SlideShare a Scribd company logo
OVERLAP SAVE
OVERLAP ADD
METHOD
Gourab Chandra Ghosh
Surendra Institute of Engineering &
Management
CONTENTS:
1. Why overlap save & overlap add method ?
2. Steps to perform overlap save method.
3. Example of overlap save method.
4. Steps to perform overlap add method.
5. Example of overlap add method.
6. Difference between overlap save & add method.
7. Reference
8. Q & A
2
FILTERING USING DFT:
1. In practical application we often come across linear filtering of long
data sequences.
2. DFT involves operation on block of data.
3. The block size of data should minimum because digital processors
have limited memory.
4. Two methods of filtering:
3
FILTERING USING DFT:
1. In practical application we often come across linear filtering of long
data sequences.
2. DFT involves operation on block of data.
3. The block size of data should minimum because digital processors
have limited memory.
4. Two methods of filtering:
 OVERLAP SAVE METHOD
 OVERLAP ADD METHOD
4
5
OVERLAP SAVE METHOD
STEP-1:
Determine length ‘M’, which is the length of the impulse
response data sequences i.e. h[n] & determine ‘M-1’.
STEP-2:
Given input sequence x[n] size of DFT is ‘N’.
let assume, N=5
6
OVERLAP SAVE METHOD
STEP-3:
Determine the length of the new data, ‘L’
=> N=(L+M-1)
STEP-4:
Pad ‘L-1’ zeros to h[n]
7
OVERLAP SAVE METHOD
STEP-3:
Determine the length of the blocks, ‘L’
STEP-4:
Pad ‘L-1’ zeros to h[n]
8
h[n] ‘L-1’ zeros (padded)
OVERLAP SAVE METHOD
Input Data Sequence x[n]
9
x1[n]
x2[n]
x4[n]
x3[n]
M-1 zeros
M-1 data
M-1 data
M-1 data
L L LL
OVERLAP SAVE METHOD
STEP-4:
Perform Circular Convolution of h[n] & blocks of x[n]
i.e. y1[n]= x1[n] h[n]
y2[n]= x2[n] h[n]
y3[n]= x3[n] h[n]
y4[n]= x4[n] h[n]
10
N
N
N
N
OVERLAP SAVE METHOD
11
y1[n]
y2[n]
y4[n]
y3[n]
M-1 data
M-1 data
M-1 data
M-1 data
X
X
X
X
X=> discard
OVERLAP SAVE METHOD
12
y1[n]
y2[n]
y4[n]
y3[n]
M-1 data
M-1 data
M-1 data
Final Output Data Sequence y[n]
M-1 data
X
X
X
X
X=> discard
OVERLAP SAVE EXAMPLE
Ques. Given x[n]={3,-1,0,1,3,2,0,1,2,1} & h[n]={1,1,1}
 Let, N=5
Length of h[n], M= 3
Therefore, M-1= 2
We know,
 N=(L+M-1)
 5=L+3-1
 L=3
∴Pad L-1=2 zeros with h[n] i.e. h[n]={1,1,1,0,0}
13
OVERLAP SAVE EXAMPLE
3 -1 0 1 3 2 0 1 2 1
14
0 0 3 -1 0
-1 0 1 3 2
3 2 0 1 2
1 2 1 0 0
x1[n]
x2[n]
x4[n]
x3[n]
M-1(=2) no. of previous data
L(=3) no. of new data
OVERLAP SAVE EXAMPLE
Performing yk[n]= xk[n] h[n], where k=1,2,3,4
1. y1[n]= {-1,0,3,2,2}
2. y2[n]= {4,1,0,4,6}
3. y3[n]= {6,7,5,3,3}
4. y4[n]= {1,3,4,3,1}
15
N
OVERLAP SAVE EXAMPLE
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
16
3 2 2
0 4 6
5 3 3
4 3 1
-1 0
4 1
6 7
1 3
X=> discard
X
X
X
X
n-
y1[n]
y1[n]
y1[n]
y1[n]
OVERLAP SAVE EXAMPLE
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
17
3 2 2
0 4 6
5 3 3
4 3 1
-1 0
4 1
6 7
1 3
X=> discard
X
X
X
X
n-
y1[n]
y1[n]
y1[n]
y1[n]
y[n] 3 2 2
OVERLAP SAVE EXAMPLE
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
18
3 2 2
0 4 6
5 3 3
4 3 1
-1 0
4 1
6 7
1 3
X=> discard
X
X
X
X
n-
y1[n]
y1[n]
y1[n]
y1[n]
y[n] 3 2 2 0 4 6
OVERLAP SAVE EXAMPLE
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
