Abstract

We present an explicit formula which unifies the mask of (2𝑛1)-point ternary interpolating as well as approximating subdivision schemes. We observe that the odd point ternary interpolating and approximating schemes introduced by Lian (2009), Siddiqi and Rehan (2010, 2009) and Hassan and Dodgson (2003) are special cases of our proposed masks/schemes. Moreover, schemes introduced by Zheng et al. (2009) can easily be generated by our proposed masks. It is also proved from comparison that (2𝑛1)-point schemes are better than 2𝑛-scheme in the sense of computational cost, support and error bounds.

1. Introduction

Subdivision is an algorithmic technique to generate smooth curves and surfaces as a sequence of successively refined control polygons. The schemes involving convex combination of more or less than six points at coarse refinement level to insert a new point at next refinement level is introduced by [18]. They introduced odd and even points ternary schemes. Zheng et al. [9] constructed (2𝑛1)-point ternary interpolatory subdivision schemes by using variation of constants. They also introduced ternary even symmetric 2𝑛-point subdivision schemes [10]. Mustafa and Khan [11] presented a new 4-point 𝐶3 quaternary approximating subdivision scheme. Lian [12] generalized 3-point and 5-point interpolatory schemes into an 𝑎-ary subdivision scheme for curve design. Later on, he further generalized his work into 2𝑚-point and (2𝑚+1)-point interpolating 𝑎-ary schemes for curve design [13]. Mustafa and Najma [14] generalized and unified even-point 𝑛-ary interpolating and approximating subdivision schemes for any 𝑛2. In this paper, we introduce an explicit formula which generalizes and unifies existing odd-point ternary interpolating and approximating subdivision schemes. A general formula which unifies odd-point and even-point 𝑛-ary interpolating and approximating schemes is still under investigation.

2. Preliminaries

Let be the set of integers and 𝛼={𝑎𝑗,𝑏𝑗,𝑗=(𝑛1),,(𝑛1),𝑛2} be the set of constants. A general form of (2𝑛1)-point ternary subdivision scheme 𝑆 which relates a set of control points 𝑓𝑘={𝑓𝑘𝑖}𝑖 to refined set of control points 𝑓𝑘+1={𝑓𝑖𝑘+1}𝑖 is defined by𝑓𝑘+13𝑖1=𝑛1𝑗=(𝑛1)𝑎𝑗𝑓𝑘𝑖+𝑗,𝑓𝑘+13𝑖=𝑛1𝑗=(𝑛1)𝑏𝑗𝑓𝑘𝑖+𝑗,𝑓𝑘+13𝑖+1=𝑛1𝑗=(𝑛1)𝑎𝑗𝑓𝑘𝑖+𝑗.(2.1) Which is formally denoted by 𝑓𝑘+1=𝑆𝑓𝑘. The set 𝛼 of constants is called mask of the scheme 𝑆. A necessary condition for the uniform convergence of the subdivision scheme (2.1) given by [3] is𝑛1𝑗=(𝑛1)𝑎𝑗=𝑛1𝑗=(𝑛1)𝑏𝑗=𝑛1𝑗=(𝑛1)𝑎𝑗=1.(2.2) The Laurent polynomial𝛼(𝑧)=𝑖𝛼𝑖𝑧𝑖,𝛼𝑖𝛼,(2.3) corresponding to the mask of convergent subdivision scheme (2.1) satisfies𝛼𝑒2𝑖𝜋/3𝑒=𝛼4𝑖𝜋/3=0,𝛼(1)=3.(2.4) For the given 𝑛, we define Lagrange fundamental polynomials of degree 2𝑛2, at the points (𝑛1),(𝑛2),,(𝑛1), by𝐿𝑗2𝑛2(𝑥)=𝑛1𝑘=(𝑛1),𝑘𝑗𝑥𝑘𝑗𝑘,𝑗=(𝑛1),(𝑛2),,(𝑛1),(2.5) and Lagrange fundamental polynomials of degree 2𝑛3 at the points (𝑛2),(𝑛3),,(𝑛1), by𝐿𝑗2𝑛3(𝑥)=𝑛1𝑘=(𝑛2),𝑘𝑗𝑥𝑘𝑗𝑘,𝑗=(𝑛2),(𝑛3),,(𝑛1).(2.6)

3. (2𝑛1)-Point Ternary Approximating and Interpolating Schemes

Here, first we present some preliminary identities then we will offer masks of (2𝑛1)-point ternary approximating and interpolating schemes.

Lemma 3.1. If 𝐿𝑗2𝑛2(1/3) is Lagrange fundamental polynomial of degree 2𝑛2 corresponding to nodes {𝑡}𝑛1(𝑛1) defined by (2.5), then 𝐿𝑗2𝑛213=(1)𝑛+𝑗1𝑛𝑘=𝑛+2(3𝑘2)32𝑛2,(1+3𝑗)(𝑛+𝑗1)!(𝑛𝑗1)!(3.1) where 𝑗=(𝑛1),,(𝑛1).

