apply the above method.
Let us investigate the existence of a solution for the linear system (41), which is determined by the invertibility of H in (42). We notice that when ϕ 1 = 0 , the first column of (45) and the first column of (46) are the same, which causes the matrix V h in (44) to be singular. Then, we conclude that H in (43) is singular if any ϕ j = 0 . In other words, by checking the invertibility of H , we can tell if there is any ϕ j = 0 for problem (37). If H in (42) is singular, our current method does not work. Fortunately we can modify our method to solve the problem for this special situation.
Let us assume that ϕ 0 = 0 , and the remaining ϕ j ’s are positive numbers. In this case, we modify (37) to
f ( x ) = c 0 e β x 2 + j = 1 M c j e β ( ϕ j x ) 2 + j = 1 M c j e β ( ϕ j + x ) 2 ,
and its corresponding Prony polynomial is defined as
Λ ( z ) = ( z 1 ) j = 1 M ( z e 2 h β ϕ j ) j = 1 M ( z e 2 h β ϕ j ) = l = 0 2 M + 1 λ l z l
with λ 2 M + 1 = 1 . Since Λ ( 1 ) = 0 , it leads to
l = 0 2 M + 1 λ l = 0 .
Then we can show that
l = 0 2 M + 1 λ l ( S K , ( l + m ) h f ) ( x 0 ) = 0 , for m = 0 , 1 , . . . , 2 M ,
because we can split the above left-hand-side summation into the following three summations with zero value each:
l = 0 2 M + 1 λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) c 0 e β ( x 0 + h ( l + m ) ) 2 = c 0 e β x 0 2 l = 0 2 M + 1 λ l = 0 = 0 ,
l = 0 2 M + 1 λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) j = 1 M c j e β ( ϕ j ( x 0 + h ( l + m ) ) ) 2 = j = 1 M c j e β ( x 0 + h m ϕ j ) 2 e β h m ( 2 x 0 + h m ) l = 0 2 M + 1 λ l e 2 β h l ϕ j = 0 = 0 ,
and
l = 0 2 M + 1 λ l e β h ( l + m ) ( 2 x 0 + h ( l + m ) ) j = 1 M c j e β ( ϕ j + ( x 0 + h ( l + m ) ) ) 2 = j = 1 M c j e β ( x 0 + h m + ϕ j ) 2 e β h m ( 2 x 0 + h m ) l = 0 2 M + 1 λ l e 2 β h l ϕ j = 0 = 0 .
The linear system (54) for λ : = [ λ 0 , . . . , λ 2 M ] T can be written as
H λ = G ,
with G : = ( S K , ( 2 M + m + 1 ) h f ) ( x 0 ) m = 0 2 M and
H : = ( S K , ( l + m ) h f ) ( x 0 ) l , m = 0 2 M .
We use ( 4 M + 2 ) sampling values: f ( x 0 + k h ) for k = 0 , 1 , , 4 M + 1 to solve the system. Similar to 43, we still have
H = V h D V h T ,
but we need to modify V h to
1 1 1 1 1 1 e 2 β h ϕ 1 e 2 β h ϕ M e 2 β h ϕ 1 e 2 β h ϕ M 1 e 4 M β h ϕ 1 e 4 M β h ϕ M e 4 M β h ϕ 1 e 4 M β h ϕ M ( 2 M + 1 ) × ( 2 M + 1 ) ,
which is invertible for positive distinct { ϕ 1 , , ϕ M } ( 0 , L ) , and the diagonal block matrix D becomes
D = c 0 e β x 0 2 0 0 0 D 1 0 0 0 D 2
with D 1 and D 2 maintaining the same forms of (48) and (49), respectively.
After we solve the linear system of (55), we obtain the Prony polynomial that contains one zero at z = 1 and the remaining zeros appear in pairs of ( z j , z j 1 ) ’s, which correspond to the parameter values 0 and ( ϕ j , ϕ j ) pairs. Finally, we will solve the following overdetermined linear system for c 0 , c 1 , , c M values
f ( x 0 + l h ) = c 0 e β ( x 0 l h ) 2 + j = 1 M c j e β ( ϕ j + x 0 l h ) 2 + e β ( ϕ j + x 0 + l h ) 2
for l = 0 , . . . , 4 M + 1 . From this example, we can see that the value of det ( H ) can give us some important information, that is, which of the two systems in (37) and (51) we should work on. This property could be useful when we consider a problem in which the M value in (51) is unknown, but restricted in certain range. (See discussion in Section 6).

