SlideShare a Scribd company logo
DIGITAL SIGNAL PROCESSING

    OVERLAP-ADD METHOD &
    OVERLAP-SAVE METHOD
Contents

ď‚—   Filtering Long Duration Sequences



ď‚—   Overlap-Save Method
Filtering Long Duration
Sequences
  ď‚—   An input sequence x(n) is of long duration
      is to be processed with a system having
      impulse response of finite duration by
      convolving two sequences. Because of the
      length of the input sequences, it’s not
      practical to store it all before performing
      linear convolution. Therefore input
      sequences are divided into blocks. Two
      methods commonly used for filtering the
      sectioned data and combining results are
      the overlap-save method and overlap–add
      method.
Overlap-Save Method
ď‚—   Let the length of input sequence is LS and the
    length of the impulse response is M. Here the
    input is divided into blocks of data of size N=L+M-
    1. Each block consists of last (M-1) data points of
    previous block followed by L new data points to
    form data sequence of N=L+M-1. For first block of
    data the first M-1points are set to zero. The blocks
    of data sequence are

    x1(n)= {0,0,0,….,0,x(0),x(n),…..,x(L-1)}

           (M-1)Zeros
   x2(n) = {x (L-M+1… x (L-1), x (L),….x(2L-1)}


       Last (M-1) data       L new data
        points from x1(n)    points


   x3(n) = {x(2L-M+1,….,,x(2L-1),x(2L),….x(3L-1)}


             Last (M-1) data   L new data
             points from x2(n) points
ď‚—   The impulse response of the FIR filter is increased in
    length by appending L-1 -zeros and an N-point
    circular convolution of xi(n)with h(n) is computed.

    i.e. yi(n)=xi(n) N   h(n)

ď‚—   In yi(n), the first (M-1)pts will not agree with the
    linear convolution of xi(n) and h(n) because of
    aliasing, while the remaining pts are identical to the
    linear convolution. Hence we discard the first

        M-1 pts of the filtered section xi(n)    h(n).
                                            N
ď‚—   For example, let the length of sequence LS=15 and
    the length of the impulse response is 3. Let length
    of each block is 5.

ď‚—   Now the input sequence can be divided into blocks
    as
    x1(n)={0,0,x(0),x(1),x(2)}

       M-1 = 2 Zeros
x2(n)={x(1),x(2),x(3),x(4),x(5)}

           Last two data points from previous block



x3(n)={x(4),x(5),x(6),x(7),x(8)}

x4(n)={x(7),x(8),x(9),x(10),x(11)}

x5(n)={x(10),x(11),x(12),x(13),x(14)}

x6(n)={ x(13),x(14),0,0,0}
ď‚— Now we perform 5 point convolution of xi(n) and
  h(n) by appending two zeros to the sequences
  h(n). In the output block yi(n), first M-1 pts are
  corrupted and must be discarded.
y1(n)=x1(n) N h(n)={y1(0),y1(1),y1(2),y1(3),y1(4)}

                       discard

y2(n)=x2(n) N h(n) ={y2(0),y2(1),y2(2),y2(3),y2(4)}

                        discard
y3(n)=x3(n) N h(n) = {y3(0),y3(1),y3(2),y3(3),y3(4)}

                          discard



y4(n)=x4(n) N h(n) = {y4(0),y4(1),y4(2),y4(3),y4(4)}

                          discard

y5(n)=x5(n) N h(n) = y5(0),y5(1),y5(2),y5(3),y5(4)}

                        discard
y6(n)=x6(n)   N   h(n) = {y6(0),y6(1) y6(2) y6(3),0}

                            discard

ď‚—   The output blocks are abutted together to get

y(n) ={ y1(2),y1(3),y1(4),y2(2),y2(3),y2(4),
        y3(2),y3(3),y3(4), y4(2),y4(3),y4(4),
        y5(2),y5(3),y5(4), y6(2),y6(3)}
Digital signal processing

More Related Content

What's hot

Linear block coding
Linear block codingLinear block coding
Linear block coding
jknm
 
Channel Capacity and transmission media
Channel Capacity and transmission mediaChannel Capacity and transmission media
Channel Capacity and transmission media
Hemant Chetwani
 
Channel capacity
Channel capacityChannel capacity
Channel capacity
PALLAB DAS
 
Amplitude shift keying (ask)
Amplitude shift keying (ask)Amplitude shift keying (ask)
Amplitude shift keying (ask)
MOHAN MOHAN
 