Proof. Consider 𝑛1𝑘=(𝑛1)13=1𝑘31+𝑛131+𝑛231+𝑛331+13131131𝑛+331𝑛+23.𝑛+1(3.2) This implies 𝑛1𝑘=(𝑛1)13=𝑘3𝑛433𝑛733𝑛1032313433𝑛+833𝑛+533𝑛+23.(3.3) This further implies 𝑛1𝑘=(𝑛1)13=1𝑘32𝑛1{(3𝑛+4)(3𝑛+7)(3𝑛+10)(2)(1)(4)(3𝑛8)(3𝑛5)(3𝑛2)}.(3.4) This can be written as 𝑛1𝑘=(𝑛1),𝑘𝑗13=𝑘(1)2𝑛232𝑛211+3𝑗𝑛𝑘=𝑛+2(3𝑘2),(3.5) where 𝑗=(𝑛1)(𝑛1). It is easy to verify that 𝑛1𝑘=(𝑛1),𝑘𝑗(𝑗𝑘)=(1)𝑛𝑗1(𝑛+𝑗1)!(𝑛𝑗1)!.(3.6) Now by substituting (3.5), (3.6), and 𝑥=1/3 in (2.5), we get (3.1).
This completes the proof.

Similarly, we can prove the following lemma.

Lemma 3.2. If 𝐿𝑗2𝑛3(1/3) is Lagrange fundamental polynomial of degree 2𝑛3 corresponding to nodes {𝑡}𝑛1(𝑛2) defined by (2.6) then 𝛽𝑗=𝐿𝑗2𝑛313=(1)𝑛+𝑗2𝑛𝑘=𝑛+3(3𝑘2)32𝑛3,(1+3𝑗)(𝑛+𝑗2)!(𝑛𝑗1)!(3.7) where 𝑗=(𝑛2),,(𝑛1).

Lemma 3.3. If 𝐿𝑗2𝑛2(1/3) and 𝐿𝑗2𝑛3(1/3) are Lagrange polynomials defined by (2.5) and (3.1), then 𝜒𝑗=𝐿𝑗2𝑛2(1/3)𝐿𝑗2𝑛3(1/3)𝐿2𝑛2(𝑛1)=((1/3)1)𝑛+𝑗1(2𝑛2)!,(𝑛+𝑗1)!(𝑛𝑗1)!(3.8) where 𝑗=(𝑛2),,(𝑛1).

Proof. By (3.1), for 𝑗=(𝑛1), we get 𝛽=𝐿2𝑛2(𝑛1)13=𝑛𝑘=𝑛+2(3𝑘2)32𝑛2.(43𝑛)(2𝑛2)!(3.9) Using (3.1), (3.7), and (3.9), we get (3.8). This completes the proof.

Remark 3.4. In the setting of primal parametrization, each ternary refinement of coarse polygon of scheme (2.1) replaces the old data 𝑓𝑘𝑖 by new data 𝑓𝑘+13𝑖1 and 𝑓𝑘+13𝑖, one to the left, the other to the right, and both at one-third the distance to the neighbours 𝑓𝑘𝑖1 and 𝑓𝑘𝑖+1. In other words, ternary refinement (2.1) defines a scheme whereby 𝑓𝑘+13𝑖 replaces the value 𝑓𝑘𝑖 at the mesh point 𝑡𝑘+13𝑖=𝑡𝑘𝑖 and 𝑓𝑘+13𝑖+1 and 𝑓𝑘+13𝑖+2 are inserted at the new mesh point 𝑡𝑘+13𝑖+1=(1/3)(2𝑡𝑘𝑖+𝑡𝑘𝑖+1) and 𝑡𝑘+13𝑖+2=(1/3)(𝑡𝑘𝑖+2𝑡𝑘𝑖+1), respectively.
Therefore, we can select the value of 𝑥 either 1/3 or 2/3 to prove the Lemmas 3.13.3. In this paper, 𝑥=1/3 has been selected. One can select 𝑥=2/3 to proof the above lemmas. The results of the above lemmas at 𝑥=±1/3 are same but the final mask of the scheme obtained in reverse order. Negative values give a proper order of the mask, that have why negative values have been selected to prove the above lemmas.

Now here we present the masks of (2𝑛1)-point ternary approximating and interpolating schemes.