5. Numerical Experiments

In this section, we use two simple examples to illustrate the implementation details of our method for the two-generator sparse expansion problem described in the previous sections. The first example is for version (23) in Section 3. The second example is for version (37) in Section 4.
Example 1.
We consider a function f ( x ) (see Figure 1) that is a two-generator expansion with each generator producing 5 terms in the following form
f ( x ) = j = 1 5 c j cos ( ϕ j x ) + j = 1 5 d j sin ( β j x ) ,
and the 20 parameters we used are listed in the table below to generate the sampling values.
How to use the 39 equispaced sampling values (where 39 comes from 4 ( 5 + 5 ) 1 ) in the form of f ( x 0 + k h ) , k = 19 , , 0 , , 19 to recover the original parameters in Table 1?
There are 20 original parameters in two sets: { c 1 , , c 5 , ϕ 1 , , ϕ 5 } and { d 1 , , d 5 , β 1 , , β 5 } corresponding to the two generators, respectively. To recover them, first we solve the following linear system for the coefficients of the Prony polynomial { λ 0 , , λ 9 } based on the Equation (29)
H λ = G ,
where
H = 36.3064 24.4399 35.5543 40.2183 16.8633 18.9503 0.7573 18.8146 4.4668 52.7171 24.4399 0.3760 7.8892 9.3455 10.6340 8.8103 18.8824 1.8548 16.9513 9.4925 35.5543 7.8892 26.5849 21.6951 17.3985 10.7019 6.1982 16.8834 12.1046 24.6062 40.218 39.3455 21.6951 18.5319 21.6273 20.0106 46.4677 20.1576 24.6741 11.4779 16.8633 10.6340 17.3985 21.6273 15.9198 14.1386 6.0512 4.9102 3.4249 17.8445 18.9503 8.8103 10.7019 20.0106 14.1386 29.8792 27.4189 29.6337 11.7398 2.7658 0.7573 18.8824 6.1982 46.4677 6.0512 27.4189 6.2967 20.5893 23.4431 32.0445 18.8146 1.8548 16.8834 20.1576 4.9102 29.6337 20.5893 12.4873 0.2846 0.1035 4.4668 16.9513 12.1046 24.6741 3.4249 11.7398 23.4431 0.2846 35.8269 11.5787 52.7171 9.4925 24.6062 11.4779 17.8445 2.7658 32.0445 0.1035 11.5787 9.3042
and
G = 0.0458 0.0218 0.0275 0.0347 0.0103 0.0048 0.0510 0.0405 0.0520 0.0412 T .
We obtain
λ = 0.0088 0.0275 0.0639 0.1254 0.2113 0.3180 0.4300 0.5316 0.6010 0.3135 T ,
which corresponds to the following Prony polynomial
Λ ( z ) = z 10 + 0.3135 z 9 0.6010 z 8 + 0.5316 z 7 0.4300 z 6 + 0.3180 z 5 0.2113 z 4 + 0.1254 z 3 0.0639 z 2 + 0.0275 z 0.0088 .
From the 10 zeros of this polynomial, we obtain 10 parameter values:
{ 11.0000 , 2.0000 , 3.0000 , 10.0000 , 4.0000 , 5.0000 , 9.0000 , 6.0000 , 7.0000 , 8.0000 } ,
which correspond to { ϕ 1 , , ϕ 5 , β 1 , , β 5 } , but the explicit order is unknown. We must resolve the ambiguity: What five parameter values are for { ϕ 1 , , ϕ 5 } (with the remaining five parameter values for { β 1 , , β 5 } )?
To separate the ϕ j ’s from β l ’s, we consider the following overdetermined linear system:
cos ( ϕ 1 x 0 ) cos ( ϕ 5 x 0 ) sin ( β 1 x 0 ) sin ( β 5 x 0 ) cos ( ϕ 1 x 1 ) cos ( ϕ 5 x 1 ) sin ( β 1 x 1 ) sin ( β 5 x 1 ) cos ( ϕ 1 x 19 ) cos ( ϕ 5 x 19 ) sin ( β 1 x 19 ) sin ( β 5 x 19 ) c 1 c 5 d 1 d 5 = f 0 f 1 f 19 ,
where we use the shorthand notations
x n = x 0 + n h and f n = f ( x 0 + n h )
for n = 0 , 1 , , 19 . Note: In this linear system, we only use 20 out of 39 original sampling values, which is adequate for this particular example. It is a trade-off issue between the accuracy of computation and the cost of computation (in time). In general, the more redundant equations we use, the more accuracy we can achieve in searching for the true solution. In other words, if we can obtain adequate accuracy, we focus on cutting the computation cost to the minimum. We do not solve this overdetermined linear system by the least-square method directly. We split these 20 equations into two parts: In the first part, we approximate the coefficients { c 1 , , c 5 , d 1 , , d 5 } in (60) by the least-square method. Then we apply these derived coefficients to the equations in the second part so as to filter out the true solution.