19
3 2 2
0 4 6
5 3 3
4 3 1
-1 0
4 1
6 7
1 3
X=> discard
X
X
X
X
n-
y1[n]
y1[n]
y1[n]
y1[n]
y[n] 3 2 2 0 4 6 5 3 3
OVERLAP SAVE EXAMPLE
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
20
3 2 2
0 4 6
5 3 3
4 3 1
-1 0
4 1
6 7
1 3
X=> discard
X
X
X
X
n-
y1[n]
y1[n]
y1[n]
y1[n]
y[n] 3 2 2 0 4 6 5 3 3 4 3 1
21
OVERLAP ADD METHOD
STEP-1:
Determine length ‘M’, which is the length of the impulse
response data sequences i.e. h[n] & determine ‘M-1’.
STEP-2:
Given input sequence x[n] size of DFT is ‘N’.
let assume, N=5
22
OVERLAP ADD METHOD
STEP-3:
Determine the length of the new data, ‘L’
STEP-4:
Pad ‘M-1’ zeros to xk[n]
Pad ‘L-1’ zeros to h[n]
23
xk[n] ‘M-1’ zeros (padded)
h[n] ‘L-1’ zeros (padded)
OVERLAP ADD METHOD
Input Data Sequence x[n]
24
x1[n]
x2[n]
x4[n]
x3[n]
M-1 zeros
M-1 zeros
M-1 zeros
M-1 zeros
L L LL
OVERLAP ADD METHOD
STEP-4:
Perform Circular Convolution of h[n] & blocks of x[n]
i.e. y1[n]= x1[n] h[n]
y2[n]= x2[n] h[n]
y3[n]= x3[n] h[n]
y4[n]= x4[n] h[n]
25
N
N
N
N
OVERLAP ADD METHOD
26
y1[n]
y2[n]
y4[n]
y3[n]
M-1 data
M-1 data
M-1 data
Final Output Data Sequence y[n]
M-1 data
add
add
add
OVERLAP ADD EXAMPLE
Ques. Given x[n]={3,-1,0,1,3,2,0,1,2,1} & h[n]={1,1,1}
 Let, N=5
Length of h[n], M= 3
Therefore, M-1= 2
We know,
 N=(L+M-1)
 5=L+3-1
 L=3
∴Pad L-1=2 zeros with h[n] i.e. h[n]={1,1,1,0,0}
27
OVERLAP ADD EXAMPLE
3 -1 0 1 3 2 0 1 2 1
28
3 -1 0
1 3 2
0 1 2
1 0 0
x1[n]
x2[n]
x4[n]
x3[n]
M-1(=2) no. of zeros
L(=3) no. of new data
Input sequence x[n]
0 0
0 0
0 0
0 0
OVERLAP ADD EXAMPLE
Performing yk[n]= xk[n] h[n], where k=1,2,3,4
1. y1[n]= {3,2,2,-1,0}
2. y2[n]= {1,4,6,5,2}
3. y3[n]= {0,1,3,3,2}
4. y4[n]= {1,1,1,0,0}
29
N
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
30
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2y[n]
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
31
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2 0 4 6y[n]
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
32
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2 0 4 6 5 3 3y[n]
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
33
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2 0 4 6 5 3 3 4 3y[n]
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
34
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2 0 4 6 5 3 3 4 3 1 0 0y[n]
OVERLAP ADD EXAMPLE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
35
3 2 2
6 5 2
3 3 2
1 0 0
-1 0
1 4
0 1
1 1
+=> add
+
n-
y1[n]
y1[n]
y1[n]
y1[n]
+
++
++
3 2 2 0 4 6 5 3 3 4 3 1 0 0y[n]
OVERLAP SAVE vs ADD
METHOD
Overlap Save
 Overlapped values has to be
discarded.
 It does not require any addition.
 It can be computed using linear
convolution
Overlap Add
 Overlapped values has to be
added.
 It will involve adding a number
of values in the output.
 Linear convolution is not
applicable here.
36
CONCLUSION:
37
 Overlap Add and Save methods are almost similar.
 From the differences one can choose any of the
methods, which is suitable at that time.
REFERENCE:
 Digital Signal Processing - P. Rameshbabu
 Discrete Time Signal Processing - Oppenheim & Schafer
38
39