Theorem 3.5. An explicit formula for the mask of (2𝑛1)-point ternary scheme (2.1) is defined by 𝑎(𝑛1)𝑎=𝑢,𝑗=(𝑢)𝜒𝑗+𝛽𝑗𝑏,𝑗=(𝑛2),(𝑛3),,(𝑛1),𝑗=𝑏𝑗=𝜒𝑗𝑏{𝑢𝛽},𝑗=1,2,,(𝑛1),0=12𝑛1𝑗=1𝑏𝑗,(3.10) where 𝑢 is free parameter while 𝛽𝑗, 𝜒𝑗, and 𝛽 are defined by (3.7), (3.8), and (3.9) respectively.

3.1. 3-, 5-, 7-Point Ternary Approximating Schemes

Here, we present three special cases of approximating schemes generated by (3.10) with free parameter.(i) If 𝑛=2 then by (2.1) and (3.10), we get the following 3-point ternary approximating scheme:𝑓𝑘+13𝑖1=𝑢𝑓𝑘𝑖1+43𝑓2𝑢𝑘𝑖+1𝑢3𝑓𝑘𝑖+1,𝑓𝑘+13𝑖=2𝑢9𝑓𝑘𝑖1+139𝑓2𝑢𝑘𝑖+2𝑢9𝑓𝑘𝑖+1,𝑓𝑘+13𝑖+1=1𝑢3𝑓𝑘𝑖1+43𝑓2𝑢𝑘𝑖+𝑢𝑓𝑘𝑖+1.(3.11)(ii) If 𝑛=3 then by (2.1) and (3.10), we get the following 5-point ternary approximating scheme:𝑓𝑘+13𝑖1=𝑢𝑓𝑘𝑖2+14𝑓814𝑢𝑘𝑖1+28𝑓27+6𝑢𝑘𝑖+7𝑓274𝑢𝑘𝑖+1+4𝑓81+𝑢𝑘𝑖+2,𝑓𝑘+13𝑖=7𝑓243+𝑢𝑘𝑖2+28𝑓2434𝑢𝑘𝑖1+95𝑓81+6𝑢𝑘𝑖+28𝑓2434𝑢𝑘𝑖+1+7𝑓243+𝑢𝑘𝑖+2,𝑓𝑘+13𝑖+1=4𝑓81+𝑢𝑘𝑖2+7𝑓274𝑢𝑘𝑖1+28𝑓27+6𝑢𝑘𝑖+14𝑓814𝑢𝑘𝑖+1+𝑢𝑓𝑘𝑖+2.(3.12)(iii) If 𝑛=4 then by (3.10), we get the following mask of 7-point ternary approximating scheme: 𝑎𝛼=3,𝑏3,𝑎3,𝑎2,𝑏2,𝑎2,𝑎1,𝑏1,𝑎1,𝑎0,𝑏0,𝑎0,𝑎1,𝑏1,𝑎1,𝑎2,𝑏2,𝑎2,𝑎3,𝑏3,𝑎3,(3.13) where 𝑎37=𝑢36,𝑎2=6𝑢+5036,𝑎1=15𝑢17536,𝑎0=20𝑢+70036,𝑎1=15𝑢+17536,𝑎2=6𝑢1436,𝑎3𝑏=𝑢,3=𝑏3=𝑢3538,𝑏2=𝑏2=6𝑢+21038,𝑏1=𝑏1=15𝑢52538,𝑏0=20𝑢+726138.(3.14)

3.2. 3-, 5-Point Ternary Interpolating Schemes

Here, we present two special cases of approximating schemes generated by (3.10) with free parameters.(i) By setting 𝑛=2 and 𝑢=𝛽, we get the following 3-point ternary interpolating scheme:𝑓𝑘+13𝑖1=𝑢𝑓𝑘𝑖1+43𝑓2𝑢𝑘𝑖+13𝑓+𝑢𝑘𝑖+1,𝑓𝑘+13𝑖=𝑓𝑘𝑖,𝑓𝑘+13𝑖+1=13𝑓+𝑢𝑘𝑖1+43𝑓2𝑢𝑘𝑖+𝑢𝑓𝑘𝑖+1.(3.15)(ii) If 𝑛=3 and 𝑢=𝛽, then by (2.1) and (3.10), we get the following 5-point ternary interpolating scheme:𝑓𝑘+13𝑖1=𝑢𝑓𝑘𝑖2+14𝑓814𝑢𝑘𝑖1+28𝑓27+6𝑢𝑘𝑖+7𝑓274𝑢𝑘𝑖+1+4𝑓81+𝑢𝑘𝑖+2,𝑓𝑘+13𝑖=𝑓𝑘𝑖,𝑓𝑘+13𝑖+1=4𝑓81+𝑢𝑘𝑖2+7𝑓274𝑢𝑘𝑖1+28𝑓27+6𝑢𝑘𝑖+14𝑓814𝑢𝑘𝑖+1+𝑢𝑓𝑘𝑖+2.(3.16)

3.3. Comparison with Existing Ternary Schemes

In this section, we will show that the popular existing odd-point ternary schemes are special cases of our proposed family of scheme. Here we will also compare the error bounds between limit curve and control polygon after 𝑘-fold subdivision of odd-point and even-point schemes.