Among the 10 values in (59), every time we select 5 of them for { ϕ 1 , , ϕ 5 } , the remaining 5 numbers are automatically for { β 1 , β 5 } . We will have total 252 possible choices (which is the combinatorial number 10 5 ) as the candidates for the solution. Notice that this combinatorial number is a relatively big number. In order to speed up the processing, we reduce the redundant computation to the minimum. Let us use the notations { ϕ 1 i , , ϕ 5 i , β 1 i , β 5 i } with i = 1 , 2 , , 252 representing those 252 candidates. Our method is based on the property that the information given in the sampling values has a lot of redundancy for selecting the true solution, and we only use just enough information from the given sampling values so as to save the computation time.
First, when we calculate the coefficients { c 1 , , c 5 , d 1 , , d 5 } by the least-square method, we use exactly 10 equations (the same number of the coefficients) out of the 20 equations in (60). Based on our experiments, we do not have to use an overdetermined system for a good approximation by the least-square method. A determined system can give us excellent approximation for the least-square problem, while any underdetermined system usually does not approximate the data well through the least-square solution. For convenience, we select 10 consecutive equations in (60) somewhere in the middle, which we call the least-square block in our discussion, to approximate the coefficients { c 1 , , c 5 , d 1 , , d 5 } . Specifically, our least-square block takes the subscripts from 6 through 15, and the corresponding sampling values { f 6 , f 7 , , f 15 } should be selected as a reduced linear system given below,
cos ( ϕ 1 x 6 ) cos ( ϕ 5 x 6 ) sin ( β 1 x 6 ) sin ( β 5 x 6 ) cos ( ϕ 1 x 7 ) cos ( ϕ 5 x 7 ) sin ( β 1 x 7 ) sin ( β 5 x 7 ) cos ( ϕ 1 x 15 ) cos ( ϕ 5 x 15 ) sin ( β 1 x 15 ) sin ( β 5 x 15 ) c 1 c 5 d 1 d 5 = f 6 f 7 f 15 .
Even if our new linear system (61) is a determined system, we still solve it for a least-square solution, because the determinant of the square matrix in (61) could be very close to zero. Then the remaining equations in (60) together with the coefficients derived from (61) will be used to detect which candidate is the true solution based on the error information.
For each set of values { ϕ 1 i , , ϕ 5 i , β 1 i , , β 5 i } among the 252 candidates, the least-square solution for the linear system (61) would produce the 10 coefficients [ c 1 i , , c 5 i , d 1 i , , d 5 i ] T , and we evaluate the following vector
f 0 i f 1 i f 19 i : = cos ( ϕ 1 i x 0 ) cos ( ϕ 5 i x 0 ) sin ( β 1 i x 0 ) sin ( β 5 i x 0 ) cos ( ϕ 1 i x 1 ) cos ( ϕ 5 i x 1 ) sin ( β 1 i x 1 ) sin ( β 5 i x 1 ) cos ( ϕ 1 i x 19 ) cos ( ϕ 5 i x 19 ) sin ( β 1 i x 19 ) sin ( β 5 i x 19 ) c 1 i c 5 i d 1 i d 5 i ,
which is in general different from the original sampling vector [ f 0 , f 1 , , f 19 ] T . Then we will calculate the difference of these two vectors, and see how close they are. We define the error vector as follows:
ϵ 0 i ϵ 1 i ϵ 19 i : = | f 0 i f 0 | | f 1 i f 1 | | f 19 i f 19 | .
To search for the true solution among the 252 candidates, we discover an intrinsic property, shown in Figure 2 and Figure 3, that can clearly separate the true solution from other candidates.
In Figure 2, we plot the error vector for one of the 252 candidates to view its typical behavior. The error values in the least-square block (with subscripts from 6 to 15) are very close to zero for a typical candidate; however, the error values that are out of the least-square block (with subscripts from 0 to 5 and from 16 to 19) are not close to zero in general for a candidate that is not the true solution.
This behavior can be explained in this way: The errors in the least-square block are usually very small due to the fact that the least-square solution of the determined system approximates the targeting sampling values { f 6 , f 7 , , f 15 } quite well; however, when we consider an error for a sampling value out of the least-square block, since the corresponding equation is not involved in the least-square approximation, there is no reason for this equation to generate a value that is very close to the targeting sampling value.