More Related Content

What's hot

Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
naimish12
 
Serial Communication in 8051
Serial Communication in 8051Serial Communication in 8051
Serial Communication in 8051
Sudhanshu Janwadkar
 
Lecture 5: The Convolution Sum
Lecture 5: The Convolution SumLecture 5: The Convolution Sum
Lecture 5: The Convolution Sum
Jawaher Abdulwahab Fadhil
 
Decimation in time and frequency
Decimation in time and frequencyDecimation in time and frequency
Decimation in time and frequency
SARITHA REDDY
 
Lti system
Lti systemLti system
Lti system
Fariza Zahari
 
Nyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channelNyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channel
PriyangaKR1
 
Digital Communication: Information Theory
Digital Communication: Information TheoryDigital Communication: Information Theory
Digital Communication: Information Theory
Dr. Sanjay M. Gulhane
 
Fast Fourier Transform
Fast Fourier TransformFast Fourier Transform
Fast Fourier Transform
op205
 
Shifters
ShiftersShifters
Multirate DSP
Multirate DSPMultirate DSP
Multirate DSP
@zenafaris91
 
Sampling theorem
Sampling theoremSampling theorem
Sampling theorem
Shanu Bhuvana
 
Discrete fourier transform
Discrete fourier transformDiscrete fourier transform
Discrete fourier transform
MOHAMMAD AKRAM
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filters
op205
 
Chapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant SystemChapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant System
Attaporn Ninsuwan
 
Properties of dft
Properties of dftProperties of dft
Properties of dft
tamil arasan
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
Dr.YNM
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulation
Ahmed Diaa
 
Solved problems in waveguides
Solved problems in waveguidesSolved problems in waveguides
Solved problems in waveguides
subhashinivec
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
MdFazleRabbi18
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Naveen Jakhar, I.T.S
 

What's hot (20)

Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
 
Serial Communication in 8051
Serial Communication in 8051Serial Communication in 8051
Serial Communication in 8051
 
Lecture 5: The Convolution Sum
Lecture 5: The Convolution SumLecture 5: The Convolution Sum
Lecture 5: The Convolution Sum
 
Decimation in time and frequency
Decimation in time and frequencyDecimation in time and frequency
Decimation in time and frequency
 
Lti system
Lti systemLti system
Lti system
 
Nyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channelNyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channel
 
Digital Communication: Information Theory
Digital Communication: Information TheoryDigital Communication: Information Theory
Digital Communication: Information Theory
 
Fast Fourier Transform
Fast Fourier TransformFast Fourier Transform
Fast Fourier Transform
 
Shifters
ShiftersShifters
Shifters
 
Multirate DSP
Multirate DSPMultirate DSP
Multirate DSP
 
Sampling theorem
Sampling theoremSampling theorem
Sampling theorem
 
Discrete fourier transform
Discrete fourier transformDiscrete fourier transform
Discrete fourier transform
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filters
 
Chapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant SystemChapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant System
 
Properties of dft
Properties of dftProperties of dft
Properties of dft
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulation
 
Solved problems in waveguides
Solved problems in waveguidesSolved problems in waveguides
Solved problems in waveguides
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 

Similar to Overlap Add, Overlap Save(digital signal processing)

Overlapadd using convolution
Overlapadd using convolutionOverlapadd using convolution
Overlapadd using convolution
MeghaThakur26
 
LINEAR SYSTEMS
LINEAR SYSTEMSLINEAR SYSTEMS
LINEAR SYSTEMS
JazzieJao1
 
ch3-3
ch3-3ch3-3
Lecture#9
Lecture#9Lecture#9
Lecture#9
Ali Shah
 
Lecture 3 complexity
Lecture 3 complexityLecture 3 complexity
Lecture 3 complexity
Madhu Niket
 
Algorithm And analysis Lecture 03& 04-time complexity.
 Algorithm And analysis Lecture 03& 04-time complexity. Algorithm And analysis Lecture 03& 04-time complexity.
Algorithm And analysis Lecture 03& 04-time complexity.
Tariq Khan
 