Digital transmission
Digital transmissionDigital transmission
Digital transmissionSarah Krystelle
 
Ssb generation method
Ssb generation methodSsb generation method
Ssb generation method
jahirpatel
 
Cellular Network -Ground Reflectio (Two Ray) Model.pdf
Cellular Network -Ground Reflectio (Two Ray) Model.pdfCellular Network -Ground Reflectio (Two Ray) Model.pdf
Cellular Network -Ground Reflectio (Two Ray) Model.pdf
vpshinde1
 
Applications of digital signal processing
Applications of digital signal processing Applications of digital signal processing
Applications of digital signal processing Rajeev Piyare
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
Srinivasa Rao
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
JAIGANESH SEKAR
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codesManish Srivastava
 
Chapter 1 - Digital Telecommunication
Chapter 1 - Digital TelecommunicationChapter 1 - Digital Telecommunication
Chapter 1 - Digital Telecommunication
Anang Aris Widodo
 
MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)
NARENDRA KUMAR REDDY
 
Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
naimish12
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
Priya Kaushal
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadManish Srivastava
 
Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Laurens Luis Bugayong
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
Characterization of the Wireless Channel
Characterization of the Wireless ChannelCharacterization of the Wireless Channel
Characterization of the Wireless Channel
Suraj Katwal
 

What's hot (20)

Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Channel Capacity and transmission media
Channel Capacity and transmission mediaChannel Capacity and transmission media
Channel Capacity and transmission media
 
Channel capacity
Channel capacityChannel capacity
Channel capacity
 
Amplitude shift keying (ask)
Amplitude shift keying (ask)Amplitude shift keying (ask)
Amplitude shift keying (ask)
 
Digital transmission
Digital transmissionDigital transmission
Digital transmission
 
Ssb generation method
Ssb generation methodSsb generation method
Ssb generation method
 
Cellular Network -Ground Reflectio (Two Ray) Model.pdf
Cellular Network -Ground Reflectio (Two Ray) Model.pdfCellular Network -Ground Reflectio (Two Ray) Model.pdf
Cellular Network -Ground Reflectio (Two Ray) Model.pdf
 
Applications of digital signal processing
Applications of digital signal processing Applications of digital signal processing
Applications of digital signal processing
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codes
 
Chapter 1 - Digital Telecommunication
Chapter 1 - Digital TelecommunicationChapter 1 - Digital Telecommunication
Chapter 1 - Digital Telecommunication
 
MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)
 
Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spread
 
Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Characterization of the Wireless Channel
Characterization of the Wireless ChannelCharacterization of the Wireless Channel
Characterization of the Wireless Channel
 

Similar to Digital signal processing

Overlap save method and overlap add method in dsp
Overlap save method and overlap add method in dspOverlap save method and overlap add method in dsp
Overlap save method and overlap add method in dsp
chitra raju
 
Ecte401 notes week3
Ecte401 notes week3Ecte401 notes week3
Ecte401 notes week3subhasree konar
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
5_2019_02_01!09_42_56_PM.pptx
5_2019_02_01!09_42_56_PM.pptx5_2019_02_01!09_42_56_PM.pptx
5_2019_02_01!09_42_56_PM.pptx
ShalabhMishra10
 
DSP_DiscSignals_LinearS_150417.pptx
DSP_DiscSignals_LinearS_150417.pptxDSP_DiscSignals_LinearS_150417.pptx
DSP_DiscSignals_LinearS_150417.pptx
HamedNassar5
 
Interpolation techniques - Background and implementation
Interpolation techniques - Background and implementationInterpolation techniques - Background and implementation
Interpolation techniques - Background and implementation
Quasar Chunawala
 
Unit 1 Operation on signals
Unit 1  Operation on signalsUnit 1  Operation on signals
Unit 1 Operation on signals
Dr.SHANTHI K.G
 
A numerical method to solve fractional Fredholm-Volterra integro-differential...
A numerical method to solve fractional Fredholm-Volterra integro-differential...A numerical method to solve fractional Fredholm-Volterra integro-differential...
A numerical method to solve fractional Fredholm-Volterra integro-differential...
OctavianPostavaru
 