While for the true solution case, the behavior is different in the sense that the errors for all the equations in the linear system (60) are very close to zero (see Figure 3, and ignore the two reference points at the ends). Let us summarize the key property that helps us to find out the true solution among all the candidates: For a candidate, if the coefficients generated from the determined linear system (61) by the least-square method cannot approximate just one sampling value out of the least-square block well, then it cannot be the true solution.
However, if the coefficients for one candidate can approximate one particular sampling value out of the least-square block well, we can only say that it is highly likely that this candidate could be the true solution, because the probability for a non-solution candidate to approximate some sampling value out of the least-square block well is very small. Based on this observation from our experiments, we design the following strategy for the solution search.
Strategy: Eliminate as many as possible candidates in the first round filtering in two steps: Step 1. Select a determined linear system from the overdetermined linear system in (60) (as the least-square block), and approximate the coefficients { c 1 , , c 5 , d 1 , , d 5 } by the least-square method for each of the 252 candidates. Step 2. Apply the derived coefficients in Step 1 on one of the linear equations out of the least-square block to approximate the targeting sampling value and calculate the error with the targeting sampling value. If the error is greater than certain threshold (we use 0.1 as our threshold), we drop this candidate from the consideration; otherwise, this candidate passes the first round filtering. If only one candidate survives the first round filtering, it must be the true solution. If more than one candidates pass the first round filtering, we need to do the second round filtering. In the second round filtering, we simply apply the derived coefficients on another linear equation out of the least-square block, and calculate the error for the targeting sampling value. If the error is greater than the threshold, we eliminate this candidate. We keep doing these cycles until we identify the true solution. Since we have plenty of redundant equations out of the least-square block, we should be able to determine the true solution without going through too many cycles in general. Furthermore, those linear equations corresponding to the original sampling values that are not included in the linear system (60) can still be used for the above steps when necessary, but the probability to use those equations out of the linear system (60) will be extremely small. This simple strategy is designed to allow us to detect the true solution without unnecessary computation, while we still preserve the option to use the redundant information when necessary.
Here we would like to point out that as soon as we select values in ϕ -group or β -group, the order of those values in each group is not important, because their corresponding coefficients ( c j ’s or d l ’s) will also be aligned with them accordingly when we solve the determined linear system (61) using the least-square method.
Example 2.
Our second function to be recovered has the following form
f ( ω ) = c 1 2 e 1 2 ( ϕ 1 ω ) 2 + e 1 2 ( ϕ 1 + ω ) 2 + c 2 2 e 1 2 ( ϕ 2 ω ) 2 + e 1 2 ( ϕ 2 + ω ) 2 + c 3 2 e 1 2 ( ϕ 3 ω ) 2 + e 1 2 ( ϕ 3 + ω ) 2 ,
which is derived by applying the STFT on the following function
g ( x ) = j = 1 3 c j cos ( ϕ j x ) ,
with the parameters of (64) listed in the following Table 2.
To solve this problem, we need to use 12 (i.e., 4 M ) sampling values. After we applied the method described in Section 4, we solved a linear system with 6 unknowns, and derived the Prony polynomial of degree 6 as follows
Λ ( z ) = 1.0000 ( z 6 + 1 ) 14.4845 ( z 5 + z ) + 65.9809 ( z 4 + z 2 ) + 108.8070 z 3 .
The symmetric structure of this polynomial tells us that its zeros appear in ( z j , z j 1 ) pairs for j = 1 , 2 , 3 , which correspond to three pairs of parameters: ( 1.0000 , 1.0000 ) , ( 3.0000 , 3.0000 ) , and ( 4.0000 , 4.0000 ) for ( ϕ j , ϕ j ) , j = 1 , 2 , 3 . Finally, we can solve another linear system for the coefficients c j ’s with the errors listed in the Table 3.