Time complexity.ppt
Time complexity.pptTime complexity.ppt
Time complexity.ppt
YekoyeTigabuYeko
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
Sajid Marwat
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Introduction to data structures and complexity.pptx
Introduction to data structures and complexity.pptxIntroduction to data structures and complexity.pptx
Introduction to data structures and complexity.pptx
PJS KUMAR
 
1520 differentiation-l1
1520 differentiation-l11520 differentiation-l1
1520 differentiation-l1
Dr Fereidoun Dejahang
 
Department of MathematicsMTL107 Numerical Methods and Com.docx
Department of MathematicsMTL107 Numerical Methods and Com.docxDepartment of MathematicsMTL107 Numerical Methods and Com.docx
Department of MathematicsMTL107 Numerical Methods and Com.docx
salmonpybus
 
Introduction to the AKS Primality Test
Introduction to the AKS Primality TestIntroduction to the AKS Primality Test
Introduction to the AKS Primality Test
Pranshu Bhatnagar
 
Chapter2.3
Chapter2.3Chapter2.3
Chapter2.3
nglaze10
 
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
Michael Lie
 
Unit 2 in daa
Unit 2 in daaUnit 2 in daa
Unit 2 in daa
Nv Thejaswini
 
algorithm Unit 2
algorithm Unit 2 algorithm Unit 2
algorithm Unit 2
Monika Choudhery
 
ch2-1
ch2-1ch2-1
Quantum factorization.pdf
Quantum factorization.pdfQuantum factorization.pdf
Quantum factorization.pdf
ssuser8b461f
 
Matlab polynimials and curve fitting
Matlab polynimials and curve fittingMatlab polynimials and curve fitting
Matlab polynimials and curve fitting
Ameen San
 

Similar to Overlap Add, Overlap Save(digital signal processing) (20)

Overlapadd using convolution
Overlapadd using convolutionOverlapadd using convolution
Overlapadd using convolution
 
LINEAR SYSTEMS
LINEAR SYSTEMSLINEAR SYSTEMS
LINEAR SYSTEMS
 
ch3-3
ch3-3ch3-3
ch3-3
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
 
Lecture 3 complexity
Lecture 3 complexityLecture 3 complexity
Lecture 3 complexity
 
Algorithm And analysis Lecture 03& 04-time complexity.
 Algorithm And analysis Lecture 03& 04-time complexity. Algorithm And analysis Lecture 03& 04-time complexity.
Algorithm And analysis Lecture 03& 04-time complexity.
 
Time complexity.ppt
Time complexity.pptTime complexity.ppt
Time complexity.ppt
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Introduction to data structures and complexity.pptx
Introduction to data structures and complexity.pptxIntroduction to data structures and complexity.pptx
Introduction to data structures and complexity.pptx
 
1520 differentiation-l1
1520 differentiation-l11520 differentiation-l1
1520 differentiation-l1
 
Department of MathematicsMTL107 Numerical Methods and Com.docx
Department of MathematicsMTL107 Numerical Methods and Com.docxDepartment of MathematicsMTL107 Numerical Methods and Com.docx
Department of MathematicsMTL107 Numerical Methods and Com.docx
 
Introduction to the AKS Primality Test
Introduction to the AKS Primality TestIntroduction to the AKS Primality Test
Introduction to the AKS Primality Test
 
Chapter2.3
Chapter2.3Chapter2.3
Chapter2.3
 
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
Time-Series Analysis on Multiperiodic Conditional Correlation by Sparse Covar...
 
Unit 2 in daa
Unit 2 in daaUnit 2 in daa
Unit 2 in daa
 
algorithm Unit 2
algorithm Unit 2 algorithm Unit 2
algorithm Unit 2
 
ch2-1
ch2-1ch2-1
ch2-1
 
Quantum factorization.pdf
Quantum factorization.pdfQuantum factorization.pdf
Quantum factorization.pdf
 
Matlab polynimials and curve fitting
Matlab polynimials and curve fittingMatlab polynimials and curve fitting
Matlab polynimials and curve fitting
 

Recently uploaded

Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 

Recently uploaded (20)

Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 

Overlap Add, Overlap Save(digital signal processing)