Phase-Type Distributions for Finite Interacting Particle Systems
Phase-Type Distributions for Finite Interacting Particle SystemsPhase-Type Distributions for Finite Interacting Particle Systems
Phase-Type Distributions for Finite Interacting Particle Systems
Stefan Eng
 
Numarical values
Numarical valuesNumarical values
Numarical values
AmanSaeed11
 
Numarical values highlighted
Numarical values highlightedNumarical values highlighted
Numarical values highlighted
AmanSaeed11
 
Dsp GA (1).pptx
Dsp GA (1).pptxDsp GA (1).pptx
Dsp GA (1).pptx
bhavanags5
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02
Rediet Moges
 
Dsp manual
Dsp manualDsp manual
Dsp manual
pramod naik
 
Composed short m sequences
Composed short m sequencesComposed short m sequences
Composed short m sequences
IAEME Publication
 
Dynamical systems solved ex
Dynamical systems solved exDynamical systems solved ex
Dynamical systems solved ex
Maths Tutoring
 
Convolution discrete and continuous time-difference equaion and system proper...
Convolution discrete and continuous time-difference equaion and system proper...Convolution discrete and continuous time-difference equaion and system proper...
Convolution discrete and continuous time-difference equaion and system proper...
Vinod Sharma
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
MdFazleRabbi18
 
Digital signal processing on arm new
Digital signal processing on arm newDigital signal processing on arm new
Digital signal processing on arm new
Israel Gbati
 
Dsp3
Dsp3Dsp3

Similar to Digital signal processing (20)

Overlap save method and overlap add method in dsp
Overlap save method and overlap add method in dspOverlap save method and overlap add method in dsp
Overlap save method and overlap add method in dsp
 
Ecte401 notes week3
Ecte401 notes week3Ecte401 notes week3
Ecte401 notes week3
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
5_2019_02_01!09_42_56_PM.pptx
5_2019_02_01!09_42_56_PM.pptx5_2019_02_01!09_42_56_PM.pptx
5_2019_02_01!09_42_56_PM.pptx
 
DSP_DiscSignals_LinearS_150417.pptx
DSP_DiscSignals_LinearS_150417.pptxDSP_DiscSignals_LinearS_150417.pptx
DSP_DiscSignals_LinearS_150417.pptx
 
Interpolation techniques - Background and implementation
Interpolation techniques - Background and implementationInterpolation techniques - Background and implementation
Interpolation techniques - Background and implementation
 
Unit 1 Operation on signals
Unit 1  Operation on signalsUnit 1  Operation on signals
Unit 1 Operation on signals
 
A numerical method to solve fractional Fredholm-Volterra integro-differential...
A numerical method to solve fractional Fredholm-Volterra integro-differential...A numerical method to solve fractional Fredholm-Volterra integro-differential...
A numerical method to solve fractional Fredholm-Volterra integro-differential...
 
Phase-Type Distributions for Finite Interacting Particle Systems
Phase-Type Distributions for Finite Interacting Particle SystemsPhase-Type Distributions for Finite Interacting Particle Systems
Phase-Type Distributions for Finite Interacting Particle Systems
 
Numarical values
Numarical valuesNumarical values
Numarical values
 
Numarical values highlighted
Numarical values highlightedNumarical values highlighted
Numarical values highlighted
 
Dsp GA (1).pptx
Dsp GA (1).pptxDsp GA (1).pptx
Dsp GA (1).pptx
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02
 
Dsp manual
Dsp manualDsp manual
Dsp manual
 
Composed short m sequences
Composed short m sequencesComposed short m sequences
Composed short m sequences
 
Dynamical systems solved ex
Dynamical systems solved exDynamical systems solved ex
Dynamical systems solved ex
 
Convolution discrete and continuous time-difference equaion and system proper...
Convolution discrete and continuous time-difference equaion and system proper...Convolution discrete and continuous time-difference equaion and system proper...
Convolution discrete and continuous time-difference equaion and system proper...
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
 
Digital signal processing on arm new
Digital signal processing on arm newDigital signal processing on arm new
Digital signal processing on arm new
 
Dsp3
Dsp3Dsp3
Dsp3
 

More from ReachLocal Services India

Excel ppt
Excel pptExcel ppt
Virtual reality
Virtual realityVirtual reality
Virtual reality
ReachLocal Services India
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
System security
System securitySystem security
System security
ReachLocal Services India
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
ReachLocal Services India
 