6. Conclusions

In this paper, we introduce a method that extends the Prony method to solve the two-generator sparse expansion problem. This method relies on the existence of a special linear operator for which the two generators must be the eigenfunctions. This two-generator problem has a special property: The zeros of its Prony polynomial correspond to two sets of parameters, and there is no straightforward way to separate them. We propose a two-stage least-square detection method on an overdetermined linear system for each candidate to extract the true solution, which relies on an intrinsic property for the true solution: Only the true solution can use the coefficients derived from the least-square block to approximate the targeting sampling values out of the least-square block well. Our method is designed to minimize the computation cost, while still maintain the computation accuracy.
It seems that the idea can be extended to the k-generator sparse expansion problem for k > 2 ; however, for the general k-generator case, the requirement that there exists a linear operator such that all the generators must be its eigenfunctions becomes extremely hard to achieve. For example, in the following sparse expansion problem,
f ( x ) = j = 1 M 1 c j cos ( ϕ j x ) + l = 1 M 2 d l e β l x ,
it is not easy to find a linear operator, such that both cos ( ϕ x ) and e β x are its eigenfunctions. One may argue that the problem could be solved by converting cos ( ϕ x ) to 1 2 ( e i ϕ x + e i ϕ x ) , and then it becomes a one-generator problem. Notice that converting a two-generator problem to a one-generator problem may not work most of the time. We are interested in developing a general method that can solve the two-generator sparse expansion problem including the one in (65). We can see that there are many difficult problems to be solved in this multi-generator sparse expansion problem, and we would like to see more researchers contribute in this direction.
Our method for the two-generator sparse expansion problem can handle certain degree of uncertainty. For example, in problem (23), if we know the total number of terms (i.e., the value of M 1 + M 2 ), but we do not know the number of terms in each summation (i.e., the individual values of M 1 and M 2 ), we can still solve the problem using our two-stage least-square detection method described in Section 3 and Section 5. If we increase the uncertainty a little more, can we still solve the problem?
For example, in the problem we considered in Section 4, if we do not know the exact number of terms (it is referred to unknown order of sparsity M in [1]) in the following expansion,
f ( x ) = j = 1 M c j e β ( ϕ j x ) 2 + j = 1 M c j e β ( ϕ j + x ) 2 ,
and we are given K equispaced sampling values for some positive integer K. If we are told that these sampling values are sufficient to recover the signal, how do we recover it? In other words, we know that the number of terms M is in the range 1 M K / 4 , but we do not know the exact number M, can we solve the problem? The answer is yes, because we can try all the possible cases: M = 1 , 2 , , K / 4 , and for each case, we apply our two-stage least-square detection method to tell us if the true solution can be extracted.
However, we are not satisfied with this kind of exhaustive search type solution due to its high cost. We plan to develop an efficient term number detection method, so that when we make a term number prediction, this method can tell us if it is correct or not immediately. In [1], two methods are proposed: One is based on the rank of the H matrix, and the other is based on the singular values of the H matrix. The main issue is: How to obtain a reliable method to determine the M value in the sparse expansion? Only after we obtain the correct term number we will pay the computation cost to go through all the necessary details to find the solution.