  • 1. OVERLAP SAVE OVERLAP ADD METHOD Gourab Chandra Ghosh Surendra Institute of Engineering & Management
  • 2. CONTENTS: 1. Why overlap save & overlap add method ? 2. Steps to perform overlap save method. 3. Example of overlap save method. 4. Steps to perform overlap add method. 5. Example of overlap add method. 6. Difference between overlap save & add method. 7. Reference 8. Q & A 2
  • 3. FILTERING USING DFT: 1. In practical application we often come across linear filtering of long data sequences. 2. DFT involves operation on block of data. 3. The block size of data should minimum because digital processors have limited memory. 4. Two methods of filtering: 3
  • 4. FILTERING USING DFT: 1. In practical application we often come across linear filtering of long data sequences. 2. DFT involves operation on block of data. 3. The block size of data should minimum because digital processors have limited memory. 4. Two methods of filtering:  OVERLAP SAVE METHOD  OVERLAP ADD METHOD 4
  • 5. 5
  • 6. OVERLAP SAVE METHOD STEP-1: Determine length ‘M’, which is the length of the impulse response data sequences i.e. h[n] & determine ‘M-1’. STEP-2: Given input sequence x[n] size of DFT is ‘N’. let assume, N=5 6
  • 7. OVERLAP SAVE METHOD STEP-3: Determine the length of the new data, ‘L’ => N=(L+M-1) STEP-4: Pad ‘L-1’ zeros to h[n] 7
  • 8. OVERLAP SAVE METHOD STEP-3: Determine the length of the blocks, ‘L’ STEP-4: Pad ‘L-1’ zeros to h[n] 8 h[n] ‘L-1’ zeros (padded)
  • 9. OVERLAP SAVE METHOD Input Data Sequence x[n] 9 x1[n] x2[n] x4[n] x3[n] M-1 zeros M-1 data M-1 data M-1 data L L LL
  • 10. OVERLAP SAVE METHOD STEP-4: Perform Circular Convolution of h[n] & blocks of x[n] i.e. y1[n]= x1[n] h[n] y2[n]= x2[n] h[n] y3[n]= x3[n] h[n] y4[n]= x4[n] h[n] 10 N N N N
  • 11. OVERLAP SAVE METHOD 11 y1[n] y2[n] y4[n] y3[n] M-1 data M-1 data M-1 data M-1 data X X X X X=> discard
  • 12. OVERLAP SAVE METHOD 12 y1[n] y2[n] y4[n] y3[n] M-1 data M-1 data M-1 data Final Output Data Sequence y[n] M-1 data X X X X X=> discard
  • 13. OVERLAP SAVE EXAMPLE Ques. Given x[n]={3,-1,0,1,3,2,0,1,2,1} & h[n]={1,1,1}  Let, N=5 Length of h[n], M= 3 Therefore, M-1= 2 We know,  N=(L+M-1)  5=L+3-1  L=3 ∴Pad L-1=2 zeros with h[n] i.e. h[n]={1,1,1,0,0} 13
  • 14. OVERLAP SAVE EXAMPLE 3 -1 0 1 3 2 0 1 2 1 14 0 0 3 -1 0 -1 0 1 3 2 3 2 0 1 2 1 2 1 0 0 x1[n] x2[n] x4[n] x3[n] M-1(=2) no. of previous data L(=3) no. of new data
  • 15. OVERLAP SAVE EXAMPLE Performing yk[n]= xk[n] h[n], where k=1,2,3,4 1. y1[n]= {-1,0,3,2,2} 2. y2[n]= {4,1,0,4,6} 3. y3[n]= {6,7,5,3,3} 4. y4[n]= {1,3,4,3,1} 15 N
  • 16. OVERLAP SAVE EXAMPLE -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 16 3 2 2 0 4 6 5 3 3 4 3 1 -1 0 4 1 6 7 1 3 X=> discard X X X X n- y1[n] y1[n] y1[n] y1[n]
  • 17. OVERLAP SAVE EXAMPLE -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 17 3 2 2 0 4 6 5 3 3 4 3 1 -1 0 4 1 6 7 1 3 X=> discard X X X X n- y1[n] y1[n] y1[n] y1[n] y[n] 3 2 2
  • 18. OVERLAP SAVE EXAMPLE -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 18 3 2 2 0 4 6 5 3 3 4 3 1 -1 0 4 1 6 7 1 3 X=> discard X X X X n- y1[n] y1[n] y1[n] y1[n] y[n] 3 2 2 0 4 6