More from ReachLocal Services India (12)

Excel ppt
Excel pptExcel ppt
Excel ppt
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
System security
System securitySystem security
System security
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Loop invariant computation
Loop invariant computationLoop invariant computation
Loop invariant computation
 
Distributed dbms
Distributed dbmsDistributed dbms
Distributed dbms
 
Sexual harresment on women
Sexual harresment on womenSexual harresment on women
Sexual harresment on women
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Regular expression (compiler)
Regular expression (compiler)Regular expression (compiler)
Regular expression (compiler)
 
Temporal data mining
Temporal data miningTemporal data mining
Temporal data mining
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Digital signal processing

  • 1. DIGITAL SIGNAL PROCESSING OVERLAP-ADD METHOD & OVERLAP-SAVE METHOD
  • 2. Contents ď‚— Filtering Long Duration Sequences ď‚— Overlap-Save Method
  • 3. Filtering Long Duration Sequences ď‚— An input sequence x(n) is of long duration is to be processed with a system having impulse response of finite duration by convolving two sequences. Because of the length of the input sequences, it’s not practical to store it all before performing linear convolution. Therefore input sequences are divided into blocks. Two methods commonly used for filtering the sectioned data and combining results are the overlap-save method and overlap–add method.
  • 4. Overlap-Save Method ď‚— Let the length of input sequence is LS and the length of the impulse response is M. Here the input is divided into blocks of data of size N=L+M- 1. Each block consists of last (M-1) data points of previous block followed by L new data points to form data sequence of N=L+M-1. For first block of data the first M-1points are set to zero. The blocks of data sequence are x1(n)= {0,0,0,….,0,x(0),x(n),…..,x(L-1)} (M-1)Zeros
  • 5. ď‚— x2(n) = {x (L-M+1… x (L-1), x (L),….x(2L-1)} Last (M-1) data L new data points from x1(n) points ď‚— x3(n) = {x(2L-M+1,….,,x(2L-1),x(2L),….x(3L-1)} Last (M-1) data L new data points from x2(n) points
  • 6. ď‚— The impulse response of the FIR filter is increased in length by appending L-1 -zeros and an N-point circular convolution of xi(n)with h(n) is computed. i.e. yi(n)=xi(n) N h(n) ď‚— In yi(n), the first (M-1)pts will not agree with the linear convolution of xi(n) and h(n) because of aliasing, while the remaining pts are identical to the linear convolution. Hence we discard the first M-1 pts of the filtered section xi(n) h(n). N
  • 7. ď‚— For example, let the length of sequence LS=15 and the length of the impulse response is 3. Let length of each block is 5. ď‚— Now the input sequence can be divided into blocks as x1(n)={0,0,x(0),x(1),x(2)} M-1 = 2 Zeros
  • 8. x2(n)={x(1),x(2),x(3),x(4),x(5)} Last two data points from previous block x3(n)={x(4),x(5),x(6),x(7),x(8)} x4(n)={x(7),x(8),x(9),x(10),x(11)} x5(n)={x(10),x(11),x(12),x(13),x(14)} x6(n)={ x(13),x(14),0,0,0}
  • 9. ď‚— Now we perform 5 point convolution of xi(n) and h(n) by appending two zeros to the sequences h(n). In the output block yi(n), first M-1 pts are corrupted and must be discarded. y1(n)=x1(n) N h(n)={y1(0),y1(1),y1(2),y1(3),y1(4)} discard y2(n)=x2(n) N h(n) ={y2(0),y2(1),y2(2),y2(3),y2(4)} discard
  • 10. y3(n)=x3(n) N h(n) = {y3(0),y3(1),y3(2),y3(3),y3(4)} discard y4(n)=x4(n) N h(n) = {y4(0),y4(1),y4(2),y4(3),y4(4)} discard y5(n)=x5(n) N h(n) = y5(0),y5(1),y5(2),y5(3),y5(4)} discard
  • 11. y6(n)=x6(n) N h(n) = {y6(0),y6(1) y6(2) y6(3),0} discard ď‚— The output blocks are abutted together to get y(n) ={ y1(2),y1(3),y1(4),y2(2),y2(3),y2(4), y3(2),y3(3),y3(4), y4(2),y4(3),y4(4), y5(2),y5(3),y5(4), y6(2),y6(3)}