Author Contributions

Conceptualization, A.H. and W.H.; methodology, A.H. and W.H.; software, A.H. and W.H.; validation, A.H. and W.H.; formal analysis, A.H. and W.H.; investigation, A.H. and W.H.; resources, A.H. and W.H.; data curation, A.H. and W.H.; writing—original draft preparation, A.H. and W.H.; writing—review and editing, A.H. and W.H.; visualization, A.H. and W.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Peter, T. Generalized Prony Method. Ph.D. Thesis, University of Gottingen, Gottingen, Germany, 2014. [Google Scholar]
  2. Hussen, A.M. Recover Data in Sparse Expansion Forms Modeled by Special Basis Functions. Ph.D. Thesis, University of Missouri, St. Louis, MO, USA, 2019. Available online: https://irl.umsl.edu/dissertation/896 (accessed on 22 March 2022).
  3. Plonka, G.; Stampfer, K.; Keller, I. Reconstruction of Stationary and Non-stationary Signals by the Generalized Prony Method. Anal. Appl. 2019, 17, 179–210. [Google Scholar] [CrossRef]
  4. Plonka, G.; Wischerhoff, M. How many Fourier samples are needed for real function reconstruction? J. Appl. Math. Comput. 2013, 42, 117–137. [Google Scholar] [CrossRef] [Green Version]
  5. Beinert, R.; Plonka, G. Sparse phase retrieval of one-dimensional signals by Prony’s method. Front. Appl. Math. Stat. 2017, 3, 5. [Google Scholar] [CrossRef] [Green Version]
  6. Coluccio, L.; Eisinberg, A.; Fedele, G. A Prony-like method for non-uniform sampling. Signal Process. 2007, 87, 2484–2490. [Google Scholar] [CrossRef]
  7. Peter, T.; Plonka, G.; Schaback, R. Prony’s Method for Multivariate Signals. Proc. Appl. Math. Mech. 2015, 15, 665–666. [Google Scholar] [CrossRef]
  8. Peter, T.; Plonka, G.; Roşca, D. Representation of sparse Legendre expansions. J. Symb. Comput. 2013, 50, 159–169. [Google Scholar] [CrossRef]
  9. Peter, T.; Plonka, G. A generalized Prony method for reconstruction of sparse sums of eigenfunctions of linear operators. Inverse Prob. 2013, 29, 025001. [Google Scholar] [CrossRef] [Green Version]
  10. Peter, T.; Potts, D.; Tasche, M. Nonlinear approximation by sums of exponentials and translates. SIAM J. Sci. Comput. 2011, 33, 1920–1947. [Google Scholar] [CrossRef] [Green Version]
  11. Plonka, G.; Tasche, M. Prony methods for recovery of structured functions. GAMM Mitt. 2014, 37, 239–258. [Google Scholar] [CrossRef]
  12. Wischerhof, M. Reconstruction of Structured Functions From Sparse Fourier Data. Ph.D. Thesis, Niedersächsische Staats-und Universitätsbibliothek Göttingen, Göttingen, Germany, 2015. [Google Scholar]
Figure 1. The signal f ( x ) in (58) with 39 equispaced sampling values.
Figure 1. The signal f ( x ) in (58) with 39 equispaced sampling values.
Mca 27 00060 g001
Figure 2. Display the error vector for one of the 252 candidates.
Figure 2. Display the error vector for one of the 252 candidates.
Mca 27 00060 g002
Figure 3. Display the error vector for the true solution with two reference points at the ends.
Figure 3. Display the error vector for the true solution with two reference points at the ends.
Mca 27 00060 g003
Table 1. Original parameters of the function f ( x ) in (58).
Table 1. Original parameters of the function f ( x ) in (58).
j c j d j ϕ j β j
1−2523
23−645
3−4476
48−389
5721011
Table 2. Parameters of the function f ( x ) in (64).
Table 2. Parameters of the function f ( x ) in (64).
j c j ϕ j
1 0.5000 1.0000
2 0.2500 3.0000
3 1.0000 4.0000
Table 3. Parameters of the function f ( x ) in (64) and approximate errors using 12 sampling values with h = 0.5 .
Table 3. Parameters of the function f ( x ) in (64) and approximate errors using 12 sampling values with h = 0.5 .
j c j ϕ j | c j c j * | | ϕ j ϕ j * |
10.50001.0000 3.7970 . 10 2 5.2824 . 10 13
20.25003.0000 5.0987 . 10 14 4.5652 . 10 13
31.00004.0000 5.8065 . 10 14 1.4211 . 10 14
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hussen, A.; He, W. Prony Method for Two-Generator Sparse Expansion Problem. Math. Comput. Appl. 2022, 27, 60. https://doi.org/10.3390/mca27040060

AMA Style

Hussen A, He W. Prony Method for Two-Generator Sparse Expansion Problem. Mathematical and Computational Applications. 2022; 27(4):60. https://doi.org/10.3390/mca27040060

Chicago/Turabian Style

Hussen, Abdulmtalb, and Wenjie He. 2022. "Prony Method for Two-Generator Sparse Expansion Problem" Mathematical and Computational Applications 27, no. 4: 60. https://doi.org/10.3390/mca27040060

Article Metrics

Back to TopTop