3.3.1. Special Cases

Here we see that the most of the existing odd-point ternary subdivision schemes are either special cases or can be obtain by setting free parameter in our proposed masks.(i) By letting 𝑢=𝛽 in (3.10), Zheng et al. (2𝑛1)-point interpolating scheme [9] becomes special case of our scheme.(ii) By substituting 𝑢=2/9, and 𝑢=7/243 in (3.15) and (3.16), we get 3-point and 5-point ternary interpolating schemes of Lian [12] respectively.(iii) By substituting 𝑢=35/6561 in (3.13), we get 7-point ternary interpolating scheme of Lian [13]. Similarly, from (3.10), we can generate (2𝑚+1)-point ternary interpolating schemes of [13].(iv) For 𝑛=2, and parameter 𝑢=𝜇+25/72 in our proposed mask (3.13), 3-point ternary approximating scheme given in [7] becomes special case of our scheme.(v) For 𝑛=2, and 𝑢=10/27 in (3.11), we get 3-point approximating scheme of Hassan and Dodgson [4].(vi) For 𝑛=2, 𝑏=𝑢=2/9 and 𝑎=𝑢1/3 in (3.11), we get 3-point interpolating scheme of Hassan and Dodgson [4].

3.3.2. Error Bounds

In Tables 1 and 2 by using [15], with 𝜒=0.1, we have computed error bounds between limit curve and control polygon after 𝑘-fold subdivision of odd-point and even-point ternary approximating and interpolating schemes. It is clear from Tables 1 and 2 that error bounds of 3-point ternary schemes (3.11) and (3.15) at each subdivision level 𝑘 are less than the error bounds of 4-point ternary schemes [3, 10] at each level. Similarly error bounds of 5-point scheme (3.12) and (3.16) are less than the error bounds of 6-point schemes [10, 16]. Similar results can be obtained by comparing other odd-point and even-point schemes. Graphical representation of error bounds is shown in Figure 1.

Moreover, support and computational cost of (2𝑛1)-point schemes are less than 2𝑛-point schemes. Therefore, we conclude that (2𝑛1)-point schemes are better than 2𝑛-point schemes in the sense of support, computational cost, and error bounds.

3.4. Effects of Parameters in Proposed Schemes

We will discuss three major effects/upshots of parameter in schemes (3.11)–(3.16). Effect of parameters in other schemes can be discuss analogously.

3.4.1. Continuity

The effect/upshots of parameter 𝑢 in schemes (3.11)–(3.16) on order of continuity is shown in Tables 3 and 4. One can easily find the order of continuity over parametric intervals by using approach of [4].

3.4.2. Shapes of Limit Curves

In Figure 2, the effect of parameter in (3.11)–(3.16) on graph and continuity of limit curve is shown. These figures are exposed to show the role of free parameter when 3- and 5-point approximating and interpolating schemes (3.11)–(3.16) applied on discrete data points. From these figures, we see that the behavior of the limiting curve acts as tightness/looseness when the values of free parameter vary.

3.4.3. Error Bounds

The effects of parameter on error bounds at each subdivision level between 𝑘th level control polygon and limit curves are shown in Figure 3, Tables 5 and 6. From these tables and figures, we conclude that in case of 3-point approximating scheme continuity is maximum over 1/3<𝑢<4/9 and error bound is minimum over 1/3𝑢1/2. On each side of interval 1/3<𝑢<4/9 continuity decreases while error bounds increases on each side of interval 1/3𝑢1/2. In case of 5-, 7-point approximating scheme continuity is maximum over 1/18<𝑢<38/729 and 53/8748<𝑢<187/17496, while error bound is minimum at 𝑢=13/243 and 𝑢=95/8748, respectively.

While in case of 3- and 5-point interpolating scheme continuity is maximum over 2/9<𝑢<1/3 and 5/108<𝑢<7/162, while error bound is minimum at 𝑢=1/3 and 𝑢=2/41, respectively.

3.5. Conclusion

In this paper, we offered an explicit general formula for the generation of mask of (2𝑛1)-point ternary interpolating as well as approximating schemes. We have concluded from figures and tables that the (2𝑛1)-point schemes are better than 2𝑛-point schemes for 𝑛2 in the sense of computational cost, support and error bounds. Moreover, odd-point ternary schemes of Hassan and Dodgson [4], Lian [12, 13], Zheng et al. [9], and Siddiqi and Rehan [7, 8] are special cases of our proposed masks.

Acknowledgment

This work is supported by the Indigenous Ph.D. Scholarship Scheme of Higher Education Commission (HEC), Pakistan.