  • 19. OVERLAP SAVE EXAMPLE -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 19 3 2 2 0 4 6 5 3 3 4 3 1 -1 0 4 1 6 7 1 3 X=> discard X X X X n- y1[n] y1[n] y1[n] y1[n] y[n] 3 2 2 0 4 6 5 3 3
  • 20. OVERLAP SAVE EXAMPLE -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 20 3 2 2 0 4 6 5 3 3 4 3 1 -1 0 4 1 6 7 1 3 X=> discard X X X X n- y1[n] y1[n] y1[n] y1[n] y[n] 3 2 2 0 4 6 5 3 3 4 3 1
  • 21. 21
  • 22. OVERLAP ADD METHOD STEP-1: Determine length ‘M’, which is the length of the impulse response data sequences i.e. h[n] & determine ‘M-1’. STEP-2: Given input sequence x[n] size of DFT is ‘N’. let assume, N=5 22
  • 23. OVERLAP ADD METHOD STEP-3: Determine the length of the new data, ‘L’ STEP-4: Pad ‘M-1’ zeros to xk[n] Pad ‘L-1’ zeros to h[n] 23 xk[n] ‘M-1’ zeros (padded) h[n] ‘L-1’ zeros (padded)
  • 24. OVERLAP ADD METHOD Input Data Sequence x[n] 24 x1[n] x2[n] x4[n] x3[n] M-1 zeros M-1 zeros M-1 zeros M-1 zeros L L LL
  • 25. OVERLAP ADD METHOD STEP-4: Perform Circular Convolution of h[n] & blocks of x[n] i.e. y1[n]= x1[n] h[n] y2[n]= x2[n] h[n] y3[n]= x3[n] h[n] y4[n]= x4[n] h[n] 25 N N N N
  • 26. OVERLAP ADD METHOD 26 y1[n] y2[n] y4[n] y3[n] M-1 data M-1 data M-1 data Final Output Data Sequence y[n] M-1 data add add add
  • 27. OVERLAP ADD EXAMPLE Ques. Given x[n]={3,-1,0,1,3,2,0,1,2,1} & h[n]={1,1,1}  Let, N=5 Length of h[n], M= 3 Therefore, M-1= 2 We know,  N=(L+M-1)  5=L+3-1  L=3 ∴Pad L-1=2 zeros with h[n] i.e. h[n]={1,1,1,0,0} 27
  • 28. OVERLAP ADD EXAMPLE 3 -1 0 1 3 2 0 1 2 1 28 3 -1 0 1 3 2 0 1 2 1 0 0 x1[n] x2[n] x4[n] x3[n] M-1(=2) no. of zeros L(=3) no. of new data Input sequence x[n] 0 0 0 0 0 0 0 0
  • 29. OVERLAP ADD EXAMPLE Performing yk[n]= xk[n] h[n], where k=1,2,3,4 1. y1[n]= {3,2,2,-1,0} 2. y2[n]= {1,4,6,5,2} 3. y3[n]= {0,1,3,3,2} 4. y4[n]= {1,1,1,0,0} 29 N
  • 30. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 30 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2y[n]
  • 31. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 31 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2 0 4 6y[n]
  • 32. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 32 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2 0 4 6 5 3 3y[n]
  • 33. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 33 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2 0 4 6 5 3 3 4 3y[n]
  • 34. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 34 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2 0 4 6 5 3 3 4 3 1 0 0y[n]
  • 35. OVERLAP ADD EXAMPLE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 35 3 2 2 6 5 2 3 3 2 1 0 0 -1 0 1 4 0 1 1 1 +=> add + n- y1[n] y1[n] y1[n] y1[n] + ++ ++ 3 2 2 0 4 6 5 3 3 4 3 1 0 0y[n]
  • 36. OVERLAP SAVE vs ADD METHOD Overlap Save  Overlapped values has to be discarded.  It does not require any addition.  It can be computed using linear convolution Overlap Add  Overlapped values has to be added.  It will involve adding a number of values in the output.  Linear convolution is not applicable here. 36
  • 37. CONCLUSION: 37  Overlap Add and Save methods are almost similar.  From the differences one can choose any of the methods, which is suitable at that time.
  • 38. REFERENCE:  Digital Signal Processing - P. Rameshbabu  Discrete Time Signal Processing - Oppenheim & Schafer 38
  • 39. 39